MIS Exam 2

Card Set Information

MIS Exam 2
2011-10-06 12:07:26

Chapters 4, 5, 6
Show Answers:

  1. NIC
    Network Interface Card

    A hardware component on each device on a network that connects the device's circuitry to the communications line.
  2. WAN
    Wide Area Network

    A network that connects computers located at different geographic locations.
  3. ACL
    Access Control List

    A list that encodes the rules stating which packets are to be allowed through a firewall and which are to be prohibited.
  4. ADSL
    Asymmetric Digital Subscriber Lines

    DSL lines that have different upload and download speeds.
  5. ATM
    Asynchronous Transfer Mode

    A protocol that divides data into uniformly sized cells, eliminated the need for protocol conversion, and can process speeds from 1 to 156 Mbps. ATM can support both voice and data communication.
  6. EVDO
    A WAN wireless protocol standard.
  7. HSDPA
    A WAN wireless protocol standard.
  8. HTTPS
    An indication that a Web browser is using the SSL/TLS protocol to ensure secure communications.
  9. ISP
    Internet Service Provider
  10. MAC address
    Media Access Control address

    A unique, permanent address address given to each network interface card (NIC) at the factory. Enables the device to access the network via a Level-2 protocol.
  11. POP
    Point of Presence

    The location at which a line connects to a PSDN (public switched data network) network. Think of the POP as the phone number you dial to connect to the PSDN.
  12. PSDN
    Public Swtiched Data Network

    A WAN connection alternative. A network of computers and leased lines is developed and maintained by a vendor that leases time on the network to other organizations.
  13. SSL
    Secure Socket Layer

    A protocol that uses both asymmetric and symmetric encryption. The most recent version of SSI is called TLS.
  14. SDSL
    Symmetrical digital subscriber lines

    DSL lines that have the same upload and download speeds.
  15. TLS
    Transport Layer Security

    A protocol, using both asymmetric and symmetric encryption that works between Levels 4 (transport) and 5 (application) of the TCP-OSI protocol architecture. TLS is the new name for a later version of SSL.
  16. UTP Cable
    Unshielded Twisted Pair Cable

    A type of cable used to connect devices on a lan. A device called an RJ-45 connector is used to connect the UTP cable into NIC devices.
  17. VPN
    Virtual Private Network

    A WAN connection alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections.
  18. WNIC
    Wireless Network Interface Card

    Enables wireless networks by communicating with wireless access points. WNICs operate according to the 802.11 protocol.
  19. AP
    Access Point

    A point in a wireless network that facillitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks.
  20. Wireless devices connect to a wireless LAN using a(n):
    Access Point
  21. What is an access device that connects each site to the transmission lines?
  22. What is the dominant WLAN standard today?
    IEEE 802.11g
  23. What is a special version of asymmetric encryption that is popular on the Internet?
    public key/private key
  24. Communications speeds are measured in:
  25. What do HTTPS and SSL/TLS utilize?
    A combination of public key/private key and symmetric encryption.
  26. What is the world's most popular protocol for LANs?
    IEEE 802.3
  27. What are computers and printers on a LAN connected to in order to communicate and transmit messages on the LAN?
    A switch
  28. What is SQL?
    A query language. It stands for Structured Query Language. It is an international standard language for processing database data.
  29. A collection of similar records is a:
  30. When can data integrity problems occur?
    When data are duplicated.
  31. An entity has a unique attribute which is known as the:
  32. DBMS
    Database Management Systems

    A program for creating, processing, and administering a database. Ex: Access, Oracle
  33. How do designers represent relationships when transforming a data model into a database design?
    By using foreign keys.
  34. UML
    Unifed Modeling Language

    A series of diagramming techniques that facilitates OOP development.
  35. Constraints on the number of entities are called:
    minimum cardinalities.
  36. What is the term for the maximum number of entities that can be involved in a relationship?
    Maximum Cardinality.
  37. Data in the CPU is processed in the form of:
  38. DB2
    A popular, enterprise-class DBMS product from IBM.
  39. MySQL
    A popular open source DBMS product that is license-free for most applications.
  40. SQL Server
    A popular enterprise-class DBMS product from Microsoft.
  41. OS
    Operating System

    A computer program that controls the computer's resources.
  42. What are the 4 major operating systems?
    • 1. Windows
    • 2. Mac OS
    • 3. Unix
    • 4. Linus
  43. What is the means by which the CPU reads instructions and data from main memory and writes data to main memory?
  44. CPU
    Central Processing Unit

    The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.
  45. What is a cloud?
    The computing network on the Internet
  46. What is firmware?
    Computer software that is installed into devices such as printers, print services, and various types of communication devices.
  47. GNU
    A set of tools for creating and managing open source software.
  48. What is one of the standard license agreements for open source software?
    GNU General Public License (GPL) Agreement
  49. What is the term for data that will be lost when the computer or device is not powered?
    Volatile memory
  50. Kilobyte (K): 1,024 bytes
    Megabyte (MB): 1,024 K
    Gigabyte (GB): 1.024 MB
    Terabyte (TB) 1,024 GB
    • Mnemonic:
    • Kill My Geography Teacher
  51. What is an application that requires support beyond a browser on the user's computer known as?
    Thick Client
  52. What is the most common type of memory device?
    Magnetic disk.
  53. Who developed Linux?
    An open source community.
  54. Give an example of operational costs for:
    • Hardware: Hardware Maintenance Fees
    • Software: Software Maint. and support fees &costs
    • Data: Data acquisition costs
    • Procedures: Procedure maintenance costs
    • People: Labor Costs of using system.
  55. Give an example of development costs for:
    • Hardware: Hardware purchases
    • Software: Software licenses
    • Data: Data conversion costs
    • Procedures: Design, development, and documentation
    • People: Initial training costs