View
221
Download
3
Tags:
Embed Size (px)
Citation preview
1
Review Exercise
BUS3500 - Abdou Illia, Fall 2006
This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final,
students need to study according to the Review For Final Guide document available in the
Review section of the course web site
2
Computer Hardware Technologies
Which of the following could be used as an input device as well as an output device?
a) Stylusb) Monitorc) Printerd) Hard diske) Floppy diskf) Magnetic Ink Character Recognition (MICR) readerg) Random access memoryh) Read only memory
3
Computer Hardware Technologies
How many bits are there in a byte?a) About 1000b) 8c) About 1000000d) None of the above
What is the difference between pixel and dot pitch?
4
Computer Hardware Technologies
Which of the following is true about the instruction control unit?
a) It generates the time that synchronizes other components
b) It stores control information, data, intermediate results
c) It fetches instructions from RAM during program execution
d) None of the above
5
Software technologies Which of the following is not a type of
systems software?a) Spreadsheet programb) Internet Explorerc) Language translatord) Utility program
What is meant by multiprogramming and multitasking?
6
Software technologies Which of the following is true about
systems software and application software?
a) Systems software allow users to accomplish specific tasks
b) Application software are responsible for starting the computer and providing user interface
c) All of the aboved) Neither a nor b
7
Network technologies
Which of the following is not considered a type of protocol?
a) TCP/IPb) Client/serverc) Topologyd) Ethernet
8
Network technologies
In which of the following type of network, collisions could not occur?
a) Ethernetb) Token ringc) Wide area networkd) None of the above
What is a node?
9
Network technologies
Which of the following types of switching technique is, traditionally, used in voice networks?
a) Packet switchingb) Circuit switchingc) Virtual switchingd) None of the above
10
Network technologies
What type of transmission media are usually used for standard telephone line?
a) Fiber optic cableb) Coaxial cablec) Twisted pair cabled) None of the above
What do 10Base2 and 100BaseTX refer to?
11
Managing Dev. & Purchase of IS
In this type of system implementation, a company installs the new system at only one location or one department?
a) Direct cutoverb) Parallel conversionc) Staged conversiond) Pilot Testinge) None of the above
12
Managing Dev. & Purchase of IS
In which of the following types of testing the new system is run in a simulated environment with simulated data?
a) Stub testingb) Validation testingc) Unit testingd) Verification testing
13
Managing securityFirewalls could be used to protect a network against tear drop attacks
T F
Ping of death is a kind of DoS attack T F
A cracker is an intruder who breaks into a system in order to learn about it
T F
Security education programs are not key components of Information Security Plans
T F
You could become a victim of content attacks while navigating the web
T F
14
15
Central Processing Unit
Clock: generates time that synchronizes other components
ICU: Fetches instructions from RAM
ALU: Execute instructions (arithmetic & logic operations)
Registers: Store control information, data, intermediate results
Processor
Clock
Instruction Control Unit
Arithmetic Logic Unit
Registers
16
17
Implementation Implementation strategies
Direct cutover: Quick change to new system
Parallel conversion: Old and new systems used in parallel for a while.
Pilot testing: New system installed at only one location or one department for testing.
Staged conversion: Only one part of the system installed, then another part is installed.
18
Testing Programmers test modules
Do they return proper outputs? Do they handle incorrect inputs appropriately?
Development team tests how modules work together – unit testing
System testing (software along with database and network component)
Verification: Testing system in simulated environment with simulated data
Validation: Testing system in real working environment with real data
19
Decision Support Systems Designed to help individual
managers make decisions Major components
Data management subsystem Internal and external data sources
Model management subsystem Typically mathematical in nature
User interface How the people interact with the DSS Data visualization is the key
Text Graphs Charts
UserInterface
Model Management- Sensitivity Analysis -> What-if Analysis -> Goal-seeking Analysis
Data Management
- Transactional Data- Data warehouse- Business partners data- Economic data
20
Tear Drop DoS Sending a stream of request messages to the
target
Making the target run very slowly or crash
Objective is to have the target deny service to legitimate users
DoS requests
Server Attacker
http://www.netscantools.com/nstpro_netscanner.html
Legitimate user
Legitimate user
Legitimate request
Legitimate request
21
Ping of Death attacks Take advantage of
Some operating systems inability to handle packets larger than 65 536 bytes
Attacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets)
Most operating systems have been fixed to prevent this type of attack from occurring, but still occurring.