Review ExerciseComputer Hardware TechnologiesSlide 3Slide 4Software technologiesSlide 6Network technologiesSlide 8Slide 9Slide 10Managing Dev. & Purchase of ISSlide 12Managing securitySlide 14Central Processing UnitSlide 16ImplementationTestingDecision Support SystemsTear Drop DoSPing of Death attacks1Review ExerciseBUS3500 - Abdou Illia, Fall 2006This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final, students need to study according to the Review For Final Guide document available in the Review section of the course web site2Computer Hardware TechnologiesWhich of the following could be used as an input device as well as an output device?a) Stylusb) Monitorc) Printerd) Hard diske) Floppy diskf) Magnetic Ink Character Recognition (MICR) readerg) Random access memoryh) Read only memory3Computer Hardware TechnologiesHow many bits are there in a byte?a) About 1000b) 8c) About 1000000d) None of the aboveWhat is the difference between pixel and dot pitch?4Computer Hardware TechnologiesWhich of the following is true about the instruction control unit?a) It generates the time that synchronizes other componentsb) It stores control information, data, intermediate resultsc) It fetches instructions from RAM during program executiond) None of the above5Software technologiesWhich of the following is not a type of systems software?a) Spreadsheet programb) Internet Explorerc) Language translatord) Utility programWhat is meant by multiprogramming and multitasking?6Software technologiesWhich of the following is true about systems software and application software?a) Systems software allow users to accomplish specific tasksb) Application software are responsible for starting the computer and providing user interface c) All of the aboved) Neither a nor b7Network technologiesWhich of the following is not considered a type of protocol?a) TCP/IPb) Client/serverc) Topologyd) Ethernet8Network technologiesIn which of the following type of network, collisions could not occur?a) Ethernetb) Token ringc) Wide area networkd) None of the aboveWhat is a node?9Network technologiesWhich of the following types of switching technique is, traditionally, used in voice networks?a) Packet switchingb) Circuit switchingc) Virtual switchingd) None of the above10Network technologiesWhat type of transmission media are usually used for standard telephone line?a) Fiber optic cableb) Coaxial cablec) Twisted pair cabled) None of the aboveWhat do 10Base2 and 100BaseTX refer to?11Managing Dev. & Purchase of ISIn this type of system implementation, a company installs the new system at only one location or one department?a) Direct cutoverb) Parallel conversionc) Staged conversiond) Pilot Testinge) None of the above12Managing Dev. & Purchase of ISIn which of the following types of testing the new system is run in a simulated environment with simulated data?a) Stub testingb) Validation testingc) Unit testingd) Verification testing13Managing securityFirewalls could be used to protect a network against tear drop attacksT FPing of death is a kind of DoS attack T FA cracker is an intruder who breaks into a system in order to learn about itT FSecurity education programs are not key components of Information Security PlansT FYou could become a victim of content attacks while navigating the webT F1415Central Processing UnitClock: generates time that synchronizes other componentsICU: Fetches instructions from RAMALU: Execute instructions (arithmetic & logic operations)Registers: Store control information, data, intermediate resultsProcessorClockInstruction Control UnitArithmetic Logic UnitRegisters1617ImplementationImplementation strategiesDirect cutover: Quick change to new systemParallel conversion: Old and new systems used in parallel for a while.Pilot testing: New system installed at only one location or one department for testing.Staged conversion: Only one part of the system installed, then another part is installed.18TestingProgrammers test modules Do they return proper outputs?Do they handle incorrect inputs appropriately?Development team tests how modules work together – un i t testingSystem testing (software along with database and network component)Verification: Testing system in simulated environment with simulated dataValidation: Testing system in real working environment with real data19Decision Support SystemsDesigned to help individual managers make decisionsMajor componentsData management subsystemInternal and external data sourcesModel management subsystemTypically mathematical in natureUser interfaceHow the people interact with the DSSData visualization is the keyTextGraphsChartsUserInterfaceModel Management- Sensitivity Analysis -> What-if Analysis -> Goal-seeking AnalysisData Management- Transactional Data- Data warehouse- Business partners data- Economic data20Tear Drop DoSSending a stream of request messages to the targetMaking the target run very slowly or crashObjective is to have the target deny service to legitimate usersDoS requestsServerAttackerhttp://www.netscantools.com/nstpro_netscanner.htmlLegitimate userLegitimate userLegitimate requestLegitimate request21Ping of Death attacksTake advantage ofSome operating systems inability to handle packets larger than 65 536 bytesAttacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets)Most operating systems have been fixed to prevent this type of attack from occurring, but still
View Full Document