CS 160 Introduction to Information Technology

Final Online Examination

Home | About Our School | Programs | Links | Contact Us | Final Online Examination

CS 160 Final Exam

-NET Frameworks
The Microsoft .NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

retrieved from: http://en.wikipedia.org/wiki/.NET_Framework March 11, 2009

- ASP - Active Server Pages
Active Server Pages (ASP), also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated web pages. Initially released as an add-on to Internet Information Services (IIS) via the Windows NT 4.0 Option Pack, it was subsequently included as Read Allows users or groups to see the object.a free component of Windows Server

retrieved from:
http://en.wikipedia.org/wiki/Active_Server_Pages, March 11, 2009

- Access
Access (telecommunications), the process of signing onto a network

reetrieved from:
http://en.wikipedia.org/wiki/Access, march 11, 2009

Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. There is no version for MacOS or for Microsoft Office Mobile.
Microsoft Access is known for its ability to empower non-professional developers to create database applications on their own. Users can easily create tables, queries, forms and reports, and connect them together with macros. Advanced users can use VBA to write rich solutions with advanced data manipulation and user control.

retrieved from:http://en.wikipedia.org/wiki/Microsoft_Access, March 11, 2009

- Access Privileges
About Access Privileges
Access privileges determine which portal objects a user can browse or edit, which objects appear in search results, and which can be added to My Pages and community pages.

Read Allows users or groups to see the object.
Select Allows users or groups to add the object to other objects.
Edit Allows users or groups to modify the object.
Admin Allows users or groups full administrative control of the object, including deleting the object or approving it for migration.

- Active Hyperlink

A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
retrieved from: http://www.webopedia.com/TERM/A/active_hyperlink.html, March 11, 2009
- Administrator (as an IT resource)

Information technology (IT) administrators manage the day-to-day operations of IT systems to make sure that they run effectively.
IT administrators work with IT managers to make sure that the computer system provides sufficient computing power to deliver the desired level of business performance.
IT administrators may perform the following tasks:
* talk with managerial, administrative and technical staff to determine information needs, data flows and systems definitions
* establish and control systems access and security
* coordinate protocols for operation within multi-user IT networks that provide voice, data and text transmission
* check systems in order to optimise performance and to initiate recovery action after system failures
* implement regular housekeeping procedures, including data backup
* manage the distribution and retention of data on various storage devices
* coordinate system updates and replacement of 'old' versions
* maintain data dictionaries
* provide day-to-day advice to users on data structures and terminology
* provide assistance in testing new equipment and systems
* prepare technical reports on the operation of systems
* prepare systems cost estimates and cost-benefit analyses
* coordinate the work of support staff
* provide training in systems use and access.

retrieved from:
http://www.jobguide.thegoodguides.com.au/occupation/view/223111A, March 11, 2009
- Authentication

Authentication (from Greek: αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
retrieved from: http://en.wikipedia.org/wiki/Authentication March 11, 2009

- Data Administrator

A person who coordinates activities within the data administration department. Same as "database analyst."
retrieved from: http://www.pcmag.com/encyclopedia_term/0,2542,t=data+administrator&i=40736,00.asp March 11, 2009
- Electronic Commerce

Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.
retrieved from: http://en.wikipedia.org/wiki/E-commerce March 11, 2009
- Electronic Government (eGovernment)

e-Government (short for electronic government, also known as e-gov, digital government, online government or transformational government) is a diffused neologism used to refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, businesses, and other arms of government. Contents.
retrieved from: http://en.wikipedia.org/wiki/E-Government March 11, 2009
- Encryption

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
retrieved from: http://en.wikipedia.org/wiki/Encryption March 11, 2009

Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html march 11, 2009
- Information Technology

Information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). retrieved from:
http://jobsearchtech.about.com/od/careersintechnology/p/ITDefinition.htm march 11, 2009
Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
retrieved from:
http://en.wikipedia.org/wiki/Information_technology march 11, 2009
- Information Technology Resource (IT Resource)

ITR (Information Technology Resources) is a Veteran owned Technical consulting and recruiting firm focused on the Information Technology Industry. ITR is headquartered in Knoxville Tennessee serving both small and large clients across the country.
retrieved from: http://www.ittechies.com/ March 11, 2009 - Intellectual property rights (IPR)

Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

retrieved from: http://en.wikipedia.org/wiki/Intellectual_property March 11, 2009 - ISO

ISO (International Organization for Standardization) is the world's largest developer and publisher of International Standards.
ISO is a network of the national standards institutes of 159 countries, one member per country, with a Central Secretariat in Geneva, Switzerland, that coordinates the system.
ISO is a non-governmental organization that forms a bridge between the public and private sectors. On the one hand, many of its member institutes are part of the governmental structure of their countries, or are mandated by their government. On the other hand, other members have their roots uniquely in the private sector, having been set up by national partnerships of industry associations.

retrieved from: http://www.iso.org/iso/about.htm March 11, 2009
- Malicious Code

Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications.
retrieved from:
http://www.aladdin.com/csrt/malicious-code.aspx March 11, 2009
Types of Malicious Code

* Access Violations - The most dangerous malicious code is that which tries to access (delete, steal, alter, or execute) unauthorized files. The attacks can steal passwords, files, or other confidential data. Some examples of company information that could be exposed or include login names and passwords, secret project information, IPO plans, credit card numbers, confidential phone numbers, social security numbers, addresses, and more. Code can also delete, encrypt, or modify files on disk. Real-life examples of these attacks are described later in this paper. Access violation attacks require behavior monitoring and can't be effectively blocked by ‘code scanning' methods.
* Denial of Service Attacks - Denial of Service attacks prevent the user from using the system, and may destroy files that are open at the time of the attack. They work by performing repetitive tasks like opening an infinite number of windows until the system locks up. These types of attacks can be stopped through inspection of all incoming content.

retrieved from:
http://www.aladdin.com/csrt/malicious-code.aspx March 11, 2009
- Malware (virus) Detection Software

Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.
retrieved from:
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci762187,00.html March 11, 2009
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
retrieved from: http://en.wikipedia.org/wiki/Malware March 11, 2009
- Patch

Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.
retrieved from: http://en.wikipedia.org/wiki/Patch_(Unix) March 11, 2009
A patch is a small piece of software designed to fix problems with or update a computer program or its supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance. Though meant to fix problems, poorly designed patches can sometimes introduce new problems.

retrieved from:http://en.wikipedia.org/wiki/Patch_(computing) March 11, 2009
- Personal IT Resources

- Purge

In history and political science, a purge is the removal of people who are considered undesirable by those in power from a government, from another organisation, or from society as a whole. Purges can be peaceful or violent; many will end with the imprisonment or exile of those purged, but in some cases they will simply be removed from office. Restoring people who have been purged is known as rehabilitation.
retrieved from: http://en.wikipedia.org/wiki/Purge March 11, 2009
To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible to regain deleted objects by undeleting them, but purged objects are gone forever.
retrieved from: http://www.webopedia.com/TERM/P/purge.html March 11, 2009
- Remote Access

In telecommunication, the term remote access has the following meanings:
1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. One of the more common methods of providing this type of remote access is using a VPN.
1. Remote desktop software
2. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to Wide Area Telephone Service (WATS) lines.
3. RemoteAccess is also the name of a DOS-based BBS software.

Remote access can refer to remote desktop, remote terminal (like telnet) or any type of remote application.
retrieved from: http://en.wikipedia.org/wiki/Remote_access March 11, 2009
Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are travelling may need access to the corporation's network. Home users get access to the Internet through remote access to an Internet service provider (ISP). Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines is a common method of remote access. Remote access is also possible using a dedicated line between a computer or a remote local area network and the "central" or main corporate local area network. A dedicated line is more expensive and less flexible but offers faster data rates. Integrated Services Digital Network (ISDN) is a common method of remote access from branch offices since it combines dial-up with faster data rates. wireless, cable modem, and Digital Subscriber Line (DSL) technologies offer other possibilities for remote access.
A remote access server is the computer and associated software that is set up to handle users seeking access to network remotely. Sometimes called a communication server, a remote access server usually includes or is associated with a firewall server to ensure security and a router that can forward the remote access request to another part of the corporate network. A remote access server may include or work with a modem pool manager so that a small group of modems can be shared among a large number of intermittently present remote access users.
A remote access server may also be used as part of a virtual private network (VPN).
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212887,00.html March 11, 2009
- Social Engineering

In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Appeal to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques.
Another aspect of social engineering relies on people's inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html March 11, 2009
- Spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to and from the recipient.
retrieved from: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci840262,00.html March 11, 2009
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.
A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.
However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).
retrieved from: http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Spoofing/default.htm March 11, 2009
- Strong Encryption

Strong Encryption Package™ is an add on for Private Encryptor Encryptor, adding seven additional types of encryption.
retrieved from: http://www.tropsoft.com/strongenc/prodinfo.htm March 11, 2009
- UserID
On Unix-like operating systems, users are identified within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range of its values varies amongst different systems; at the very least, a UID is a 15-bit integer, ranging between 0 and 32767, with the following restrictions:
* The superuser must always have a UID of zero (0).
* The user "nobody" was traditionally assigned the largest possible UID (as the opposite of the Superuser), 32767. More recently, the user is assigned a UID in the system range (1–100, see below) or between 65530–65535.
* UIDs from 1 to 100 are otherwise reserved for system use by convention; some manuals recommend that UIDs from 101 to 499 (RedHat) or even 999 (Debian) be reserved as well.
The UID value references users in the /etc/passwd file. Shadow password files and Network Information Service also refer to numeric UIDs. The user identifier is a necessary component of Unix file systems and processes. Some operating systems might have support for 16-bit UIDs, making 65536 unique IDs possible, though a modern system with 32-bit UIDs will potentially make 4,294,967,296 (232) distinct values available.
retrieved from:http://en.wikipedia.org/wiki/User_identifier_(Unix) March 11, 2009
In computing, a user is a person who uses a computer or Internet service. A user may have a user account that identifies the user by a username (also user name), screenname (also screen name), or "handle", which is derived from the identical Citizen's Band radio term. To log in to an account, a user is typically required to authenticate himself with a password or other credentials for the purposes of accounting, security, logging, and resource management.
Users are also widely characterized as the class of people that use a system without complete technical expertise required to fully understand the system. In most hacker-related contexts, they are also divided into lusers and power users. Both are terms of opprobriation, but the latter connotes a "know-it-all" attitude.
retrieved from: http://en.wikipedia.org/wiki/User_(computing) March 11, 2009

Enter supporting content here

jhonadatog@yahoo.com