Back to AI Flashcard MakerInformation Technology /BA18 Final Exam Chapter 9 and 12
BA18 Final Exam Chapter 9 and 12
This flashcard deck covers key concepts from Chapters 9 and 12 of the BA18 course, focusing on networking, security, and data management.
The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________.
EDI
Tap or swipe ↕ to flip
Swipe ←→Navigate
1/34
Key Terms
Term
Definition
The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________.
EDI
One example in this lecture of people thinking they have a unique password but actually many others may also choose the same password was _________.
using “Wizard of Oz” in Spanish
The most common but also the worse password that people can use is __________.
123456
A MAC address and an IP address are the same thing.
False
A ____________is a networking device used to transfer data packets between two or more networks.
router
A private network that is set up similar to the World Wide Web for use by employees of a specific organization is called a(n) __________.
Intranet
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
The direct, computer-to-computer exchange of standard business transaction documents is known by the acronym ________. | EDI |
One example in this lecture of people thinking they have a unique password but actually many others may also choose the same password was _________. | using “Wizard of Oz” in Spanish |
The most common but also the worse password that people can use is __________. | 123456 |
A MAC address and an IP address are the same thing. | False |
A ____________is a networking device used to transfer data packets between two or more networks. | router |
A private network that is set up similar to the World Wide Web for use by employees of a specific organization is called a(n) __________. | Intranet |
Data breaches are always intentional. | False |
A whole-house surge protector is installed | at the breaker panel |
Which of the following statements about cookies is not true? | Cookies obtain your personal information by searching your hard drive. |
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house. | firewall |
A ________ is a virus that is attached to documents. | macro virus |
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. | terminator |
Which of the following is the most commonly used client/server network topology? | Star |
A(n) ________ is a heavily secured server located between a company’s secure internal network and its firewall. | Bastion host |
When someone uses your personal information to pose as you, this is | identity theft |
Viruses that load from USB drives left connected to the computer when computer are turned on are known as | boot-sector viruses |
A packet analyzer is called a sniffer because | it capture and reads data inside each pack |
Computer viruses can be spread by | sharing flash drives.; downloading and running a file attached to an e-mail.; downloading a song from a peer-to-peer sharing site.; all of the above |
A is a program that takes complete control of your computer without your knowledge. | rootkit |
A backup of all the data files on your computer can be managed easily using the Windows 10 | File History |
Authentication techniques that rely on personal biological traits are called | biometrics |
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called | inoculation |
A surge protector may look like just another power strip but it also can | save your device if a voltage spike is sent through the electrical system |
Firewalls use a process of to assign IP addresses to the devices internal to the network so hackers will not know what they are. | network address translation(NAT) |
Which of the following is an advantage of installing a client/server network in a business? | Sharing of peripherals |
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network | scalablity |
Which server would a client/server network include to ensure only authorized users are logging onto the network? | Authentication |
Which of the following is a private network set up by a business that’s used exclusively by a select group of employees and suppliers? | Intranet |
Sometimes groups of data packets are sent together in a package called a | frame |
Which of the following is not one of the factors used in multi-factor authentication? | Identity |
Which network cable type is most susceptible to signal interference? | UTP |
The process whereby users prove they have authorization to use a computer network is known as | authentication |
Which topology tends to provide the fairest allocation of network resources? | Ring |
Which is not a key component of a typical client/server network? | bastion host |