Download presentation
Presentation is loading. Please wait.
1
1 Review Exercise BUS3500 - Abdou Illia, Fall 2006 This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final, students need to study according to the Review For Final Guide document available in the Review section of the course web site
2
2 Computer Hardware Technologies Which of the following could be used as an input device as well as an output device? a)Stylus b)Monitor c)Printer d)Hard disk e)Floppy disk f)Magnetic Ink Character Recognition (MICR) reader g)Random access memory h)Read only memory
3
3 Computer Hardware Technologies How many bits are there in a byte? a)About 1000 b)8 c)About 1000000 d)None of the above What is the difference between pixel and dot pitch?
4
4 Computer Hardware Technologies Which of the following is true about the instruction control unit? a)It generates the time that synchronizes other components b)It stores control information, data, intermediate results c)It fetches instructions from RAM during program execution d)None of the above
5
5 Software technologies Which of the following is not a type of systems software? a)Spreadsheet program b)Internet Explorer c)Language translator d)Utility program What is meant by multiprogramming and multitasking?
6
6 Software technologies Which of the following is true about systems software and application software? a)Systems software allow users to accomplish specific tasks b)Application software are responsible for starting the computer and providing user interface c)All of the above d)Neither a nor b
7
7 Network technologies Which of the following is not considered a type of protocol? a)TCP/IP b)Client/server c)Topology d)Ethernet
8
8 Network technologies In which of the following type of network, collisions could not occur? a)Ethernet b)Token ring c)Wide area network d)None of the above What is a node?
9
9 Network technologies Which of the following types of switching technique is, traditionally, used in voice networks? a)Packet switching b)Circuit switching c)Virtual switching d)None of the above
10
10 Network technologies What type of transmission media are usually used for standard telephone line? a)Fiber optic cable b)Coaxial cable c)Twisted pair cable d)None of the above What do 10Base2 and 100BaseTX refer to?
11
11 Managing Dev. & Purchase of IS In this type of system implementation, a company installs the new system at only one location or one department? a)Direct cutover b)Parallel conversion c)Staged conversion d)Pilot Testing e)None of the above
12
12 Managing Dev. & Purchase of IS In which of the following types of testing the new system is run in a simulated environment with simulated data? a)Stub testing b)Validation testing c)Unit testing d)Verification testing
13
13 Managing security Firewalls could be used to protect a network against tear drop attacks TF Ping of death is a kind of DoS attackTF A cracker is an intruder who breaks into a system in order to learn about it TF Security education programs are not key components of Information Security Plans TF You could become a victim of content attacks while navigating the web TF
14
14
15
15 Central Processing Unit Clock: generates time that synchronizes other components ICU: Fetches instructions from RAM ALU: Execute instructions (arithmetic & logic operations) Registers: Store control information, data, intermediate results Processor Clock Instruction Control Unit Arithmetic Logic Unit Registers
16
16
17
17 Implementation Implementation strategies Direct cutover: Quick change to new system Parallel conversion: Old and new systems used in parallel for a while. Pilot testing: New system installed at only one location or one department for testing. Staged conversion: Only one part of the system installed, then another part is installed.
18
18 Testing Programmers test modules Do they return proper outputs? Do they handle incorrect inputs appropriately? Development team tests how modules work together – unit testing System testing (software along with database and network component) Verification: Testing system in simulated environment with simulated data Validation: Testing system in real working environment with real data
19
19 Decision Support Systems Designed to help individual managers make decisions Major components Data management subsystem Internal and external data sources Model management subsystem Typically mathematical in nature User interface How the people interact with the DSS Data visualization is the key Text Graphs Charts User Interface Model Management - Sensitivity Analysis -> What-if Analysis -> Goal-seeking Analysis Data Management - Transactional Data - Data warehouse - Business partners data - Economic data
20
20 Tear Drop DoS Sending a stream of request messages to the target Making the target run very slowly or crash Objective is to have the target deny service to legitimate users DoS requests Server Attacker http://www.netscantools.com/nstpro_netscanner.html Legitimate user Legitimate request
21
21 Ping of Death attacks Take advantage of Some operating systems inability to handle packets larger than 65 536 bytes Attacker sends request messages that are larger than 65,536 bytes (i.e. oversized packets) Most operating systems have been fixed to prevent this type of attack from occurring, but still occurring.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.