1 Review Exercise BUS3500 - Abdou Illia, Fall 2006 This exercise covers some of the kind of questions students could expect in the final examination. To.

Slides:



Advertisements
Similar presentations
Components of a computer system
Advertisements

Computing in the Modern World
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Plug-in B3 HARDWARE & SOFTWARE.
System Construction and Implementation Objectives:
Khaled A. Al-Utaibi  Computers are Every Where  What is Computer Engineering?  Design Levels  Computer Engineering Fields  What.
Chapter 21 Successfully Implementing The Information System
Using Computers CS French Chapter 1.
1 Review For Exam 3 (Part 1) BUS Abdou Illia, Fall 2010.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Data Communications and Computer Networks
Office 2003 Introductory Concepts and Techniques M i c r o s o f t CPTG104 Intro to Information Systems Dr. Hwang Essential Introduction to Computers.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer Networks & Security
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Operating System Organization
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Review 5 Chapters 13, 14. What is software? Set of instructions to control computer operation.
CPU Describe the purpose of the CPU
1 Managing the development of information systems (Part 1) BUS Abdou Illia, Fall 2012 (November 12, 2012)
Introduction to Computers and Programming
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
Introduction to Computers and Python. What is a Computer? Computer- a device capable of performing computations and making logical decisions at speeds.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
CS 161 INTRO TO PROGRAMMING I Dr. Blaise W. Liffick Fall
Computer Organization Hardware and Software. Computing Systems Computers have two kinds of components: Hardware, consisting of its physical devices (CPU,
An Introduction Chapter Chapter 1 Introduction2 Computer Systems  Programmable machines  Hardware + Software (program) HardwareProgram.
Topics Introduction Hardware and Software How Computers Store Data
Managing the development and purchase of information systems (Part 1)
Basic Microcomputer Design. Inside the CPU Registers – storage locations Control Unit (CU) – coordinates the sequencing of steps involved in executing.
Ch Review1 Review Chapter Microcomputer Systems Hardware, Software, and the Operating System.
Introduction To Computer System
Operating Systems  By the end of this session, you will know: What an Operating System is. The functions it performs.
1 Using Information Systems for Decision Making BUS Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
1 Review For Exam 1 BUS Abdou Illia, Fall 2009 (September 10, 2009)
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Data and Computer Communications Circuit Switching and Packet Switching.
S2008Final_part1.ppt CS11 Introduction to Programming Final Exam Part 1 S A computer is a mechanical or electrical device which stores, retrieves,
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Stages of Processing.  When a computer is given instructions, a series of tasks must take place in order for a result to be accomplished  To accomplish.
Computer Architecture
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Stores the OS/data currently in use and software currently in use Memory Unit 21.
Computer Hardware A computer is made of internal components Central Processor Unit Internal External and external components.
 There are many parts that work together to make a computer work.
Programmable Logic Controllers LO1: Understand the design and operational characteristics of a PLC system.
Higher Computing Networking. Networking – Local Area Networks.
Senem KUMOVA METİN // Fall CS 115 Introduction to Programming Introduction to Computing.
1 Review For Exam 1 BUS Abdou Illia, Fall 2008 (September 16, 2008)
Copyright 2007 John Wiley & Sons, Inc. Information Systems: Creating Business Value John Wiley & Sons, Inc. Mark Huber, Craig Piercy, and Patrick McKeown.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
1 Chapter 1 Basic Structures Of Computers. Computer : Introduction A computer is an electronic machine,devised for performing calculations and controlling.
1 Review For Exam 3 (Part 1) BUS Abdou Illia, Fall 2010.
Information Technology (IT). Information Technology – technology used to create, store, exchange, and use information in its various forms (business data,
Chapter Objectives In this chapter, you will learn:
Section 2.1 Section 2.2 Identify hardware
Java Programming: From the Ground Up
3.1 Types of Servers.
CHAPTER 1: Computers and Systems
Q1) Fill in the banks in each of the following:
Computer Organization
Technology Literacy Hardware.
Introduction of microprocessor
Operating Systems What are they and why do we need them?
Managing the development of information systems (Part 1)
Basic Computer Organization
Chapter 3 Hardware and software 1.
Chapter 3 Hardware and software 1.
Presentation transcript:

1 Review Exercise BUS Abdou Illia, Fall 2006 This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final, students need to study according to the Review For Final Guide document available in the Review section of the course web site

2 Computer Hardware Technologies  Which of the following could be used as an input device as well as an output device? a)Stylus b)Monitor c)Printer d)Hard disk e)Floppy disk f)Magnetic Ink Character Recognition (MICR) reader g)Random access memory h)Read only memory

3 Computer Hardware Technologies  How many bits are there in a byte? a)About 1000 b)8 c)About d)None of the above  What is the difference between pixel and dot pitch?

4 Computer Hardware Technologies  Which of the following is true about the instruction control unit? a)It generates the time that synchronizes other components b)It stores control information, data, intermediate results c)It fetches instructions from RAM during program execution d)None of the above

5 Software technologies  Which of the following is not a type of systems software? a)Spreadsheet program b)Internet Explorer c)Language translator d)Utility program  What is meant by multiprogramming and multitasking?

6 Software technologies  Which of the following is true about systems software and application software? a)Systems software allow users to accomplish specific tasks b)Application software are responsible for starting the computer and providing user interface c)All of the above d)Neither a nor b

7 Network technologies  Which of the following is not considered a type of protocol? a)TCP/IP b)Client/server c)Topology d)Ethernet

8 Network technologies  In which of the following type of network, collisions could not occur? a)Ethernet b)Token ring c)Wide area network d)None of the above  What is a node?

9 Network technologies  Which of the following types of switching technique is, traditionally, used in voice networks? a)Packet switching b)Circuit switching c)Virtual switching d)None of the above

10 Network technologies  What type of transmission media are usually used for standard telephone line? a)Fiber optic cable b)Coaxial cable c)Twisted pair cable d)None of the above  What do 10Base2 and 100BaseTX refer to?

11 Managing Dev. & Purchase of IS  In this type of system implementation, a company installs the new system at only one location or one department? a)Direct cutover b)Parallel conversion c)Staged conversion d)Pilot Testing e)None of the above

12 Managing Dev. & Purchase of IS  In which of the following types of testing the new system is run in a simulated environment with simulated data? a)Stub testing b)Validation testing c)Unit testing d)Verification testing

13 Managing security Firewalls could be used to protect a network against tear drop attacks TF Ping of death is a kind of DoS attackTF A cracker is an intruder who breaks into a system in order to learn about it TF Security education programs are not key components of Information Security Plans TF You could become a victim of content attacks while navigating the web TF

14

15 Central Processing Unit  Clock: generates time that synchronizes other components  ICU: Fetches instructions from RAM  ALU: Execute instructions (arithmetic & logic operations)  Registers: Store control information, data, intermediate results Processor Clock Instruction Control Unit Arithmetic Logic Unit Registers

16

17 Implementation  Implementation strategies Direct cutover: Quick change to new system Parallel conversion: Old and new systems used in parallel for a while. Pilot testing: New system installed at only one location or one department for testing. Staged conversion: Only one part of the system installed, then another part is installed.

18 Testing  Programmers test modules  Do they return proper outputs?  Do they handle incorrect inputs appropriately?  Development team tests how modules work together – unit testing  System testing (software along with database and network component) Verification: Testing system in simulated environment with simulated data Validation: Testing system in real working environment with real data

19 Decision Support Systems  Designed to help individual managers make decisions  Major components Data management subsystem  Internal and external data sources Model management subsystem  Typically mathematical in nature User interface  How the people interact with the DSS  Data visualization is the key  Text  Graphs  Charts User Interface Model Management - Sensitivity Analysis -> What-if Analysis -> Goal-seeking Analysis Data Management - Transactional Data - Data warehouse - Business partners data - Economic data

20 Tear Drop DoS  Sending a stream of request messages to the target  Making the target run very slowly or crash  Objective is to have the target deny service to legitimate users DoS requests Server Attacker Legitimate user Legitimate request

21 Ping of Death attacks  Take advantage of Some operating systems inability to handle packets larger than bytes  Attacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets)  Most operating systems have been fixed to prevent this type of attack from occurring, but still occurring.