MIS 2113 Exam 4

0.0(0)
Studied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

Last updated 6:55 AM on 12/8/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards
any information sent from a(n) ___ device to a computer for processing
input
2
New cards
a set of instructions (program) executed by a computer to accomplish a specific task
process
3
New cards
anything that comes out of the computer (print, ___, display, view)
output
4
New cards
the ability to record and/or retain digital data
storage
5
New cards
examples: keyboard, mouse, bar code, scanner, touchpad, joystick
input
6
New cards
examples: hard disk, flash drive, ROM, CD/DVD, memory card, RAM
secondary storage
7
New cards
examples: Computer _____ing Unit (CPU)
processing (or process)
8
New cards
examples: monitor, printer, headphones, speakers, projector, web cam
output
9
New cards
User -> (Application -> Operating System) -> [Hardware] -> and back
the computer stack
(software)
10
New cards
computer housing?
the whole restaurant
11
New cards
motherboard houses and connects all the major computer components
kitchen
12
New cards
CPU executes instructions, pulling "ingredients" from various places in the "kitchen"
head chef
13
New cards
typical value of CPU speed for laptops is between:
2.3 GHz to 3.1 GHz
14
New cards
communications pathway that allow computer components to talk to each other
system bus; waiter
15
New cards
measured in MHz
the higher the speed, the faster your computer
speeds can reach from 88 Mhz to over 800 Mhz
system bus
16
New cards
relatively small and very fast
used for storing frequently used instructions on the CPU
cache; spice rack
17
New cards
the more ___ memory, the greater the cost
cache
18
New cards
it is the fastest to access but small (8 KB to 64 KB)
Level 1 cache memory
19
New cards
graded level 1, level 2, and level 3
cache memory
20
New cards
built between the CPU and RAM memory
Level 2 and Level 3 cache memory
21
New cards
is slower than level 1 but can have between 4 MB to 8MB
Level 2 cache memory
22
New cards
is slower than level 1 and level 2 but can have between 10 MB to 64 MB
Level 3 cache memory
23
New cards
holds the information that is currently being used in "recipes" (programs)
random access memory (RAM); refrigerator
24
New cards
- short term memory
- temporary storage space
- data and programs will be lost if you turn off the computer
- the newer the chip, the higher cost
Random Access Memory (RAM)
25
New cards
disk storage has lots of space - data will survive if power is cut
secondary storage; warehouse
26
New cards
- the slower, the cheaper/the faster, the more expensive
- spinning disk, solid state drive, flash storage
types of secondary storage
27
New cards
equal to 1 billion bytes of info
gigabyte
28
New cards
equal to 1 trillion bytes of info
terabyte
29
New cards
a single character of number requires:
1 byte
30
New cards
1 TB to 4 TB
hard disk (HDD)
31
New cards
256 GB to 2 TB
solid state drive (SSD)
32
New cards
usually built into the motherboard
network interface card (NIC)
33
New cards
example: ...
abbrev: b
size: 1 bit
bit
34
New cards
example: the letter f
abbrev: B
size: 8 bit
byte
35
New cards
example: a few paragraphs
abbrev: KB
size: 1000 bytes
kilobyte
36
New cards
example: small book
abbrev: MB
size: 1000 KB
megabyte
37
New cards
example: truck of books
abbrev: GB
size: 1000 MB
gigabyte
38
New cards
example: research library
abbrev: TB
size: 1000 GB
terabyte
39
New cards
example: all research libraries in the world
abbrev: PB
size: 1000 TB
petabyte
40
New cards
example: all words ever spoken by humans (5 EB)
abbrev: EB
size: 1000 PB
exabyte
41
New cards
examples:
Microsoft Windows
Apple macOS
Google Android OS
operating systems
42
New cards
examples:
productivity
games
Internet
email
applications software
43
New cards
prevention, protection, and restoration of computers, electronic communications systems, wire communications
including info contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation
cybersecurity
44
New cards
information security was later formalized by MIT research scientists
david clark and david wilson
45
New cards
examples:
confidentiality
integrity
availability
CIA Triad
46
New cards
Least Privilege
need-to-know basis
Three-step process:
- introduction
- authentication
- authorization
examples: FERPA and HIPPA
confidentiality
47
New cards
Makes sure that the information is not tampered with whenever it travels from its source to destination or even stored at rest
Should not be improperly modified
Methods:
- version control
- file permissions and user access control (UAC)
- data derived from another block of digital data for the purpose of detecting transmission errors
integrity
48
New cards
- makes sure that authorized people have access to information when and where it is rightly needed
- for example, hardware maintenance, software patching, network optimization
- system redundancy, failover, RAID, high-availability clusters
- dedicated hardware devices can be used to guard against downtime and unreachable data due to malicious distributed denial-of-service (DDoS)
availability
49
New cards
should you have access to the information?
CIA TRIAD: confidentiality
50
New cards
do I trust the data?
CIA TRIAD: integrity
51
New cards
am I able to access the data when I want?
CIA TRIAD: availability
52
New cards
student tries to change their test score online
CIA THREAT: integrity
53
New cards
- a virus takes down a corporation's internet service for all employees and customers
- a virus overheats your server resulting in the destruction of all organizational files
CIA THREAT: availability
54
New cards
- an employee is accidently given access (views) of confidential employee information
- your personal information is stolen and made available for sale on the black market
CIA THREAT: confidentiality
55
New cards
- social engineering
- (spear) phishing / SMiShing
- passwords
- "weakest link" of cybersecurity
target people
56
New cards
- zero day exploit
- distributed denial of service (DDOS)
- security flaw
target technology
57
New cards
- rules
- regulations
- policy
target process
58
New cards
questionable action through deception, often involving a breach of security that often times includes revealing confidential or private information or sending money
social engineering
59
New cards
type of cyberattack that uses email, phone, or text to entice individuals into providing personal or sensitive information, ranging from passwords to credit card info
phishing
60
New cards
- the process of converting human readable text (plaintext) into an incomprehensible text (ciphertext) using a cryptographic key
- data at rest (storage) and data in transit
encryption
61
New cards
a mathematical algorithm that is used to both encrypt data and decrypt to ensure data integrity and security
cryptographic key
62
New cards
- creates a "data tunnel" in which data can be transmitted or shared across a public network as if the two computers were directly connected in a private network
- hides your IP address by letting the network redirect it through a specially configured remote server run by its host
virtual private network (VPN)
63
New cards
small files that websites place on your computer that allow the website to remember your "selections" and "preferences"
cookies
64
New cards
which components of a computer are at its core and determine how good it is:
CPU, Cache, RAM
65
New cards
what is the fastest and cheapest way to make your computer faster?
increase RAM
66
New cards
when will your computer to store the excel file so that the CPU/processor can execute the operations you are requesting?
RAM
67
New cards
windows 10 is an example of a(n)
operating system
68
New cards
To ensure you have a proper password, which of the following rules should you follow?
- create a password 12-15 characters in length
- change your password frequently (every 3 months)
- keep it weird