ISOM 210 EXAM 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Based on the information provided in this video, which of the following usually happens in a denial-of-service attack?

A hacker floods a Web server with so many requests that it becomes unavailable to intended users

According to the information presented in this video, which of the following is NOT an operating system software?

Microsoft Office

As Zero-Bit and One-Bit explain in this​ video, a​ _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line.

Modem

According to this video, Linux is an example of __________.

Open-Source Software

In this video, One Bit describes _______, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination.

Packet Switching

According to information provided in this video, any business with an online presence is at risk of all of the following EXCEPT ________.

Poor Customer Service

In this video, Agent Macey explains how a _______ pretends to be a legitimate company and sends emails requesting users to update their confidential information such as passwords or account numbers.

Spoofer

CH5 Homework

According to the Open Source software video, "upstream" means the process of incorporating a change or patch into the original code in an open source software development because it's flowing back to the original source.

Ch 8 Homework

According to the last video watched in class, eight different ways of how Liz's data is being gathered/tracked are: Third party advertising and marketing firms track Liz's online behavior using cookies. Google knows where Liz is going through her use of google maps, tracking her location. License-plate scanners photographing Liz's vehicle and recording the location, date and time. Cell phone care provider Verizon records Liz's movements and includes her location in a bundle of customer information that it sells to data brokers. At the mall, the shopping center tracks her cell phone Wi-Fi signal to see which store she enters When Liz walks into a boutique, cameras with facial recognition software take her picture and may store it for years, the cameras are also equipped with software that tracks how long Liz has spent in each aisle. When Liz purchases a bathing suit the store may share information about the purchase with data brokers Drug store rewards programs track Liz's prescriptions and shares information with marketers about her purchases Law enforcement can use a subpoena to gain access to her personal life, who she has called and who has called her, location data from her cell phone records Liz's IP address can be used by the government to find Liz's name or visa versa and see which sites she has visited.

As explained in this video, an inventory management program is an example of ________.

Application Software

According to the information in this video, computers represent data using ________.

Bits

According to the information in this video, the telephone system is an example of a _______ network.

Circuit-Switched

As the two characters describe in this​ video, all of the following are a function of operating systems software except​ _____.

Creating a presentation

According to Agent Macey, the single largest threat to the internet is __________.

Denial-of-Service Attack

MP5

The most interesting thing I learned during class was that out of the 5 IT Infrastructure Components: Hardware, Software, Data Management, Networking and Services the most common components are hardware and software.

MP6

The most interesting thing I learned in class is that there are two major types of databases: Relational Database and Non-Relational Database. I also learned that Relational Database is the most common type of database and organizes data into two-dimensional tables which are the relations with columns and rows.

MP8

The most interesting thing I learned in class today is that the main reasons why systems are vulnerable include: Electronic Storage, Hardware Problems, Software Problems, Partnering with Another Company, and Loss & Theft of Portable Devices.

MP7

The most interesting thing I learned in class today is that the three major components in a simple network are: Client and Server Computers, Network Operating System (NOS), and Hubs, Switches, Routers.


Kaugnay na mga set ng pag-aaral

States of Consciousness Assignment

View Set

ACC Ethics - Chapter 5 Questions

View Set

Integumentary System Career Specialties

View Set

Statistics: Unit 5 Lesson 2 Topic 1 Practice

View Set

Exam 4 Ch. 11, 19 (evolve chapters: 27, 28, 29, 34)

View Set

Frequently Asked Questions Teacher Interview

View Set

PEDS Practice: Chapter 23: Nursing Care of the Child With an Alteration in Tissue Integrity/Integumentary Disorder

View Set