click below
click below
Normal Size Small Size show me how
Section 4 & 8
| Term | Definition |
|---|---|
| 1.Is a bridge between the computer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet. | Modem |
| What units are typically used to measure network bandwidth? | Megabites per second (mbps) and Gigabytes per second (Gbps) |
| The two most common network topologies are | Bus and star |
| What is the primary function of a router in a communication network? | Determining the fastest network path for data packets. |
| Computing professionals and organizations must continuously consider | 1. Ownership 2. Security 3. Ethical and Regulatory Obligations 4.Liability 5. Social impact |
| Morals that individuals and organizations abide by are | Ethics |
| argues that good behavior is not the result of applying identifiable rules (regulations) | Character-based ethics |
| a set of rules that limits access to data/information. | Confidentiality |
| refers to the ability to provide reliable access to the data/information for authorized individuals. | Availability |
| Examples of regulatory groups, or other standard bodies | HIPAA and PCI |
| What are the functions of a professional organization? | Publish professional journals, Raise public awareness, Develop standards of professional ethics and excellence |
| Implementing access controls is largely responsible for enforcing | Confidentiality |
| File permissions, user access controls, version control and redundant systems or copies are methods of maintaining | Integrity |
| is best ensured by rigorously maintaining all hardware, testing compatibility with operating systems and installed applications, and keeping systems patched and up-to-date. | Availability |
| Which of the following best describes the role of professional organizations in IT and related fields? | They support single disciplines through educational and informational missions. |
| What are some common functions of professional organizations in the IT field? | Publishing professional journals, developing standards of ethics and excellence, and raising public awareness |
| Which of the following organizations are involved in promoting or regulating the responsible use of information technology and protecting against computer crimes? | 1. omputer Professionals for Social Responsibility (CPSR) 2. Federal Communications Commission (FCC) 3. National Institute of Standards and Technology (NIST) 4. National Security Agency (NSA) |
| What is one reason the Internet of Things (IoT) poses a security challenge? | Increasing amounts of data and use of emerging technologies like IoT |
| n a _____________ network topology the computers are connected directly to each other as a peer. | Ring |
| Detects and removes known viruses from the network | Antivirus software |
| Are a special purpose computer that forwards messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine. | Router |
| provides large pools of shared computers that can be allocated as needed. (i.e. Amazon's Elastic Computer Cloud, Google Cloud and Google Apps) | Cloud Computing |
| Provides services, such as website hosting and routing, for other devices | Server |
| network various computers connected in the middle by a router. | Star |
| The machines are connected to a common communication line | Bus |
| Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person | Phishing |
| Is a bridge between the computer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet. | Modem |
| What is a key characteristic of Shielded Twisted Pair (STP) cables compared to Unshielded Twisted Pair (UTP) cables? | STP cables have an insulating sheath that protects against electromagnetic interference |
| Which wireless technology typically supports distances shorter than 30 feet, compared to Wi-Fi’s range of up to 300 feet? | Bluetooth |
| Networks rely on __________ to govern communication between devices. | Protocols |
| Performed by using an application and a large dictionary text with just words | Dictionary attack |
| What is the primary function of a router in a communication network? | Determining the fastest network path for data packets. |
| What units are typically used to measure network bandwidth? | Megabits per second (Mbps) and Gigabits per second (Gbps) |
| Blocks outgoing messages with certain destination addresses or blocks incoming messages from trustworthy sources | Firewall |
| Four types of malware are | Phishing, Spyware, Worms, Computer viruses |
| What role does a firewall play in a communication system? | Filtering incoming and outgoing network traffic for security purposes |
| Communication over the internet is governed by an open collection of standards known as | TCP/IP |
| A network that links systems over a greater distance, including machines on the opposite side of the world. | WAN |
| a software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server. | Proxy Server |
| Which type of cable transmits large volumes of data using the reflection of light through a glass or plastic core, surrounded by cladding? | Fiber-optic cable |
| The _______________ is an independent U.S. government agency that regulates communications by radio, television, wire, satellite, and cable. | Federal Communications Commission (FCC) |
| The client is responsible for licensing the operating system and managing back-end networking. | SaaS |
| Which network topology best handles downed links without losing connectivity between devices? | Mesh |
| Computer security, ethics and privacy | Is security, Ethics and Professionalism |
| Security in Ethics | Cameras, Card access, password policies |
| Ethics | Follows privacy laws and acceptable use policies |
| Professionalism in Ethics | Is ongoing learning and ethical practices with limited resources |
| Ethics vs. Regualtions | 1. Personal moral standards vs. Rules enforced and authorities 2. Informal but socially expected vs. Formal with penalties 3. Based on what's "right" vs. Based on what's "allowed" |
| 1st commandment | Dont harm others with computers |
| 2nd commandment | Dont interfere with others work |
| 3rd commandment | Don't snoop in files |
| 4th commandment | Don't steal with computers |
| 5th commandment | Don't spread false information |
| 6th commandment | Don't use software illegally |
| 7th commandment | Don't use other' resources without permission |
| 8th commandment | Don't take credit for others work |
| 9th commandment | Think about the impact of your systems |
| 10th commandment | Use computers with respect for others |
| Why professional organizations matter in IT | Promote ethical behavior, support continued learning, and strengthen the credibility of IT profession |
| Functions in IT | 1. Set ethical standards 2. Offer education & training 3. Provide certifications & Accreditation 4. Create Networking opportunities 5. Advocate for the Profession |
| Why It matters | Help guide IT professionals in making responsible decisions 2. Ensure quality and credibility in education and practice 3. Keep professionals up to date on emerging technologies and laws 4. Help members connect, collaborate, and find career support |
| Code of Ethics | 1. IEEE 2. ACM 3. ASA 4. AITP |
| IEEE is | Institute of Electrical and electronics Engineering. It is a public safety, sustainability, honesty in engineering |
| ACM is | Association for Computing Machinery. It is the integrity, public interest, lifelong learning computing |
| ASA is | American Statistical Association. Is fair data use, intellectual honesty, unbiased reporting. |
| AITP is | Association of Information Technology/Professionals, is reporting IT use, privacy, professionalism |
| IT Ethics are | 1. AWC 2. AAAI 3. ABET |
| Acceptable use policy (AUP) | include, legal compliance, security use and liability disclaimers |
| Privacy is | Control over personal use |
| Security is | Protection from unauthorized access |
| Ethical dilemmas | who owns or can view certain data |
| CIA Triad | Confidentiality, Integrity, Availability |
| IT Law and Security include | 1. CPSR 2. FCC 3. ITS 4. NIST 5. NSA |
| IT Law and Security what is CPSR | Computer professionals for social responsibility. It advocates ethical tech use and social impact |
| IT Law and Security what is FCC | Federal Communications Commission. They regulate US communications like radio, tv, internet, etc |
| IT Law and Security what is ITS | Institute for telecommunications. Researches secure telecom and broadband tech |
| IT Law and Security what is NSA | National Security Agency. It secures US government data and defends against cyber threats |
| US IT regulattions | 1. HIPAA- Medical records 2. FERPA- College records |
| ASIMOV's 3 laws of robotics | 1. A robot may not harm a human 2. A robot must obey a human 3. A robot must protect itself |
| Computing professionals and organizations must continuously consider | Social impact Ethical and Regulatory Obligations Security Ownership Liability |
| ____________________ argues that good behavior is not the result of applying identifiable rules (regulations). | Character-based ethics |
| Examples of regulatory groups, or other standard bodies | HIPAA PCI |
| is a written policy that assists employees in identifying ethical behaviors as defined by the organization. | Ethical Code of Conduct |
| handles sensitive data and information for both employees and clients. | Computing Professionals |
| is a set of rules that limits access to data/information. | Confidentiality |
| refers to the ability to provide reliable access to the data/information for authorized individuals. | Availability |
| is challenging for organizations with expanding volumes of data or those that are using emerging technologies. | Security |
| poses a security risk because of the volume of data and information that needs to be safeguarded, the multiple places these data are stored and the different forms in which the data exists. | Big Data |
| Implementing access controls is largely responsible for enforcing | Confidentiality |
| File permissions, user access controls, version control and redundant systems or copies are methods of maintaining | Integrity |
| is best ensured by rigorously maintaining all hardware, testing compatibility with operating systems and installed applications, and keeping systems patched and up-to-date | Availability |
| re requirements set by governing bodies and can result in penalties, fines, or even criminal charges. | Regulations |
| Rule-based, ethical standards have been published by multiple professional organizations including | AITP IEEE ACM |
| Which of the following best describes the role of professional organizations in IT and related fields? | They support single disciplines through educational and informational missions. |
| What are some common functions of professional organizations in the IT field? | Publishing professional journals, developing standards of ethics and excellence, and raising public awareness |
| What best defines organizational culture? | The expectations, experiences, philosophy, and values that guide employee behavior and interactions |
| What is the purpose of an ethical code of conduct in an organization? | To assist employees in identifying ethical behaviors as defined by the organization |
| To assist employees in identifying ethical behaviors as defined by the organization | To provide clear guidelines on how organizational computer systems may be used, reflecting ethical and legal expectations |
| .Which of the following are key components typically found in an Acceptable Use Policy (AUP)? | Legal considerations, data security provisions, and liability disclaimers |
| What does information privacy primarily refer to? | The right to control how your personal information is collected, used, and shared |
| Which of the following best highlights the difference between privacy and security? | Privacy focuses on data use and governance, while security focuses on protecting data from unauthorized access and misuse. |
| Which of the following issues has intensified concerns over information privacy? | Data breaches, selling of personal data, and abuse of targeted advertising |
| What is a conflict of interest? | A situation where someone has two relationships that may be incompatible with each other |
| What is the primary purpose of confidentiality in data security? | To limit access to data/information based on a set of rules |
| What is a common type of social engineering attack, and how does it work? | Phishing, which uses fake emails to trick users into providing personal information |
| What does maintaining data integrity ensure? | hat data is trustworthy and accurate |
| Which of the following could compromise data integrity? | Data being altered by unauthorized users or changed in transit |
| Which methods help maintain data integrity? | File permissions, user access controls, version control, and redundant systems |
| What does availability mean in the context of information security? | The ability to provide reliable access to data/information for authorized individuals |
| Which of the following practices best supports maintaining system availability? | Regularly maintaining hardware and keeping systems patched and up-to-date |
| Why is testing compatibility with operating systems and applications important for availability? | It helps ensure reliable system performance and reduces the risk of crashes |
| Which of the following organizations are involved in promoting or regulating the responsible use of information technology and protecting against computer crimes? | Computer Professionals for Social Responsibility (CPSR) Federal Communications Commission (FCC) National Institute of Standards and Technology (NIST) National Security Agency (NSA) |
| Which of the following professional organizations publish rule-based ethical standards related to computing, statistics, or IT? | institute of Electrical and Electronics Engineers (IEEE) American Statistical Association (ASA) Association for Computing Machinery (ACM) Association of Information Technology Professionals (AITP) |
| What is a core focus of the IEEE Code of Ethics? | Prioritizing public safety, honesty, and fair treatment while advancing technological competence |
| According to the ACM’s Software Engineering Code of Ethics, software engineers are expected to: | Commit to public interest, professional integrity, and lifelong learning |
| According to the American Statistical Association's Ethical Guidelines, what is expected of ethical statisticians? | Using valid methods, acknowledging others’ contributions, and addressing conflicts of interest |
| What is a key element of the AITP Code of Ethics? | Upholding responsibilities to management, society, employers, and country with honesty and respect |
| What is the primary mission of the Association for Women in Computing (AWC)? | To promote the advancement of women in the computing professions |
| What is the focus of the Association for the Advancement of Artificial Intelligence (AAAI)? | Advancing scientific understanding of thought and intelligent behavior in machines |
| What does the Accreditation Board for Engineering and Technology (ABET) do? | Certifies the quality of undergraduate programs in computing and engineering |
| Which commandment addresses the ethical use of software and intellectual property? | Thou shalt not copy or use proprietary software without paying for it |
| According to Asimov’s First Law of Robotics, what must a robot never do? | Allow a human to come to harm |
| According to the 2011 UK guidelines, which of the following is an ethical principle for designing robots? | Robots should be clearly distinguishable from humans |
| What is one reason the Internet of Things (IoT) poses a security challenge? | Increasing amounts of data and use of emerging technologies like IoT |