DOC PREVIEW
EIU BUS 3500 - BUS 3500 Review Exercise

This preview shows page 1-2-20-21 out of 21 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Review ExerciseComputer Hardware TechnologiesSlide 3Slide 4Software technologiesSlide 6Network technologiesSlide 8Slide 9Slide 10Managing Dev. & Purchase of ISSlide 12Managing securitySlide 14Central Processing UnitSlide 16ImplementationTestingDecision Support SystemsTear Drop DoSPing of Death attacks1Review ExerciseBUS3500 - Abdou Illia, Fall 2006This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final, students need to study according to the Review For Final Guide document available in the Review section of the course web site2Computer Hardware TechnologiesWhich of the following could be used as an input device as well as an output device?a) Stylusb) Monitorc) Printerd) Hard diske) Floppy diskf) Magnetic Ink Character Recognition (MICR) readerg) Random access memoryh) Read only memory3Computer Hardware TechnologiesHow many bits are there in a byte?a) About 1000b) 8c) About 1000000d) None of the aboveWhat is the difference between pixel and dot pitch?4Computer Hardware TechnologiesWhich of the following is true about the instruction control unit?a) It generates the time that synchronizes other componentsb) It stores control information, data, intermediate resultsc) It fetches instructions from RAM during program executiond) None of the above5Software technologiesWhich of the following is not a type of systems software?a) Spreadsheet programb) Internet Explorerc) Language translatord) Utility programWhat is meant by multiprogramming and multitasking?6Software technologiesWhich of the following is true about systems software and application software?a) Systems software allow users to accomplish specific tasksb) Application software are responsible for starting the computer and providing user interface c) All of the aboved) Neither a nor b7Network technologiesWhich of the following is not considered a type of protocol?a) TCP/IPb) Client/serverc) Topologyd) Ethernet8Network technologiesIn which of the following type of network, collisions could not occur?a) Ethernetb) Token ringc) Wide area networkd) None of the aboveWhat is a node?9Network technologiesWhich of the following types of switching technique is, traditionally, used in voice networks?a) Packet switchingb) Circuit switchingc) Virtual switchingd) None of the above10Network technologiesWhat type of transmission media are usually used for standard telephone line?a) Fiber optic cableb) Coaxial cablec) Twisted pair cabled) None of the aboveWhat do 10Base2 and 100BaseTX refer to?11Managing Dev. & Purchase of ISIn this type of system implementation, a company installs the new system at only one location or one department?a) Direct cutoverb) Parallel conversionc) Staged conversiond) Pilot Testinge) None of the above12Managing Dev. & Purchase of ISIn which of the following types of testing the new system is run in a simulated environment with simulated data?a) Stub testingb) Validation testingc) Unit testingd) Verification testing13Managing securityFirewalls could be used to protect a network against tear drop attacksT FPing of death is a kind of DoS attack T FA cracker is an intruder who breaks into a system in order to learn about itT FSecurity education programs are not key components of Information Security PlansT FYou could become a victim of content attacks while navigating the webT F1415Central Processing UnitClock: generates time that synchronizes other componentsICU: Fetches instructions from RAMALU: Execute instructions (arithmetic & logic operations)Registers: Store control information, data, intermediate resultsProcessorClockInstruction Control UnitArithmetic Logic UnitRegisters1617ImplementationImplementation strategiesDirect cutover: Quick change to new systemParallel conversion: Old and new systems used in parallel for a while.Pilot testing: New system installed at only one location or one department for testing.Staged conversion: Only one part of the system installed, then another part is installed.18TestingProgrammers test modules Do they return proper outputs?Do they handle incorrect inputs appropriately?Development team tests how modules work together – un i t testingSystem testing (software along with database and network component)Verification: Testing system in simulated environment with simulated dataValidation: Testing system in real working environment with real data19Decision Support SystemsDesigned to help individual managers make decisionsMajor componentsData management subsystemInternal and external data sourcesModel management subsystemTypically mathematical in natureUser interfaceHow the people interact with the DSSData visualization is the keyTextGraphsChartsUserInterfaceModel Management- Sensitivity Analysis -> What-if Analysis -> Goal-seeking AnalysisData Management- Transactional Data- Data warehouse- Business partners data- Economic data20Tear Drop DoSSending a stream of request messages to the targetMaking the target run very slowly or crashObjective is to have the target deny service to legitimate usersDoS requestsServerAttackerhttp://www.netscantools.com/nstpro_netscanner.htmlLegitimate userLegitimate userLegitimate requestLegitimate request21Ping of Death attacksTake advantage ofSome operating systems inability to handle packets larger than 65 536 bytesAttacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets)Most operating systems have been fixed to prevent this type of attack from occurring, but still


View Full Document

EIU BUS 3500 - BUS 3500 Review Exercise

Documents in this Course
Load more
Download BUS 3500 Review Exercise
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view BUS 3500 Review Exercise and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view BUS 3500 Review Exercise 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?