Shared Flashcard Set

Details

comp study guide
comp study guide 2
28
Computer Networking
Undergraduate 1
04/15/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
Know the difference between Off shoring and Outsourcing
Definition
Outsourcing is subtracting with another company for a particular function.

Off shoring is for the bigger picture
Term
Know what Content-Filtering software, Spam Filtering, and
Surveillance Software are.
Definition
Content filtering deals with the level of maturity content is presented,

spam filtering deals with pop ups,

surveillance software deals with cameras and videos
Term
. What is the study of Ethics?
Definition
Study of morals
Term
What is Globalization?
Definition
the process enabling financial and investment markets to operate internationally, largely as a result of deregulation and improved communications
Term
what are blogs, v-logs, and podcasts are
medias.
Definition
consumer generated
Term
What is a Zombie Computer?
Definition
hacked computer
Term
Know these terms: Virus, firewall, Spyware, and Worm.
Definition
Spyware collects data w/o users knowledge,

worm replicates itself
A virus is a program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload.
¡There are many types of viruses

A firewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous.
¡All Windows users should protect their network connection with a firewall. ~demo
Term
What are phishing scams
Definition
asks for personal information
Term
Know the difference between a firewall , popup blocker, and
spy ware
Definition
Firewall blocks unauthorized access of programs but also allows communication of authorized programs

Spyware is software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer.
Term
What security levels are available on wifi networks and what
the default settings are?
Definition
ssid, In 2004, the IEEE ratified the full IEEE 802.11i (WPA2) encryption standards. If used with a 802.1X server or in pre-shared key mode with a strong and uncommon passphrase WPA2 is still considered[by whom?] secure, as of 2009[update].
Term
What is “War Driving” in reference to wireless networks?
Definition
Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA.
Term
Know routine safeguards for protection against data
destroyed by malicious software and hacking attempts.
Definition
antispyware
Term
What is encryption?
Definition
encoding: the activity of converting data or information into code
Term
. How does biometrics work and how can they be used to
secure computers.
Definition
use for idenitificaiton of a person- finger scanner is an example
Term
How to select a safe password.
Definition
¡strong by including words that are unrelated to your interests, and include upper and lowercase letters, numbers, and symbols
¡unique – don’t use the same password for your bank account as you do for your email account
¡changed regularly – change your password twice a year
Term
Ethics and laws concerning sharing of MP3 and other
copyright material.
Definition
Piracy and plagiarism
Term
Read about Security Holes, Software Patches, and
Cryptography
Definition
Security hole-In computer security, the term vulnerability is a weakness which allows an attacker

Software patches- A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data


Cryptography security hole- flaw when hiding information by encrypting
Term
What is considered intellectual property?
Definition
intangible property that is the result of creativity
Term
. Know about identity theft and internet fraud.
Definition
Identity theft is the criminal act of using stolen information about a person to assume that person’s identity, typically for financial gain.

Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly.
Term
. What is Total Information Security
Definition
Total Information Security involves securing all components of the global digital information infrastructure.
Personal Computers
Business Computer Systems
Government Systems
International Systems
Participation by EVERYONE is important and difficult to gain!
Term
Five steps of new information systems development
Definition
planning, gathering info for analysis, design, build or coding, testing
Term
Study Group Decision Support systems... Know the good and
bad points.
Definition
A GDSS is flexible, supports anonymous input, and reduces negative group dynamics
Term
what is TPS,DSS,MIS, ES
Definition
(TPS), is an information system that supports and records transactions.

(MIS), A MIS sheds light on a wide-range of common, day-to-day business decisions. An information system designed to provide routine information to managers and decision makers

(DSS) A DSS supports decision making for specific unique and difficult decisions. An information system used to support problem-specific decision making.
Term
what is scheduled reports, demand reports, exception reports,
Definition
Scheduled Reports, are produced periodically on a schedule; daily, weekly, monthly, quarterly, annualy, ect.

Demand Reports, are developed to get certain information at a person’s request.

Exception Reports, are automatically produced when a situation is unusual or requires action.
Term
what are e-commerce and m-commerce systems
Definition
E-Commercerefers to systems that support electronically executed business transactions. Although e-commerce covers all forms of electronic transactions, it is typically used in reference to Internet-based transactions

M-commerce systems a form of e-commerce that takes place over wireless mobile devices such as handheld computers and cell phones.
Term
Know what a proximity payment system is.
Definition
make use of Infrared, Near Field Communication (NFC), or RFID technologies to support contactless payments using a cell phone.
Term
Know what B2B, C2C, and C2B systems are.
Definition
Types of E-commerce:
Business-to-consumer (B2C)
Business-to-business (B2B)
Consumer-to-consumer (C2C)
Term
Database Topics: DBMS, Distributed Database, Relational
Database, Data Mining, SQL, and Object Oriented
Definition
A DBMS consists of a group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs.

In a relational database, tables are linked (related) through
common fields.
One-to-many
¡Most typical
¡Makes use of primary key
One-to-one
Many-to-many

Structured Query Language (SQL): The most popular DML.

Data Mining: the process of extracting information from a data warehouse.
¡“Connecting the dots”

Distributed Database: The Web is frequently used as the Front End of DBMS’s. Visual, audio, and unstructured database systems organize non-textual data.
Supporting users have an ad free experience!