Information Systems Exam Graded A+
2 categories of information technology - ANSWER-hardware and software
3 components to an RFID system - ANSWER-tag, reader, computer network
3 most common types of guided media - ANSWER-twisted pair wiring
coaxial cable
fiber optic cable
3 primary areas of enterprise information architecture - ANSWER-backup and recovery,
disaster recovery, and information security
3 primary information security areas - ANSWER-1. authentication and authorization
2. prevention and resistance
3. detection and response
3 types of authorization - ANSWER-1. password
2. smart card or token
3. fingerprint or voice signature
4 layer reference model - ANSWER-application layer
transport layer
internet layer
network interface layer
5 primary characteristics - ANSWER-flexibility, scalability, reliability, availability,
performance
5 steps on creating an Information Privacy Policy - ANSWER-1. adoption and
implementation of a privacy policy
2. notice and disclosure
3. choice and consent
4. information security
5. information quality and access
acceptable use policy - ANSWER-a policy that a user must agree to follow in order to be
provided access to a network or to the Internet
anti-spam policy - ANSWER-e-mail users will not send unsolicited emails or spam
application architecture - ANSWER-determines how applications integrate and relate to
each other
, application architecture - ANSWER-determines how applications integrate and relate to
each other
application software - ANSWER-used for specific information processing needs
including payroll, customer relationship management, project management, training,
and many others.
arithmetic logic unit (ALU) - ANSWER-performs all arithmetic operations, and all logic
operations (such as sorting and comparing numbers)
authentication - ANSWER-a method for confirming users identities
authorization - ANSWER-the process of giving someone permission to do or have
something
availability - ANSWER-addresses when systems can be accessed by users
backdoor programs - ANSWER-viruses that open a way into the network for future
attacks
backup - ANSWER-an exact copy of a system's information
binary digit (bit) - ANSWER-the smallest unit of information that a computer can
ptocess. 1=on 0=off
biometrics - ANSWER-the identification of a user based on a physical characteristic,
such as a fingerprint, iris, face, voice, or handwriting
biometrics - ANSWER-the identification of a user based on a physical characteristic,
such as a fingerprint, iris, face, voice, or handwriting
black hat hackers - ANSWER-break into other peoples computer systems and may just
look around or may steal and destroy information
bluetooth - ANSWER-creating a niche market for traditionally cabled devices
bus width - ANSWER-the size of the internal electrical pathway along which signals are
sent from one part of the computer to another. a wider bus can move more date, hence
faster processing
byte - ANSWER-a group of 8 bits
cache memory - ANSWER-a small unit of ultra fast memory that is used to store
recently accessed or frequently accessed data so that the CPU does not have to
retrieve this data from slower memory circuits such as RAM
2 categories of information technology - ANSWER-hardware and software
3 components to an RFID system - ANSWER-tag, reader, computer network
3 most common types of guided media - ANSWER-twisted pair wiring
coaxial cable
fiber optic cable
3 primary areas of enterprise information architecture - ANSWER-backup and recovery,
disaster recovery, and information security
3 primary information security areas - ANSWER-1. authentication and authorization
2. prevention and resistance
3. detection and response
3 types of authorization - ANSWER-1. password
2. smart card or token
3. fingerprint or voice signature
4 layer reference model - ANSWER-application layer
transport layer
internet layer
network interface layer
5 primary characteristics - ANSWER-flexibility, scalability, reliability, availability,
performance
5 steps on creating an Information Privacy Policy - ANSWER-1. adoption and
implementation of a privacy policy
2. notice and disclosure
3. choice and consent
4. information security
5. information quality and access
acceptable use policy - ANSWER-a policy that a user must agree to follow in order to be
provided access to a network or to the Internet
anti-spam policy - ANSWER-e-mail users will not send unsolicited emails or spam
application architecture - ANSWER-determines how applications integrate and relate to
each other
, application architecture - ANSWER-determines how applications integrate and relate to
each other
application software - ANSWER-used for specific information processing needs
including payroll, customer relationship management, project management, training,
and many others.
arithmetic logic unit (ALU) - ANSWER-performs all arithmetic operations, and all logic
operations (such as sorting and comparing numbers)
authentication - ANSWER-a method for confirming users identities
authorization - ANSWER-the process of giving someone permission to do or have
something
availability - ANSWER-addresses when systems can be accessed by users
backdoor programs - ANSWER-viruses that open a way into the network for future
attacks
backup - ANSWER-an exact copy of a system's information
binary digit (bit) - ANSWER-the smallest unit of information that a computer can
ptocess. 1=on 0=off
biometrics - ANSWER-the identification of a user based on a physical characteristic,
such as a fingerprint, iris, face, voice, or handwriting
biometrics - ANSWER-the identification of a user based on a physical characteristic,
such as a fingerprint, iris, face, voice, or handwriting
black hat hackers - ANSWER-break into other peoples computer systems and may just
look around or may steal and destroy information
bluetooth - ANSWER-creating a niche market for traditionally cabled devices
bus width - ANSWER-the size of the internal electrical pathway along which signals are
sent from one part of the computer to another. a wider bus can move more date, hence
faster processing
byte - ANSWER-a group of 8 bits
cache memory - ANSWER-a small unit of ultra fast memory that is used to store
recently accessed or frequently accessed data so that the CPU does not have to
retrieve this data from slower memory circuits such as RAM