Software_Exam_Study_Guide

Software_Exam_Study_Guide - Exam 1 Study Guide MIS Chapters...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Exam 1 Study Guide MIS Chapters 1, 4, 12 and 13 FrontPage Units A-E Lectures August 25 – September 22 File Management 1. Define : File : named collection of bits that exists on a storage medium. Folder : named section of a storage medium used to group related files. Storage Media : device in which data can be entered, held and retrieved later. File Management : organizing files so you can find and use them more efficiently. 2. Identify the characteristics of files including: Filename: <= 255, not /<>’*:?, not case sensitive. Extension: text (doc, txt . ..), graphics (bup, gif…) video (flc, fli…) sound (mp3, wav…) web (htm, html…). Location – including Parent and Subfolders: wherever you want to put the files. Size: Byte=Character. Syllabus (9 pages): 136 KB. Various Dates: creation, last modified, last accessed. 3. What is the affect of executing each of the following file management functions on the original file and its location? Cut: changes location of original file or folder. Copy: duplicates original file or folder. Delete: erases original file or folder. Rename: changes name of original file or folder. 1. Malware What is a malware? Undesirable software on your computer. Describe the various types of computer attacks and how they work: o Virus: program instructions in a file that reproduces itself and spreads to other files in the same computer. o Trojan Horse: program that seems to perform one (good) function while doing something else (bad). o Worm: malware that can spread itself to other computers with minimal user interaction. o Denial of Service Attack: program that controls infected machines and commands. them to flood a network with traffic by making numerous unnecessary requests. o Adware/Spyware: Software that gathers information about your online activities and sends it to someone else. o Phishing: Internets scan that searches for personal information such as credit card, bank accounts and social security number. o Pharming 2. Describe various security measures used to protect information systems including: Antivirus: program that protect your computer from viruses.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spyware Detection: finds and remove spyware installed in your computer. Email Filters: Protect the privacy of individual because emails are a usual target. Operating Systems: system of programs that controls the execution of computer programs. Firewalls: software or hardware that creates a protective barrier between your compute and potentially harmful programs on the Internet. Security Monitors: programs that monitor the use of computer systems and networks and protect them for unauthorized use, fraud and destruction. Biometrics:
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

Software_Exam_Study_Guide - Exam 1 Study Guide MIS Chapters...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online