Shared Flashcard Set

Details

info 360
business info tech
169
Computer Science
Undergraduate 4
06/01/2011

Additional Computer Science Flashcards

 


 

Cards

Term
What is a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move?
Definition
B. Touch pad
Term
What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium?
Definition
B. Magnetic tape
Term
What detects the presence or absence of a mark in a predetermined place (popular for multiple-choice exams)?
Definition
C. Optical-mark recognition
Term
What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time?
Definition
C. Workstation
Term
What is system software?
Definition
A. Controls how the various technology tools work together along with the application software
Term
What is application software?
Definition
D. Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
Term
What organizes information on a hard disk in the most efficient way?
Definition
B. Disk optimization
Term
What provides the tools for data retrieval, modification, deletion, and insertion?
Definition
A. Data management
Term
What is the recommended way to implement information security lines of defense?
Definition
A. People first, technology second
Term
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
Definition
C. Insiders
Term
What identifies the rules required to maintain information security?
Definition
B. Information security policies
Term
Which of the following is not one of the five steps for creating an information security plan?
Definition
C. Revise and test the information security policies
Term
What is social engineering?
Definition
A. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
Term
Which of the following is not one of the top 10 questions managers should ask regarding information security?
Definition
D. How do we identify potential insiders?
Term
Which of the following is not one of the three primary information security areas?
Definition
C. Detection and resistance
Term
What is a method for confirming users' identities?
Definition
A. Authentication
Term
What is the most secure type of authentication?
Definition
D. Combination of all of the above
Term
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
Definition
C. Smart card
Term
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
Definition
C. Biometrics
Term
Which of the following is considered a type of biometrics?
Definition
D. All of the above
Term
What is the most costly and intrusive form of authentication?
Definition
C. Something that is part of the user such as a fingerprint or voice signature
Term
Which of the following authentication methods is 100 percent accurate?
Definition
D. None of the above
Term
A. Content filtering, encryption, firewalls
Definition
A. Content filtering, encryption, firewalls
Term
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
Definition
D. None of the above
Term
What is spam?
Definition
C. A form of unsolicited email
Term
What is encryption?
Definition
B. Scrambles information into an alternative form that requires a key or password to decrypt the information
Term
Which of the following can be completed by encryption?
 
A. Switch the order of characters

B. Replace characters with other characters

C. Use a mathematical formula to convert the information into some sort of code

D. All of the above
Definition
D: all of the above
Term
Where do organizations typically place firewalls?
Definition
D. Between the server and the Internet
Term
Which of the following does a firewall perform?
Definition
all of the above
Term
What includes a variety of threats such as viruses, worms, and Trojan horses?
Definition
A. Malicious code
Term
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
Definition
C. Spoofing
Term
What is the most common type of defense within detection and response technologies?
Definition
D. Antivirus software
Term
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
Definition
A. White-hat hackers
Term
Who breaks into other people's computer systems and just looks around or steals and destroys information?
Definition
B. Black-hat hacker
Term
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?
Definition
D. Script kiddies
Term
Who are hackers with criminal intent?
Definition
C. Crackers
Term
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
Definition
D. Cyberterrorists
Term
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?
Definition
B. Worm
Term
What floods a website with so many requests for service that it slows down or crashes the site?
Definition
C. Denial-of-service attack
Term
Which is a virus that opens a way into the network for future attacks?
Definition
D. Backdoor programs
Term
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?
Definition
C. Detection and response
Term
What are the principles and standards that guide our behavior toward other people?
Definition
A. Ethics
Term
What is intangible creative work that is embodied in physical form?
Definition
B. Intellectual property
Term
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
Definition
C. Copyright
Term
What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
Definition
D. Fair Use Doctrine
Term
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
Definition
D. Privacy
Term
What is software that is manufactured to look like the real thing and sold as such?
Definition
C. Counterfeit software
Term
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
Definition
B. Pirated software
Term
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
Definition
B. Epolicies
Term
Which of the following describes privacy?
Definition
C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
Term
Which of the following describes privacy?
Definition
C. The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
Term
Which of the following describes epolicies?
Definition
B. Policies and procedures that address the ethical use of computers and Internet usage in the business environment
Term
47. Which of the following is not considered an epolicy?
Definition
D. Anti-hacker use policy
Term
Which of the following is included in the four quadrants of ethical and legal behavior?
Definition
all of above
Term
What is the ideal type of decisions for people in an organization to make?
Definition
A. Legal and ethical
Term
What was the primary problem Saab encountered with one of its marketing companies?
Definition
C. Contacted customers regardless of their opt-out or opt-in decision
Term
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?
Definition
B. Bork Bill
Term
Which act allows any person to examine government records unless it would cause an invasion of privacy?
Definition
C. Freedom of Information Act
Term
Which act restricts what information the federal government can collect?
Definition
A. Privacy act
Term
. Which act protects investors by improving the accuracy and reliability of corporate disclosures?
Definition
A. Sarbanes-Oxley Act
Term
Which act strengthened criminal laws against identity theft?
Definition
D. None of the above
Term
Which of the following is not one of the six principles for ethical information management according to CIO magazine?
Definition
D. The CIO is responsible for how outsiders view and analyze corporate information
Term
What is the policy that contains general principles to guide computer user behavior?
Definition
D. None of the above
Term
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
Definition
D. Ethical computer use policy
Term
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
Definition
C. Informed, consent
Term
If an organization were to have only one policy, which one would it want?
Definition
D. Ethical computer use policy
Term
Which policy contains general principles regarding information privacy?
Definition
A. Information privacy policy
Term
Which of the following represents the classic example of unintentional information reuse?
Definition
B. Social Security number
Term
What is one of the guidelines an organization can follow when creating an information privacy policy?
Definition
B. Notice and disclosure
Term
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
Definition
B. Acceptable use policy
Term
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
Definition
C. Nonrepudiation
Term
Which policy typically contains a nonrepudiation clause?
Definition
D. Acceptable use policy
Term
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
Definition
B. Acceptable use policy
Term
What is one of the major problems with email?
Definition
C. User's expectation of privacy
Term
Which of the following is part of the acceptable use policy stipulations?
Definition
D. All of the above
Term
What is a mail bomb?
Definition
A. Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
Term
Which policy details the extent to which email messages may be read by others?
Definition
B. Email privacy policy
Term
Which of the following is not a part of the email privacy policy stipulations?
Definition
D. It informs people that the organization has full control over email once it is transmitted outside the organization
Term
Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic?
Definition
C. 40 to 60 percent
Term
76. Which of the following describes information technology monitoring?
Definition
D. All of the above
Term
What is a program, when installed on a computer, records every keystroke and mouse click?
Definition
A. Key logger software
Term
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
Definition
B. Hardware key logger
Term
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?
Definition
C. Cookie
Term
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
Definition
C. Enterprise architecture
Term
Which organization did a 66-hour database failure allow consumers to purchase guns without background checks?
Definition
B. FBI
Term
A unified enterprise architecture will perform all of the following, except?
Definition
B. Provide looser links to the business strategy allowing the organization additional flexibility
Term
What are the four different lenses a business must use to look at an enterprise architecture plan?
Definition
A. Business, data, applications, and technology architecture
Term
Which of the following represents a person grounded in technology, fluent in business, and provides the important bridge between IT and the business?
Definition
C. Enterprise architect
Term
Which company's EAs found software already written to allow its subscribers to customize the ring sounds on their cell phones?
Definition
D. T-Mobile
Term
What determines how applications integrate and relate to each other?
Definition
A. Application architecture
Term
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
Definition
D. Infrastructure architecture
Term
Which of the following is not one of the three components of an enterprise architecture?
Definition
C. Services architecture
Term
10. Which of the following is not a component of an information architecture?
Definition
C. Web services
Term
Which architecture supports managing user access and using up-to-date antivirus software and patches?
Definition
B. Information architecture
Term
What are the primary differences between types of backup/recovery media such as DVDs and redundant storage servers?
Definition
B. Speed and associated costs
Term
How frequently should a large organization that deals with large volumes of critical information backup?
Definition
A. Daily
Term
FirstEnergy missed signs that there were potential problems in its portion of North America's electrical grid. The events that followed left an estimated 50 million people in the Northeast and Canada in the dark. A joint task force between Canada and the US investigated the causes and recommended all of the following to avoid big-scale outages, except?
Definition
C. Ensure the networks have a quick backup system in case of downtime
Term
What is a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?
Definition
D. Business continuity planning
Term
Which company used its continuity planning group to safeguard against earthquakes and other natural disasters?
Definition
C. Union Bank of California
Term
Good information architectures include all of the following, except?
Definition
B. Ensuring scalability to meet increased demand
Term
What is failover?
Definition
D. A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Term
What is fault tolerance?
Definition
C. A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Term
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
Definition
B. Hot site
Term
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Definition
D. Disaster recovery plan
Term
What refers to how well a system can adapt to increased demands?
Definition
A. Scalability
Term
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
Definition
B. Capacity planning
Term
What addresses when systems can be accessed by employees, customers, and partners
Definition
D. Availability
Term
Which website was inundated with more than 91 million page views on September 11, 2001?
Definition
B. MSNBC
Term
Which company created its website to parallel the same sleek but simple design of its quarterly flagship magazine?
Definition
A. Abercrombie & Fitch
Term
Which of the following is not a component of an application architectur
Definition
D. Capacity planning
Term
What is an open system?
Definition
C. A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
Term
What is interoperability?
Definition
B. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
Term
What are web services?
Definition
A. Contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
Term
Which of the following is not an primary business goal of enterprise architectures?
Definition
C. Generate goals
Term
Which of the following is a type of backup/recovery media?
Definition
D. All of the above
Term
Which of the following is a type of backup/recovery media?
Definition
D. All of the above
Term
What is the primary difference between the different types of backup/recovery media?
Definition
D. All of the above
Term
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?
Definition
C. Weekly
Term
What does the disaster recovery cost curve chart?
Definition
D. All of the above
Term
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
Definition
D. Cold site
Term
Which of the following is not a characteristic of a solid infrastructure architecture?
Definition
C. Integrity
Term
What ensures all systems are functioning correctly and providing accurate information?
Definition
A. Reliability
Term
What addresses the timeframes when systems can be accessed by employees, customers, and partners?
Definition
B. Availability
Term
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
Definition
D. Performance
Term
What is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services?
Definition
C. Service oriented architecture
Term
Which of the following does not apply to SOA?
Definition
A. A concrete tool or framework that can be purchased
Term
Which of the following is not a component in an SOA architecture?
Definition
D. Maintenance Model
Term
What are the key technical concepts of SOA?
Definition
A. Processes, integration, tight coupling
Term
What is a SOA service?
Definition
A. A simple business task
Term
Which of the following is not part of a typical SOA solution?
Definition
D. Improve customer retention and deliver new products and services through reuse of current investments
Term
What is extensible markup language (XML)?
Definition
A. A markup language for documents containing structured information
Term
What is loose coupling?
Definition
C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components
Term
What is a framework for dividing the resources of a computer into multiple execution environments?
Definition
C. Virtualization
Term
Which of the following is a great example of loose coupling?
Definition
C. The capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components
Term
What is a framework for dividing the resources of a computer into multiple execution environments?
Definition
C. Virtualization
Term
Which of the following is a great example of loose coupling?
Definition
A. Conversion of currency
Term
Which of the following is an example of loose coupling?
Definition
A. Common customer identification
Term
Which of the following is considered virtualization?
Definition
B. Partitioning a hard drive
Term
What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?
Definition
D. All of the above
Term
Which of the following is a trend responsible for moving virtualization into the spotlight?
Definition
D. All of the above
Term
Which of the following reflects Moore's Law?
Definition
A. New generations of chips deliver double the processing power as the previous generation
Term
Which of the following is not an additional benefit of virtualization
Definition
C. Ease of use for customer relationship management system
Term
What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?
Definition
D. Grid Computing
Term
What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?
Definition
D. Grid Computing
Term
Business benefits for using grid computing include?
Definition
D. All the above
Term
What is often referred to as being the world's single and most powerful computer solution?
Definition
D. Grid Computing
Term
t/f: Enterprise architectures are always static; they never change.
Definition
false
Term
t/f:  A system should not be designed to include the ability to handle multiple currencies and languages if the company is not currently performing business in other countries.
Definition
false
Term
t/f: SOA is not a concrete architecture; it is something that leads to a concrete architecture.
Definition
TRUE
Term
t/f:  SOA provides the technology underpinnings for working with services that are not just software or hardware, but rather business tasks.
Definition
TRUE
Term
t/f: Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput.
Definition
true
Term
t/f: Web services are the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
Definition
false
Term
t/f: Infrastructure architecture identifies where and how important information, like customer records, is maintained and secured.
Definition
FALSE
Term
t/f: Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination
Definition
TRUE
Term
t/f: Historically, the makers of proprietary software have generally not made source code available.
Definition
TRUE
Term
t/f: The primary characteristics of a solid infrastructure include flexibility, scalability, reliability, availability, and performance.
Definition
true
Term
SOA is not a concrete architecture; it is something that leads to a ___________ architecture.
Definition
Concrete
Term
Loose coupling is simply a way of ensuring that the technical details such as language, platform and so on are _____________ from the service.
Definition
Decoupled
Term
In a virtualized environment, the logical functions of computing, storage, and network elements are separated from their ____________ functions.
Definition
Physical
Term
The bandwidth required to transport the __________ services will continue to increase and the possibility of __________ degradation will become more challenging since ________ cannot tolerate packet loss. (Please note the same word fits in all of these blanks - you only need one word for the answer to fit all 3 blanks)
Definition
Video
Term
___________ architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.
Definition
Enterprise
Term
____________ architecture determines how applications integrate and relate to each other.
Definition
Application
Term
A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Definition
Hot
Term
A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
Definition
Cold
Term
_________ ensures all systems are functioning correctly and providing accurate information.
Definition
Reliability
Term
____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
Definition
Failover
Term
Managing ___________ access to information is a critical piece of the information architecture.
Definition
User
Term
A(n) _______________ is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them.
Definition
Open system
Term
Service oriented architecture begins with a(n) ______________.
Definition
Service
Supporting users have an ad free experience!