Info magt Final Flashcards
LAN- Local Area Network
- Span area of up to a half mile
- Usually all computers in one building
MAN- Metropolitan Area network
Spans medium size geographic areas like a city
common use includes college campus or corporate facility
WAN- Wide network area
spans large geographic areas like some cities, state, countries, could have global reach
ISP- Internet Service provider
A commercial organization with a permanent connection to the internet
ISPs sell temporary connection to retail subscribers
Switch- 50 ports
connects all devices together on a computer network
forwards data only to computer requesting the information
Modem
converts data signals from digital, a discrete, a binary wave forma to analog and from analog back to digital
NOS- Network operating system
Software that usually resides in the server but could also co-exist with client software in same computer
protocol
set of rules and procedures governing transmission of information between points in a network
Transmission control protocol/ internet protocol (Tcp/IP)
Universal standard allowing companies to buy best of brand components alleviating concern for compatibility
Packet switching
A method of slicing a message into panels called packets, creates standard size making the most efficient use of network paths
Domain names
are used a pseudonyms for numbered address
domain name system
coverts domain name to the numerical representation when presented to the internet network
a domain name is usually a network LAN connected to the internet
Malware meaning
Malicious software
virus
Rough software that attaches itself to data files, email, or programs to be executed by some unknown event without user knowledge
Worms
Programs that copy themselves from one computer to other computers over the network
Phishing
Requesting confident information from users via face web sites or emails that look like they come from legitimate organization
sniffing
A type of eavesdropping program that monitors information traveling over a network communication line, very difficult to detect. When used legitimately they help identify network problems
click fraud
Repeatedly clicking on the online adds of competitors to drive up advertising cost.
Gramm-Leach-Biles Act
Financial modernization act, requires financial institutions to ensure the security and confidentiality of consumer data.
Data security
Monitor for unauthorized access changes and destruction of data
MIS Audit
Examine the firm’s overall security environment and controls governing individual information system
Token
Small device that displays a member (passcode) to be used when logging into a system. The number changes every x seconds and is synchronized with the computer system. should be used in conjunction with a password
Biometrics
system that reads and interprets human traits such as finger prints, irises, voice, retinal images to provide identification
fire walls
prevents unauthorized communication into and out of the network
Antivirus. antispyware software
effective only against malware already known. Hence, updates are required
Gantt Chart
Visual representation of timing and duration of tasks, not relationship between task.
PERT Chart (program evaluation and review technique)
Graphically depicts tasks, their sequence and interrelationships
A device that acts as a connection point between computers and can filter and forward data to specified destination
Switch
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called
Packet switching
Which signal type represented by a continues form
Analog
Which protocol is the internet based on
TCP/ IP
In telecommunications network architecture, a protocol is
a standard set of riles and procedures for control of communications in a network
A network that covers entire geographical region is most commonly referred to as an
wide area network
(T/F)
Telephone networks are fundamentally different from computer networks
True
(T/F)
Computer worms spread much moe rapidly than computer viruses
True
(T/F) An NOS (network operating system) must reside on a dedicated server computer in order to manage a network
False
(T/F)
The Domain name system (DNS) converts IP addresses to domain names
False
(T/F)
The larger the system project, the more risk in terms of being completed on time, within budget, and according to project requirments
True
(T/F)
A gantt chart graphically depicts project tasks and their interrelationships
False
(T/F)
Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers
True
Sniffing is a security challenge that is most likely to occur in which point of a network
Communication lines
A fire wall allows the organization to
Prevent unauthorized communication both into and out of the network
The ______ consist of analyst, specialist from relevant end-user business areas, application programmers, and perhaps database specialists
Project team
The worth of systems from financial perspective essentially revolves around the issue of
Return on invested capital
Change management is a process that
should be addressed before the project is developed
An independent computer program that copies itself from one computer to another over a network is called a
Worm
The Gramm-Leach-Bliley act
Requires financial institutions to ensure the security of consumer data.