F09-Exam 2-Study Guide - MIS 302F F all 2009 Exam 2 Study...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
MIS 302F Fall 2009 Page 1 of 1 Exam 2 Study Guide MIS 302F F all 2009 Exam 2 Study Guide The Study Guide summarizes the key topics that may be included on Exam 2. For each class, review the assigned readings, PowerPoint slides, and your class notes. You may also post and respond to questions on the Discussion Forum of Blackboard. Class 12: Technology – Software and Data Communications Reading: Chapter 4, Chapter 6 Terms and Concepts Local Area Network (LAN) - multiple computers connected at one physical location Virtual Private Network (VPN) – a WAN connection alternative that uses the Internet or a private Internet to create the appearance of private point-to-point connections. In the IT world, the term virtual means something that appears to exist that does not exist in fact. Here a VPN uses the public Internet to create the appearance of the private connection. Network Interface Card (NIC) – a hardware component on watch device on a network (computer, printer etc) that connects the device’s circuitry to the communications line. Client – A computer that provides word processing, spreadsheets, database access, and usually a network connection Server – A computer that provides some type of service, such as hosting a database, running a blog, publishing a We site, or selling goods. (Windows, Unix, Linux) Switch – a special-purpose computer that receives and transmits data across a network. Thin Client - if it functions without anything else Thick Client if you have to download software to use the program Wireless Network Interface Card (WNIC) – devices that enable wireless networks by communicating with wireless access points. Encryption – the process of transforming clear text into coded, unintelligible text for secure storage or communication Wide Area Network (WAN) - multiple computers connected at multiple locations Firewalls – a computer device located between a firm’s internal and external network that prevents unauthorized access to or from the internal network
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
MIS 302F Fall 2009 Page 2 of 2 Exam 2 Study Guide Point-of-Presence (POP) – the location at which a line connects to a PSDN network. Think of the POP as the phone number that one dials to connect to the PSDN. Once a site has connected to the PSDN POP, the site obtains access to all other sites connected to the PSDN. Types of Operating Systems Windows – an operating system designed and sold by Microsoft. It is the most widely used operating system Mac OS – An operating system developed by Apple for the Mac. The current version is Mac OSX. Mac computers are used primarily by graphic artists and workers in the arts community. Mad PS was developed for the PowerPC, but as for 2006 will run on Intel processors as well Unix – an operating system developed at Bell Labs in the 1970s. It has been the workhorse of the
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 9

F09-Exam 2-Study Guide - MIS 302F F all 2009 Exam 2 Study...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online