ISM Ch. 6,8,9,12 – Flashcards

Unlock all answers in this set

Unlock answers
question
What is the term used to describe the first three returns in a search?
answer
Snippet
question
What is the law that tells you what you can store and how long you can store it?
answer
Sarbanes Oxley
question
What is the port for just sending mail packets?
answer
SMPT
question
What is a firewall
answer
It consists of software and hardware protection against invasion via the Internet.
question
What is a router?
answer
Connect two or more network
question
What is a switch?
answer
Device used to open or close the current path of one or more circuits.
question
What is a hub?
answer
The device used to link several computers together
question
What is a honeypot?
answer
Fake sites for criminals to attack
question
Term used to describe an attack on a computer by sending a malicious ping...that can cause a network to crash
answer
ping of death
question
What are the SMART objectives?
answer
Specific, Measurable, Achievable, Realistic, Timely
question
How do you create color on HTML?
answer
CSS (cascading style)
question
What is a LAN?
answer
Local Area Network
question
What is a WAN?
answer
Wide Area Network - Nodes connected over long distances (multi-building campus, office branches)
question
What is a MAN?
answer
Metropolitan Area Network- network across the city
question
What is a SAN?
answer
...
question
What is data mining?
answer
Data mining is looking for hidden patterns in a database to predict future behaviour and identify business opportunities
question
What is a fake antivirus?
answer
Way to get you to download bad software
question
What is a query?
answer
Allows you to ask for data and it retrieves it
question
What is supervised data mining?
answer
Data miners develop a model prior to the analysis, Data miners develop a model prior to the analysis
question
What is unsupervised data mining?
answer
A form of mining where the analysts do not create a model or hypothesis, a. A form of mining where the analysts do not create a model or hypothesis
question
What is a software mashup? An example?
answer
An application, tool, widget, or resource that blends data from more than one source. Pandora is a mashup.
question
Why would a company choose cloud service over in house?
answer
1. Less expensive 2. Allows the firm to focus on its core businesses 3. Enables the firm to provide better services 4. The firm can align itself with "best in world" suppliers to focus on performing a special task 5. Allows flexibility should customer needs shift unexpectedly. 6. Firm can concentrate on other internal value chain activities critical to sustaining competitive advantage.
question
When reviewing or requesting a web page...what is the protocol required to upload files to a web server?
answer
FileTransferProtocol
question
What are packets?
answer
How data gets transmitted
question
What is sniffing?
answer
intercepting computer communications. with wired networks, sniffing requires a physical connection. with wireless networks, no physical connection is required.
question
What is a VPN?
answer
Private network that uses a public network to connect remote sites or users together
question
What is peer to peer networking?
answer
the downloading of a computer file to a user's computer, using software, which then allows that user to make the file available to other users or "peers."
question
What is a sitemap?
answer
Gives the hierarchy of the webpage
question
What is phishing?
answer
Pretending to be another legitimate website in order to steal information
question
What is spear phishing?
answer
targeting a specific individual with email that appears to come from a trusted source
question
What is the term used to describe people preventing others from accessing a network?
answer
Denial of service
question
What is SQL injection?
answer
is a code injection that exploits a security vulnerability in the database layer of applic.
question
What are the 3 different types of services with cloud computing?
answer
Software service, Infrastructure service, platform service
question
What is the term used to bring a bunch of people together to create or change a product design?
answer
Crowd sourcing
question
What is a virus
answer
...
question
What is a worm
answer
a type of virus that propagates using the Internet or other computer networks.
question
What are phishing attacks?
answer
...
question
What are trojans?
answer
viruses that masquerade as useful programs or files.
question
What is adware?
answer
any software package which automatically renders advertisements. These advertisements can be in the form of a pop-up.
question
what monster database connects all functional areas?
answer
enterprise system/resource planning
question
What is term used to describe when your target is either: prospect, customer,advocate
answer
persona
question
________ is a term that refers to the level of detail represented by the data.
answer
Granularity
question
An OLAP report has measures and dimensions. Which of the following is an example of a dimension?
answer
Sales region
question
What is an example of a measure in an OLAP report
answer
average cost
question
________ attempt to directly capture employee expertise.
answer
Expert systems
question
Which of the following accurately defines a dimension in an OLAP report?
answer
It is a characteristic of a measure.
question
What is data acquisition?
answer
the process of obtaining, cleaning, organizing, relating, and cataloging source data.
question
In a locked room, maintaining the computers of an organization that run the DBMS is a part of ________.
answer
physical security procedures
question
Which of the following is a critical security function of senior management?
answer
establishing the security policy and managing risk
question
What is a hot site?
answer
a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a natural disaster and/or computer or equipment failure.
question
What is hacking?
answer
when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
question
What does hardening a site mean?
answer
to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system, and eliminating operating systems features and functions that are not required by the application
question
What is uncertainty?
answer
things we do not know
question
What is risk?
answer
the likelihood of an adverse occurrence.
question
What is symmetric encryption?
answer
the sender and receiver transmit a message using the same key.
question
What are cookies?
answer
small files that your browser stores on your computer when you visit Web sites and enable you to access Web sites without having to sign in every time.
question
What is payload?
answer
A virus is a computer program that replicates itself. The program code that causes unwanted activity
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New