ISC Simulation Definitions Flashcards

1
Q

This second-generation language is for microprocessors and other programmable devices, with a strong one-to-one correspondence between the language and the architecture’s machine code instructions. Writing programs in this language is time-consuming and prone to error.

A

Assembly language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This first-generation language is the elemental language of computers, a set of symbolic instruction code consisting of a long sequence of binary digital zeros and ones (bits). Every CPU has its own unique version.

A

Machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These languages have many routine procedures preprogrammed; the programmer states what is to be done, but not necessarily how to do it (e.g., find all files that contain “smith”). They are often related to a Database Management System (DBMS) that allow programmers to create database structures and manipulate data quickly and relatively easily.

A

Fourth-generation language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A language which inserts symbols, or tags, into text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A settings file format which formats information for use on the Web by identifying the nature of the information (e.g., information coded as a telephone number could be located on a page by a browser and dialed automatically).

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involves the concurrent execution of multiple jobs by the same computer, improving the utilization of system resources and enhancing system throughput.

A

Multiprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows the execution of two or more programs at the same time, requiring the utilization of multiple central processing units (CPU) which share a single memory.

A

Multiprocessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A flexible database approach supporting the information needs of multiple users from a common set of integrated database tables or files. Each file contains common data on a particular group (for instance, a master customer file).

A

Relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__________ involves a dedicated channel for the duration of the transmission. The sender signals that it will send a message; the receiver acknowledges the signal. The sender then sends the entire message. Voice and data may use the same line with no special data protocols. The two communicating devices must be compatible.

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attackers inject malicious scripts into web applications.

A

Cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A perpetrator modifies packet header addresses to either navigate a message to a different machine or modify the target machine’s data.

A

Message modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers inject malicious structured query language code into input fields of web applications.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attackers exploit existing code sequences in a program’s memory to perform malicious actions without injecting new code.

A

Return-oriented programming (ROP) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attacker intercepts and records valid data transmissions.

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two or more processes or threads attempt to access shared resources simultaneously.

A

Race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An intruder observes data being transmitted and makes inferences from the frequency and length of the calls.

A

Traffic analysis

17
Q

Exploits the Internet Control Message Protocol (ICMP) to bring down a host computer, often involving multiple hosts sharing broadcast addresses, causing heavy bandwidth usage

18
Q

A perpetrator initiates connection requests to a target server without finalizing the connection, leading to resource exhaustion and system shutdown.

19
Q

What attack is used to gain unauthorized access to a system by tricking a user into logging into a malicious system to capture their username and password?

A

Password spoofing

20
Q

What helps prevent hardware or software failures from causing system downtime?

A

Fault tolerance

21
Q

What distributes data across multiple disks for redundancy and data recovery?

A

Redundant Array of Inexpensive or Independent Disks (RAID) technology

22
Q

What role does fault-tolerant hardware play in increasing system resilience?

A

Fault-tolerant hardware provides hardware redundancy and automatic failover.

23
Q

Define fault management

A

Fault management involves identifying and addressing system faults or abnormalities, ensuring minimal disruptions, and maintaining system reliability.

24
Q

How does platform as a service (PaaS) differ from infrastructure as a service (IaaS)?

A

PaaS eliminates the need for local installation and maintenance, while IaaS focuses on infrastructure components.

25
Q

How does software as a service (SaaS) benefit organizations regarding maintenance and updates?

A

SaaS eliminates the need for local installation and maintenance.

26
Q

Which cloud service model is most suitable for developers who want to build, test, and deploy applications without dealing with the complexity of underlying infrastructure?

A

Platform as a service (PaaS)

27
Q

In a cloud security service-level agreement (SLA), what might be included to ensure data confidentiality?

A

A guarantee of complete data isolation

28
Q

Individuals may direct a covered entity to transmit an electronic copy of their PHI in an electronic health record to a third party. What Privacy Rule Principle?

29
Q

Individuals should be informed of the entity’s privacy practices and how they may use and disclose their PHI. What Privacy Rule Principle?

30
Q

Individuals have a right to request that a covered entity restrict the use or disclosure of their PHI for treatment, payment, or healthcare operations or to persons involved in their care or payment for care. What Privacy Rule Principle?

A

Restrictions

31
Q

Individuals can contact the U.S. Department of Health and Human Services OCR if they suspect a violation of their privacy rights. What Privacy Rule Principle?

A

Complaints

32
Q

Individuals have a right to request that a covered entity modify/update their PHI if it needs to be revised or completed. What Privacy Rule Principle?

33
Q

What control category: help ensure the integrity, accuracy, and completeness of transaction data entered from online devices. Additionally, these controls should ensure that error handling procedures facilitate the timely and accurate resubmission of all corrected data.

A

Online data entry control

34
Q

What control category: Review and reconcile data; require users to review data for completeness and accuracy; and have established procedures for distribution, correction, storage, and disposal of data.

A

Output controls

35
Q

What control category: Require employees to sign confidentiality agreements; reconcile general ledger accounts to subsidiary totals; use internal and external file labels; use file protection mechanisms; and review and eliminate unneeded or out-of-date data.

A

Processing and storage control

36
Q

What control category: ensure the accuracy, completeness, and timeliness of data during its conversion from its original source into computer data or entry into a computer application. In online processing, edit checks are performed during the source data entry process, and incorrect data is not accepted until corrected. In batch processing, a separate program performs the edit checks on the input data before it is processed.

A

Input validation routine