...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative numbers...
Words: 727 - Pages: 3
...Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review allows the producer to control...
Words: 334 - Pages: 2
...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an agreement...
Words: 1152 - Pages: 5
...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the CEO...
Words: 1762 - Pages: 8
...1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose...
Words: 1114 - Pages: 5
...Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host, and run applications for customers; or they provide other services. An IT services firm may be chosen if the system can’t be developed internally or requires customer support. Packaged software providers are companies that produce software exclusively, like Microsoft or Intuit, and are preferable if the task needing the system is generic. Vendors of enterprise solution software create a system that is composed of a series of integrated modules. Each module supports a business function, such as accounting, or human resources. ERP systems may be appropriate if a complete system is required that can cross functional boundaries. A more intense option for larger, more customizable solutions are Managed service providers who can provide more services than application service providers. ASPs and MSPs may be appropriate when instant access to an application is desired, and in the case of ASPs, when the task is generic. Open-source software is a type of software that is developed by...
Words: 897 - Pages: 4
...Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES This chapter contains the gathered researches from different sources. These different studies will be used as a guide and support to the research. The related literature starts with the good and important effects of different gadgets used in learning areas and goes on with the possible effects that might happen to Students when technology is being used extensively. On the later part of the chapter are the gathered related studies and articles done by various researchers. Foreign Literature Jessica White (2005) said that, technology has completely changed the scope of education in America. Most states require a technology aspect to their school improvements plans. They have embraced the idea that using technology in their classroom makes the subject anything from math to art-more accessible to many kinds of students. Educators, administrators, parents, and students are so well-versed in technology that it has become norm in even the most economically disadvantaged schools. She also stated that controversy exist about some students having access too much information. Some internet sites are not monitored by educational sources. Students who have not been taught the proper way to research on the internet might make a research hypothesis based on a website whose information is untrustworthy. Educators should be cautious and explain exactly what their expectations to their students are. Plagiarizing-detection software checks that...
Words: 3916 - Pages: 16
...Short answer 1. Determine the steps that the program must perform. 2. A language that has no syntax errors and is not meant to be executed 3. Input, Process, output 4. Programs that are easy to use for the customer or user. 5. Variable’s name and variable’s data type 6. Nothing, the variable hasn’t been assigned a value Algorithm Workbench 1. Declare real height Display “How tall are you?” Input height Display “this is how tall you are: “, height 2. Declare string color Display “what is your favorite color?” Input color Display “this is your favorite color: “, color 3. 2 + a = b b x 4 = a a/3.14 = b b – 8 = a Programming exercises 1. Display “enter your name.” Input name Display “enter your address with city, state, and zip Input address Display “Enter your telephone number” Input telephone number Display “what is your college major?” Input college major Display “here is your information: “, name, address, telephone number, college major 4. Display “Enter price 1” Input price 1 Display “enter price 2” Input price 2 Display “enter price 3 Input price 3 Display “enter price 4” Input price 4 Display “enter price 5” Set subtotal = price1+price2+price3+price4+price5 Display subtotal Set tax = 6% Set total = subtotal + tax Display “your total is “, total 6. display “Enter purchase price” Input price Set state tax = 0.04 Set county tax = 0.02 Set total = price(State tax + county tax) + Price Display “Your total...
Words: 275 - Pages: 2
...Nguyen Dinh Computer Security Assignment 2 1. Both general management and IT management are responsible for implementing information security to protect the ability of the organization to function. Decision-makers in organizations have to set policy and operate their organization in a manner that complies with the complex, shifting political legislation on the use of technology. Management is responsible for informed policy choices and the enforcement of decisions that affect applications and the IT infrastructures that support them. Management can also implement an effective information security program to protect the integrity and value of the organization’s data. 2. Data is mostly important in the organization because without it, an organization will lose its record of transactions and/or its ability to deliver value to its customers. Since any business, educational institution, or government agency that is functional within the modern social context of connected and responsive service depends on information systems to support these services, protecting data in motion and data at rest are both critical. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security that protects the organization’s ability to function. Although many business...
Words: 1872 - Pages: 8
...CHAPTER 2 REVIEW OF RELATED LITERATURE AND STUDIES This chapter presents a review of literature and studies both local and foreign which are relevant to the present study. Local Studies Foreign Studies According to Waldbridge, "Responsible gaming is an attitude we need if we are engage into Computer Game. Developing this attitude is not a personal choice alone, it requires the participation of society (parents, school, and game developer and government)." As a computer game user, player and fan, it has led me to study the effects of playing computer games such as DOTA, KHAN, and other highly innovative and competitively graphical games. The purpose of the study was to establish an understanding of to what extent is the effect of playing online games, network games and other types to the studies of the students in the university where I graduated. While it was difficult to set a parameter of classifying games according to types and quality since I and my friend believed that the characteristics of the games have something to do with the addiction of students to playing, we thought that it would be safe to just assume games as if have the same characteristics even though these games are under of different types and of the different level of complex graphical presentation, level of real-time experiences, the plot of story it is trying to project and a lot more qualities. Thus, if we quantify the effects then assumption holds that each game that we have studied has a...
Words: 2104 - Pages: 9
...to provide mortgage loans to, previously, undesirable borrowers. Now the demand for houses rose & so did the prices for the houses making these subprime loans attractive to lenders because of the high return. So the Banks & investment houses continued to invest in mortgage securities but the financial institutions did not maintain enough reserves in case the housing market crashed. Naturally, the housing market came crashing down leaving borrowers “upside down” in their loans & they were forced to foreclose. When this happened, the banks became unwilling to lend money so funds were not available for businesses. Without funds for everyday operations, businesses struggled causing layoffs & raising the unemployment rate. 2. What steps did the Federal government and the Federal Reserve take to mitigate the crisis? The Federal Reserve bailed out Bear Stearns & AIG. The U.S. Department of the Treasury seized Fannie Mae & Freddie Mac. Congress passes the economic bailout plan TARP which spent $700 billion investing in banks & bailing out the auto industry. Congress also passed an $825 billion economic stimulus package called the American Recovery & Reinvestment Act which included cutting taxes, building infrastructure, & investing in green energy. 3. Compare and contrast microeconomics and macroeconomics. How do the two approaches interrelate? Microeconomics is...
Words: 489 - Pages: 2
...Unit 2 Assignment 1: Chapter Review and TRACE 1. The five elements in the rhetorical situation are text, reader, author, constraints, and exigence. 2. A reader can use the rhetorical situation to analyze an argument essay by analyzing what the author is arguing about and who his target readers are. A viewer can use the rhetorical situation to analyze an image by first analyzing what the image’s meaning is, and who the targeted viewer is. A writer can use the rhetorical situation during the planning phase of writing a paper by deciding who is target readers will be and the position it may take on the topic. 3. The audience is important in argument because without the audience you have no argument. The different positions that the audience might initially hold are a friendly, an undecided, a neutral, a resistant, an unfamiliar, or a linked audience. There are multiple outcomes that are associated with arguments directed to each of these audiences, these outcomes include, a bias, they may oppose your argument, or they may agree with your argument. 4. Discourse communities are defined as groups that are involved in and communicating about a particular topic, or issue. The reason a discourse community is helpful to establish common ground for its members is because they share a set of basic values and assumptions. 5. A universal audience is an imagined audience that serves as an ethical and argumentative test for the rhetor. A universal audience is a useful idea...
Words: 254 - Pages: 2
...1. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organization’s data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion is when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. One example could be someone that gains access to PII such as SSN’s through a company’s database and ransoms the information for money. If not paid, he could...
Words: 1112 - Pages: 5
...Week 2 Problems/Exercises: Chapters 3 & 4 Michael LaBarge DeVry University Chapter 3 2. List and describe the common skills and activities of a project manager. Which skill do you think is most important? Why? Common skills of a project manager include: interpersonal skills, leadership skills and technical skills. Interpersonal skills include the skills needed to effectively communicate with others what needs to be done and the process that should be taken to get it done. Leadership skills are important because as the project manager is in charge of the project, they must be able to successfully lead their team from initiation to completion of the project as efficiently as possible. Technical skills are the skills needed to understand all aspects of the system that is to be created or modified and what it takes to make that happen. Common activities of a project manager include: leadership, management, customer relations, technical problem solving, conflict management, team management and risk and change management. I believe that the most important skill that a project manager must possess is leadership. I think that with the right team, the PM can get assistance on the interpersonal and technical aspects of the project. However without the proper leadership, even the best team will ultimately fail, or at least have many difficulties. Also, many of the activities that a project manager must do are leader/management based. 4. Describe the activities performed by...
Words: 766 - Pages: 4
...1. Information security is more of a management issue because it is up to management to decide what end users should have access to and what they should not. Also technology can only do what it is told to do but if management sets up training to teach end users about the threats of say opening an unknown email then the company is safer. 2. Without data an organization loses its record of transactions and/or its ability to deliver value to its customers. Page 42 Principles of Information Security 3. Both general and It management 4. It has created more and the reason why is it is much easier to spread viruses, worms, etc. now that the can get from system to system without having to attach to a physical disc. 5. Information extortion occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it. Page 60 Principles of Information Security. An example would be if someone would steal the latest album from a well-known artist before its release date and demanded to be paid or it would be released onto the internet. 6. Employees are one of the biggest threats for several reasons the can accidently allow someone access to the system by installing a back door or it is possible for them to become angry with the company and just hand out IP to rival companies. It is also possible that they could accidently delete valuable data from the system that has no backup. 7. Make sure nobody...
Words: 908 - Pages: 4