Computer Science Final- Swatzell

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

Risk Management

the process of placing safeguards in place to reduce the vulnerability to a risk.

2
New cards

IS Risk Assessment

Risk Assessment is the process of evaluating the potential vulnerability of IS systems. The same can be said for any technology-based system. In fact, we often use risk assessment for processes and projects

3
New cards

Pretexting

deceiving by pretending to be someone else

4
New cards

Phishing

obtaining unauthorized access to data via email

5
New cards

Spoofing

someone pretending to be someone else

6
New cards

Sniffing

intercepting computer communications

7
New cards

Usurping

invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services unauthorized programs

8
New cards

Malware

Viruses, Worms, Trojan Horse, Spyware and Adware

9
New cards

Virus

s a computer program that replicates itself ultimately consuming the computer's resources

10
New cards

Worms

are viruses that propagate themselves using the Internet or other computer networks

11
New cards

Spyware/Adware

invade your computer and capture keystroke information. Spyware does so for malicious reasons and Adware just does so to report activity to allow for targeted ads.

12
New cards

Beacons

are tiny files that gather demographic information about you. Your info can then be sold several times a day and constitute a profile of your likes and habits. Lotame Solutions specializes in Beacons.

13
New cards

Bot

is a new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware

14
New cards

Bot Herder

refers to the individual or organization that controls the Bots. North Korean Army is responsible for most bots in the US since 2009. The Chinese Army is another primary source of Bots Army

15
New cards

Honeypots

are false targets for criminals to attack

16
New cards

Electronic counter measures to reduce vulnerabilities to cyber attacks

Firewalls Encryption Additional passwords Antispyware/anti-adware software backups/ RAID, off-site backup storage

17
New cards

Internet

A worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals

18
New cards

ARPANET's two main goals

Allow scientists at different physical locations to share information and work together
Function even if part of the network were disabled or destroyed by a disaster

19
New cards

Two ways to connect to the internet:

Wired connections, a computer or device physically attaches via a cable or wire to a communications device
Computers without a communications device can use a wireless modem hooked to USB port using a cellular connection

20
New cards

Three ways we make up a wired connection

Cabe Internet service
DSL (digital subscriber line)
Fiber to the Premises (FTTP)

21
New cards

Four ways to make up a wireless connection

Wi-Fi (wireless fidelity)
Mobile Broadband
Fixed Wireless
Satellite Internet Service

22
New cards

CybercafƩ

A location that provides computers with Internet access, usually for a fee.

23
New cards

Hotspot

A wireless network that provides Internet connections to mobile computers and devices

24
New cards

Internet service provider (ISP)

is a business that provides individuals and organizations access to the Internet free or for a fee

25
New cards

Bandwidth

Represent the amount of data that travels over a network. A cable connection usually has a higher bandwidth than a wired bandwidth. AT&T provides a wired connection and Charter or Spectrum or Comcast provide a cable connection.

26
New cards

IP address

A sequence of numbers that uniquely identifies each computer or device connected to the Internet

27
New cards

Domain Name

A text-based name that corresponds to the IP address

28
New cards

DNS Server

Translates the domain name into its associated IP address

29
New cards

Popular TLDs

.com
.edu
.gov
.mil
.net
.org

30
New cards

.com

commercial organizations, businesses, and companies

31
New cards

.edu

educational institutions

32
New cards

.mil

military organizations

33
New cards

.net

network providers or commercial companies

34
New cards

.org

nonprofit organizations

35
New cards

The World Wide Web

The collection of Web sites and the Internet is the wire and routers that connects us to the WWW

36
New cards

Website

A collection of related webpages and associated items

37
New cards

Web server

A computer that delivers requested webpages to your computer

38
New cards

Web 2.0

Refers to websites that provide a means for users to share personal information, allow users to modify website content, and provide applications through a browser

39
New cards

Browser

An application that enables users with an Internet connect to access and view webpages on a computer or mobile device

40
New cards

Home page

The first page that a website displays

41
New cards

http://

Hypertext Transfer Protocol

42
New cards

www.

host name

43
New cards

nps.gov

domain name example

44
New cards

/history

path

45
New cards

/places.htm

webpage name

46
New cards

Search engine

A software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic

47
New cards

Subject directory

Classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories

48
New cards

a graphic

A digital representation of data and information, designed to communicate quickly, simplify complex concepts, or present patterns or trends

49
New cards

Email

The transmission of messages and files via a computer network

50
New cards

Email program

Allows you to create, send, receive, forward, store, print, and delete email messages

51
New cards

Email List

A group of email addresses used for mass distribution of a message

52
New cards

Instant messaging

Real-time Internet communications service

53
New cards

Discussion Forum

An online area in which users have written discussions about a particular subject

54
New cards

VoIP

voice over internet protocol

55
New cards

FTP (File Transfer Protocol)

An Internet standard that permits file uploading and downloading to an from other computers on the Internet. Many operating system include FTP capabilities. An FT server is a computer that allows users to upload and/or download files using FTP.

56
New cards

Netiquette

the code of acceptable internet behavior

57
New cards

Three Functions of ISP

Provides you with an internet address, serves as a gateway to the internet, pays for your access service

58
New cards

Three ways you connect to the internet

Digital subscriber line (DSL), Cable Modem, and Wi-Fi

59
New cards

5 levels of protocol from the client to the internet

Computer to wireless or Ethernet switch, switch to modem, modem to ISP internet protocol, over the internet transmission control protocol, internet application level protocol HTTP (HyperText Transport Protocol) or SMTP (Simple Mail Transfer Protocol) or FTP (File Transfer Protocol)

60
New cards

IP address

Identifies a particular device on the internet. IP addresses can be on the public internet or private intranet

61
New cards

Uniform Resources Locator (URL)

An address on the internet, consists of the protocol (HTTP://) followed by the domain name (Google.com)

62
New cards

VPN

Virtual private network creats the appearance of a private point to point connection

63
New cards

LAN

Local area network is a network consisting of a series of clients connected through a router wifi/ router to a server in clsoe proximity to the clients

64
New cards

WAN

Wide area networks, designed to support networking separated over miles apart. The internet is the connectors and routers and servers that connect you the World Wide Web

65
New cards

Conducting a Risk Assessment

Identify all known risks Identify impact Assessment likelihood of risk Determine mitigation plan

66
New cards

Vulnerabilities that put IS systems at risk

Electronic intrusions (Hacking, Viruses, Adware, Trojans)
Electronic theft of data (stolen passwords, unprotected system access)
Human Error (software vulnerabilities)
Employee theft (Fraud, embezzlement)
Hardware failures (failure to backup and protect data, system server loss)
Computer Crime (Pretexting, Phishing, Spoofing, Sniffing)
Programming Errors (faulty code that generates accounting errors)

67
New cards

Database Applications

Forms, Reports, Queries, Application programs database Management System (DBMS)Database

68
New cards

DBMS

• a program used to create, process, and administer a database.
• a licensed product.
• different from a database (a database is a collection of tables, relationships and the metadata (description of the data elements))

69
New cards

Examples of DBMS

DB2, IBM, Access, Microsoft, SQL Server, Oracle, MySQL, Open Source

70
New cards

Functions of DBMS

• Create tables, relationships and other structures (see metadata contents)
• Process the database (read, insert, modify or delete data)
• Uses SQL to perform these operations
• Administration of database
• Security
• Permission
• Backup/ Recovery

71
New cards

Functions Performed by the Application Programs

• Process the database
• Forms can be used for data entry
• Reports are produced from contents
• Queries are used to access
• Allow access over the internet
• Facilitate multi-user access to the database

72
New cards

Types of DBMS

• Enterprise DBMS process large organizational or workgroup databases.
• Supports thousands of user and many different database applications 24/7.
• Examples are DB2, SQLServer, and Oracle
• Personal DBMS are designed for smaller simpler database applications.
• Examples are Access• Supports fewer than 100 and usually single users

73
New cards

Entity Relationship Model

• Entity (Filename) is something the user wants to track
• Entities are always singular (Order not Orders)
• Entities have attributes that describe characteristics of the entity. (Order_Number)
• An Order record (one row on the file or table) contains one or more Attributes (columns )
• An Identifier (also called a key) is an attribute that is associated with one and only one entity ( Order_Number is unique identifier for an order).

74
New cards

Relationship

• Entities (Files)have Relationships to each other
• Student Entity has a relationship with Finance and with Advisor and with Grades
• There should be one Advisor for many Students and potentially one Student for many Finance records
.• Crows Feet show multiple relationships
• Cardinality is a term used to describe the relationships (many = maximum Cardinality)