INTRODUCTION TO INFORMATION SYSTEMS TECHNOLOGY

Download Report

Transcript INTRODUCTION TO INFORMATION SYSTEMS TECHNOLOGY

Review Exercise
This exercise covers some of the kind of
questions students could expect in the final
examination. To be prepared for the final,
students need to study according to the Review
For Final Guide document available in the
Review section of the course web site
BUS3500 - Abdou Illia, Fall 2006
1
Computer Hardware Technologies

Which of the following could be used as an
input device as well as an output device?
a)
b)
c)
d)
e)
f)
g)
h)
Stylus
Monitor
Printer
Hard disk
Floppy disk
Magnetic Ink Character Recognition (MICR) reader
Random access memory
Read only memory
2
Computer Hardware Technologies

How many bits are there in a byte?
a)
b)
c)
d)
About 1000
8
About 1000000
None of the above
 What is the difference between pixel and
dot pitch?
3
Computer Hardware Technologies

Which of the following is true about the
instruction control unit?
a) It generates the time that synchronizes other
components
b) It stores control information, data, intermediate
results
c) It fetches instructions from RAM during program
execution
d) None of the above
4
Software technologies

Which of the following is not a type of
systems software?
a)
b)
c)
d)
Spreadsheet program
Internet Explorer
Language translator
Utility program
 What is meant by multiprogramming and
multitasking?
5
Software technologies

Which of the following is true about
systems software and application
software?
a) Systems software allow users to accomplish specific
tasks
b) Application software are responsible for starting the
computer and providing user interface
c) All of the above
d) Neither a nor b
6
Network technologies

Which of the following is not considered a
type of protocol?
a) TCP/IP
b) Client/server
c) Topology
d) Ethernet
7
Network technologies

In which of the following type of network,
collisions could not occur?
a) Ethernet
b) Token ring
c) Wide area network
d) None of the above
 What is a node?
8
Network technologies

Which of the following types of switching
technique is, traditionally, used in voice
networks?
a) Packet switching
b) Circuit switching
c) Virtual switching
d) None of the above
9
Network technologies

What type of transmission media are
usually used for standard telephone line?
a) Fiber optic cable
b) Coaxial cable
c) Twisted pair cable
d) None of the above
 What do 10Base2 and 100BaseTX refer
to?
10
Managing Dev. & Purchase of IS

In this type of system implementation, a
company installs the new system at only
one location or one department?
a) Direct cutover
b)
c)
d)
e)
Parallel conversion
Staged conversion
Pilot Testing
None of the above
11
Managing Dev. & Purchase of IS

In which of the following types of testing
the new system is run in a simulated
environment with simulated data?
a) Stub testing
b) Validation testing
c) Unit testing
d) Verification testing
12
Managing security
Firewalls could be used to protect a
network against tear drop attacks
T
F
Ping of death is a kind of DoS attack
T
F
A cracker is an intruder who breaks into a
system in order to learn about it
T
F
Security education programs are not key
components of Information Security Plans
T
F
You could become a victim of content
attacks while navigating the web
T
F
13
14
Central Processing Unit
Processor

Clock: generates time that
synchronizes other components

ICU: Fetches instructions from
RAM

ALU: Execute instructions
(arithmetic & logic operations)

Registers: Store control
information, data, intermediate
results
Clock
Instruction
Control Unit
Arithmetic
Logic Unit
Registers
15
16
Implementation

Implementation strategies

Direct cutover: Quick change to new system

Parallel conversion: Old and new systems used
in parallel for a while.

Pilot testing: New system installed at only one
location or one department for testing.

Staged conversion: Only one part of the
system installed, then another part is installed.
17
Testing

Programmers test modules

Do they return proper outputs?

Do they handle incorrect inputs appropriately?

Development team tests how modules work
together – unit testing

System testing
component)
(software along with database and network

Verification: Testing system in simulated
environment with simulated data

Validation: Testing system in real working
environment with real data
18
Decision Support Systems


Designed to help individual
managers make decisions
Major components

Data management subsystem


Model management subsystem


Internal and external data sources
Typically mathematical in nature
User
Interface
Model Management
- Sensitivity Analysis
-> What-if Analysis
-> Goal-seeking Analysis
User interface


How the people interact with the DSS
Data visualization is the key
 Text
 Graphs
 Charts
Data Management
-
Transactional Data
Data warehouse
Business partners data
Economic data
19
Tear Drop DoS

Sending a stream of request messages to the
target

Making the target run very slowly or crash

Objective is to have the target deny service to
legitimate users
Legitimate request
Legitimate user
DoS requests
Server
Legitimate request
Attacker
Legitimate user
http://www.netscantools.com/nstpro_netscanner.html
20
Ping of Death attacks

Take advantage of

Some operating systems inability to handle packets
larger than 65 536 bytes

Attacker sends request messages that are larger
than 65,536 bytes (i.e. oversized packets)

Most operating systems have been fixed to
prevent this type of attack from occurring, but
still occurring.
21