Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

bridge

a device that connects two LANs or two segments of the same LAN

cypercrimes

creating viruses to disrupting computer networks

wireless networks

use radio signals that travel through the air to transmit data

repreater

used to prevent attenuation when packets are traveling long distances

office automation system

uses computers and/or networks to preform various office-related operations, such as word processing, accounting, document management or communication

risk assessment

where you identify and examine possible threats

Wi-Fi

802.11

router

a complex device that stores the routing information for networks; determines the best route for packets

information system (IS)

a complex system for acquiring, storing, organizing, using, and sharing data and information

gateway

a node on a network that serves as an entrance to another network

Trojan Horse

a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system

management information system (MIS)

a set of software tools that enables managers to gather, organize and evaluate information

Decision Support System (DDS)

a special application that collects and reports certain types of data

redundant array of independent disks (RAID)

a storage system that links any number of disk drives (a disk array) so that they act as a single disk

expert system

a type of information system that performs analytical tasks traditionally done by a human

virus

a type of malware that's attached to a hose file and has the ability to replicate, or copy, itself

worm

a typoe of malware that self-replicates and spreads through computers and networks

vulnerability

a weakness that has not been protected against threats

fault-tolerant computers

able to continue their operation even when problems are present

network

allows users to communicate and share info. b/w computers and various devices

cyberterrorism

an attack that seeks to create large-scale chaos and damage a country's infrastructure

data warehouse

an enormous digital warehouse that contains data gathered from multiple databases

surge protector (or surge processor)

an inexpensive product that guards connected equipment against large power spikes or surges

countermeasure

any step you take to ward off a threat

threat

anything that can cause harm

extranet

can be used to share some of a company's intranet resources with people outside the organization

passive DDS

collects and displays data in the format requested

active DDS

collects data but also makes recommendations as to the best decison

node

connection point; the network used the media to carry data from one to another

coaxial cable

consists of a single copper wire that's surrounded by insulation and a wire mesh shield, all inside a plastic sheath

fiber-optic cable

consists of a thin strand of glass that transmits pulsating beams of light rather than electric current

twisted-pair cable

consists of four pairs of wires that are twisted around each other; all wires are collectively bound together in a layer of plastic that you would refer to as the network cable

uninterruptible power supply (UPS)

contains a battery; can keep a system on in the even of a power failure

local area network (LAN)

data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media

packets

data moves through networks in structures known as this, which are pieces of a message broken down into small unites by the sending device and reassembled by the receiving device

spyware

designed to report activity on your computer to another party

hacktivism

has a social or political agenda behind it

redundant computers

have multiple hardware systems performing the same task at the same time to protect against the failure of one system

transaction processing system (TPS)

info. system that handles the processing and tracking of transactions

wireless adaptar

most desktop computers require an internal or external one of these to connect to a WAp

ethernet

most widely-used standard for local area networks -fastest can reach 100 Mbps

wireless access point (WAP)

needed to create a wireless LAN; all nodes connect to the device

intranet

organizations that offer an internal version of the internet, which contains only the company's private information

power fluctuations

power levels that rise and fall can produces unpredictable behavior in or cause damage to sensitive computer components

hub

provides multiple ports for connecting nodes

hacker

refers to an individual who uses a computer and/or network to commit a variety of crimes

malware

refers to several types of malicious computer programs that are created to harm computer systems and their users

protocols

rules of communication that ensure packets are sent, received and interpreted properly 1. header- contains info. needed by network 2. payload - contains the actual data being transmitted

switch

similar to a hub, but it's aware of the exact address or identity of all the nodes attached to it

mission-critical

some info. systems are called this b/c they must run without failure or with nearly instant recovery failture

bandwidth

speed; the amount of data that can be transmitted over a given amount of time (measured in megabits/sec or gigabits/sec)

interoperability

the ability of each organization's information system to work with the other, sharing both data and services

scalability

the capacity to provide increasing amounts of computing power, storage and/or software

power failure

the complete loss of power can result in the loss of unsaved work or the interruption of an important business function

wide area network (WAN)

the connection of two or more central computers or LANs, generally across a wide geographical area

network interface card (NIC)

the device at each node that preforms translation an transmissions

data mining

the discovery of new patterns of relationships b/w data

topology

the logical layout of the cables and devices that connect the nodes of the network

attenuation

the loss of intensity and clarity of the data signal being transmitted; affected by distance

network media

the means used to link parts of a computer network

data validation

the process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered

scareware (or ransomware)

tricks users into following a theif's orders, malware usually tries to remain hidden from users so that they can do its damage for as long as possible


Set pelajaran terkait

Lewis Medical Surgical- Renal (46)

View Set

Logical Fallacies without examples

View Set

Intermediate Accounting Test 2 chapter 5

View Set