ISOM 210 EXAM 2
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?
A hacker floods a Web server with so many requests that it becomes unavailable to intended users
According to the information presented in this video, which of the following is NOT an operating system software?
Microsoft Office
As Zero-Bit and One-Bit explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.
Modem
According to this video, Linux is an example of __________.
Open-Source Software
In this video, One Bit describes _______, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.
Packet Switching
According to information provided in this video, any business with an online presence is at risk of all of the following EXCEPT ________.
Poor Customer Service
In this video, Agent Macey explains how a _______ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.
Spoofer
CH5 Homework
According to the Open Source software video, "upstream" means the process of incorporating a change or patch into the original code in an open source software development because it's flowing back to the original source.
Ch 8 Homework
According to the last video watched in class, eight different ways of how Liz's data is being gathered/tracked are: Third party advertising and marketing firms track Liz's online behavior using cookies. Google knows where Liz is going through her use of google maps, tracking her location. License-plate scanners photographing Liz's vehicle and recording the location, date and time. Cell phone care provider Verizon records Liz's movements and includes her location in a bundle of customer information that it sells to data brokers. At the mall, the shopping center tracks her cell phone Wi-Fi signal to see which store she enters When Liz walks into a boutique, cameras with facial recognition software take her picture and may store it for years, the cameras are also equipped with software that tracks how long Liz has spent in each aisle. When Liz purchases a bathing suit the store may share information about the purchase with data brokers Drug store rewards programs track Liz's prescriptions and shares information with marketers about her purchases Law enforcement can use a subpoena to gain access to her personal life, who she has called and who has called her, location data from her cell phone records Liz's IP address can be used by the government to find Liz's name or visa versa and see which sites she has visited.
As explained in this video, an inventory management program is an example of ________.
Application Software
According to the information in this video, computers represent data using ________.
Bits
According to the information in this video, the telephone system is an example of a _______ network.
Circuit-Switched
As the two characters describe in this video, all of the following are a function of operating systems software except _____.
Creating a presentation
According to Agent Macey, the single largest threat to the internet is __________.
Denial-of-Service Attack
MP5
The most interesting thing I learned during class was that out of the 5 IT Infrastructure Components: Hardware, Software, Data Management, Networking and Services the most common components are hardware and software.
MP6
The most interesting thing I learned in class is that there are two major types of databases: Relational Database and Non-Relational Database. I also learned that Relational Database is the most common type of database and organizes data into two-dimensional tables which are the relations with columns and rows.
MP8
The most interesting thing I learned in class today is that the main reasons why systems are vulnerable include: Electronic Storage, Hardware Problems, Software Problems, Partnering with Another Company, and Loss & Theft of Portable Devices.
MP7
The most interesting thing I learned in class today is that the three major components in a simple network are: Client and Server Computers, Network Operating System (NOS), and Hubs, Switches, Routers.