INTRODUCTION TO INFORMATION SYSTEMS TECHNOLOGY
Download
Report
Transcript INTRODUCTION TO INFORMATION SYSTEMS TECHNOLOGY
Review Exercise
This exercise covers some of the kind of
questions students could expect in the final
examination. To be prepared for the final,
students need to study according to the Review
For Final Guide document available in the
Review section of the course web site
BUS3500 - Abdou Illia, Fall 2006
1
Computer Hardware Technologies
Which of the following could be used as an
input device as well as an output device?
a)
b)
c)
d)
e)
f)
g)
h)
Stylus
Monitor
Printer
Hard disk
Floppy disk
Magnetic Ink Character Recognition (MICR) reader
Random access memory
Read only memory
2
Computer Hardware Technologies
How many bits are there in a byte?
a)
b)
c)
d)
About 1000
8
About 1000000
None of the above
What is the difference between pixel and
dot pitch?
3
Computer Hardware Technologies
Which of the following is true about the
instruction control unit?
a) It generates the time that synchronizes other
components
b) It stores control information, data, intermediate
results
c) It fetches instructions from RAM during program
execution
d) None of the above
4
Software technologies
Which of the following is not a type of
systems software?
a)
b)
c)
d)
Spreadsheet program
Internet Explorer
Language translator
Utility program
What is meant by multiprogramming and
multitasking?
5
Software technologies
Which of the following is true about
systems software and application
software?
a) Systems software allow users to accomplish specific
tasks
b) Application software are responsible for starting the
computer and providing user interface
c) All of the above
d) Neither a nor b
6
Network technologies
Which of the following is not considered a
type of protocol?
a) TCP/IP
b) Client/server
c) Topology
d) Ethernet
7
Network technologies
In which of the following type of network,
collisions could not occur?
a) Ethernet
b) Token ring
c) Wide area network
d) None of the above
What is a node?
8
Network technologies
Which of the following types of switching
technique is, traditionally, used in voice
networks?
a) Packet switching
b) Circuit switching
c) Virtual switching
d) None of the above
9
Network technologies
What type of transmission media are
usually used for standard telephone line?
a) Fiber optic cable
b) Coaxial cable
c) Twisted pair cable
d) None of the above
What do 10Base2 and 100BaseTX refer
to?
10
Managing Dev. & Purchase of IS
In this type of system implementation, a
company installs the new system at only
one location or one department?
a) Direct cutover
b)
c)
d)
e)
Parallel conversion
Staged conversion
Pilot Testing
None of the above
11
Managing Dev. & Purchase of IS
In which of the following types of testing
the new system is run in a simulated
environment with simulated data?
a) Stub testing
b) Validation testing
c) Unit testing
d) Verification testing
12
Managing security
Firewalls could be used to protect a
network against tear drop attacks
T
F
Ping of death is a kind of DoS attack
T
F
A cracker is an intruder who breaks into a
system in order to learn about it
T
F
Security education programs are not key
components of Information Security Plans
T
F
You could become a victim of content
attacks while navigating the web
T
F
13
14
Central Processing Unit
Processor
Clock: generates time that
synchronizes other components
ICU: Fetches instructions from
RAM
ALU: Execute instructions
(arithmetic & logic operations)
Registers: Store control
information, data, intermediate
results
Clock
Instruction
Control Unit
Arithmetic
Logic Unit
Registers
15
16
Implementation
Implementation strategies
Direct cutover: Quick change to new system
Parallel conversion: Old and new systems used
in parallel for a while.
Pilot testing: New system installed at only one
location or one department for testing.
Staged conversion: Only one part of the
system installed, then another part is installed.
17
Testing
Programmers test modules
Do they return proper outputs?
Do they handle incorrect inputs appropriately?
Development team tests how modules work
together – unit testing
System testing
component)
(software along with database and network
Verification: Testing system in simulated
environment with simulated data
Validation: Testing system in real working
environment with real data
18
Decision Support Systems
Designed to help individual
managers make decisions
Major components
Data management subsystem
Model management subsystem
Internal and external data sources
Typically mathematical in nature
User
Interface
Model Management
- Sensitivity Analysis
-> What-if Analysis
-> Goal-seeking Analysis
User interface
How the people interact with the DSS
Data visualization is the key
Text
Graphs
Charts
Data Management
-
Transactional Data
Data warehouse
Business partners data
Economic data
19
Tear Drop DoS
Sending a stream of request messages to the
target
Making the target run very slowly or crash
Objective is to have the target deny service to
legitimate users
Legitimate request
Legitimate user
DoS requests
Server
Legitimate request
Attacker
Legitimate user
http://www.netscantools.com/nstpro_netscanner.html
20
Ping of Death attacks
Take advantage of
Some operating systems inability to handle packets
larger than 65 536 bytes
Attacker sends request messages that are larger
than 65,536 bytes (i.e. oversized packets)
Most operating systems have been fixed to
prevent this type of attack from occurring, but
still occurring.
21