Info magt Final Flashcards

1
Q

LAN- Local Area Network

A
  • Span area of up to a half mile

- Usually all computers in one building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAN- Metropolitan Area network

A

Spans medium size geographic areas like a city

common use includes college campus or corporate facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN- Wide network area

A

spans large geographic areas like some cities, state, countries, could have global reach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISP- Internet Service provider

A

A commercial organization with a permanent connection to the internet
ISPs sell temporary connection to retail subscribers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Switch- 50 ports

A

connects all devices together on a computer network

forwards data only to computer requesting the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modem

A

converts data signals from digital, a discrete, a binary wave forma to analog and from analog back to digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NOS- Network operating system

A

Software that usually resides in the server but could also co-exist with client software in same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

protocol

A

set of rules and procedures governing transmission of information between points in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transmission control protocol/ internet protocol (Tcp/IP)

A

Universal standard allowing companies to buy best of brand components alleviating concern for compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet switching

A

A method of slicing a message into panels called packets, creates standard size making the most efficient use of network paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain names

A

are used a pseudonyms for numbered address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

domain name system

A

coverts domain name to the numerical representation when presented to the internet network
a domain name is usually a network LAN connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware meaning

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virus

A

Rough software that attaches itself to data files, email, or programs to be executed by some unknown event without user knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms

A

Programs that copy themselves from one computer to other computers over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Requesting confident information from users via face web sites or emails that look like they come from legitimate organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sniffing

A

A type of eavesdropping program that monitors information traveling over a network communication line, very difficult to detect. When used legitimately they help identify network problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

click fraud

A

Repeatedly clicking on the online adds of competitors to drive up advertising cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Gramm-Leach-Biles Act

A

Financial modernization act, requires financial institutions to ensure the security and confidentiality of consumer data.

20
Q

Data security

A

Monitor for unauthorized access changes and destruction of data

21
Q

MIS Audit

A

Examine the firm’s overall security environment and controls governing individual information system

22
Q

Token

A

Small device that displays a member (passcode) to be used when logging into a system. The number changes every x seconds and is synchronized with the computer system. should be used in conjunction with a password

23
Q

Biometrics

A

system that reads and interprets human traits such as finger prints, irises, voice, retinal images to provide identification

24
Q

fire walls

A

prevents unauthorized communication into and out of the network

25
Q

Antivirus. antispyware software

A

effective only against malware already known. Hence, updates are required

26
Q

Gantt Chart

A

Visual representation of timing and duration of tasks, not relationship between task.

27
Q

PERT Chart (program evaluation and review technique)

A

Graphically depicts tasks, their sequence and interrelationships

28
Q

A device that acts as a connection point between computers and can filter and forward data to specified destination

A

Switch

29
Q

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destination is called

A

Packet switching

30
Q

Which signal type represented by a continues form

A

Analog

31
Q

Which protocol is the internet based on

A

TCP/ IP

32
Q

In telecommunications network architecture, a protocol is

A

a standard set of riles and procedures for control of communications in a network

33
Q

A network that covers entire geographical region is most commonly referred to as an

A

wide area network

34
Q

(T/F)

Telephone networks are fundamentally different from computer networks

A

True

35
Q

(T/F)

Computer worms spread much moe rapidly than computer viruses

A

True

36
Q
(T/F)
An NOS (network operating system) must reside on a dedicated server computer in order to manage a network
A

False

37
Q

(T/F)

The Domain name system (DNS) converts IP addresses to domain names

A

False

38
Q

(T/F)
The larger the system project, the more risk in terms of being completed on time, within budget, and according to project requirments

A

True

39
Q

(T/F)

A gantt chart graphically depicts project tasks and their interrelationships

A

False

40
Q

(T/F)

Unauthorized access is a security challenge that is most likely to occur in a network at the point of client computers

A

True

41
Q

Sniffing is a security challenge that is most likely to occur in which point of a network

A

Communication lines

42
Q

A fire wall allows the organization to

A

Prevent unauthorized communication both into and out of the network

43
Q

The ______ consist of analyst, specialist from relevant end-user business areas, application programmers, and perhaps database specialists

A

Project team

44
Q

The worth of systems from financial perspective essentially revolves around the issue of

A

Return on invested capital

45
Q

Change management is a process that

A

should be addressed before the project is developed

46
Q

An independent computer program that copies itself from one computer to another over a network is called a

A

Worm

47
Q

The Gramm-Leach-Bliley act

A

Requires financial institutions to ensure the security of consumer data.