IT 2.1 Flashcards

1
Q

WHAT is the appropriate definition of a Local Area Network (LAN)?

A

A computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT is a benefit realized from an EFT system compared to a manual system?

A

LOWER COSTS

i.e. EFT transaction costs are lower than for manual systems

WHY? - Because documents and human intervention are eliminated from the transaction process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT is a disadvantage of using a private key to encrypt data?

A

Both the sender and receiver must have the private key before this encryption method will work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

KNOWLEDGE of what key is required to decode a received message?

A

THE Private-Key

i.e. KNOWLEDGE of the Private-Key is required in order to (decrypt) decode a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT is a major function of in-memory analytics?

A

IT analyzes data from system memory instead of hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT is Hadoop?

A

AN open source software framework that stores large amounts of data

  • It runs applications on clusters of commodity hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the Blank.

Message Encryption Software ________.

A

Increases System overhead.

WHY? - Because machine instructions necessary to encrypt and decrypt data constitute system overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT IT development poses the least risk to organizational security?

A

THE use of a Public-Key Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT is a good characterization of a “Interactive System?”

A

THE processing of data immediately on input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT is an accurate description of a Distributed Processing Network?

A

When an entity decentralizes the processing of tasks, data storage and the assignment of these functions to multiple computers in separate locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT type of network involves an arrangement that makes every device directly connected?

A

A Peer-to-Peer arrangement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT is an example of a Virtual Private Network (VPN)?

A

WHEN a company connects each office to a local internet service provider and routes date through the shared low cost public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT is an “extranet” Network?

A

THE linked intranets of two or more organizations

i.e. typically uses the public Internet as its transmission medium

For example: A company uses public internet with password-required access to connect to its customers’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT is a Local area network (LAN)?

A

ANY interconnection between devices in a single office or building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT is the “intranet?”

A

THE sharing of information throughout an organization by applying Internet connectivity standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT is a Value-added Network?

A

A privately owned Wide Area Network (WAN) that provides its customers with reliable, high-speed secure transmission of data

17
Q

WHAT is a client-server model?

A

THE central location of many servers devoted to the functions needed by all network users

18
Q

WHAT are examples of a Wide Area Network (WAN)?

A

The internet and the public telephone system

WHY? - Because this networking system consists of a “conglomerate” of Local Area Networks (LANs)

i.e. It can be either publicly or privately owned

19
Q

WHAT is a “Digital Signature?”

A

A data file created by a trusted third-party

20
Q

Fill in the Blank.

The sender’s encryption program ___(1)___ the data prior to transmission

A

(1) Encodes