Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cob 204 Tom Dillon Test 2 Exam Questions and Answers (Solved Papers), Exams of Nursing

Cob 204 Tom Dillon Test 2 Exam Questions and Answers (Solved Papers)

Typology: Exams

2024/2025

Available from 07/02/2025

Allivia
Allivia 🇨🇦

3.7

(77)

9K documents

1 / 24

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Cob 204 Tom Dillon Test 2 Exam Questions and
Answers (Solved Papers)
1960s - Correct Answers ✅- Computers were Big
- (Mainframe Architecture)
- Used by shared time, shared data storage space, very central
(but separate)
1970s - Correct Answers ✅- Computer became departmental
(Minicomputer Architecture)
- Used your computer for your data, no sharing data (very
separate)
1980s - Correct Answers ✅- Computers became personal
(Microcomputer or desktop)
- individuals have their own computer power and data storage
space (very decentralized)
1990s - Correct Answers ✅- Computers are networked (Client-
Server Architecture)
- Individuals, small businesses, departments, large organizations
have decentralized computer power but centralized data storage
2008 - Correct Answers ✅- Cloud Computing Begins
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18

Partial preview of the text

Download Cob 204 Tom Dillon Test 2 Exam Questions and Answers (Solved Papers) and more Exams Nursing in PDF only on Docsity!

Answers (Solved Papers)

1960s - Correct Answers ✅- Computers were Big

  • (Mainframe Architecture)
  • Used by shared time, shared data storage space, very central (but separate) 1970s - Correct Answers ✅- Computer became departmental (Minicomputer Architecture)
  • Used your computer for your data, no sharing data (very separate) 1980s - Correct Answers ✅- Computers became personal (Microcomputer or desktop)
  • individuals have their own computer power and data storage space (very decentralized) 1990s - Correct Answers ✅- Computers are networked (Client- Server Architecture)
  • Individuals, small businesses, departments, large organizations have decentralized computer power but centralized data storage 2008 - Correct Answers ✅- Cloud Computing Begins

Answers (Solved Papers)

Elastic Cloud Computer Architecture - Correct Answers ✅an Amazon Web Service vocabulary word- leased resources stretch more than what you buy Pooled Cloud Computer Architecture - Correct Answers ✅or shared hardware - virtual space instead of physical space Over the Internet Cloud Computer Architecture - Correct Answers ✅not stored locally - you do not have to care for the hardware Why use the cloud? - Correct Answers ✅Reduced costs Easy access to data and applications Scalability (elasticity in AWS) Easier to manage (someone else has already done it) More security features (for less money) Disaster recovery Limited obsolescence Why Not use the cloud? - Correct Answers ✅• Loss of control

  • Don't know where data is located
  • Not aware of data theft until later

Answers (Solved Papers)

Software - Correct Answers ✅• Applications, such as Mymadison, Canvas, e-commerce software for purchases, inventory control software, CRM, word processing, excel, etc.

  • Data from the business or organization Infrastructure as a Service (IaaS) - Correct Answers ✅Lease a server, data storage, network and virtualization Platform as a Service (PaaS) - Correct Answers ✅• Lease a server, data storage, network, and virtualization
  • Vendor provides an operating system (like Windows), web server, database Software as a Service (SaaS) - Correct Answers ✅• Lease a server, data storage, network and virtualization
  • Vendor provides operating system (like Windows), web server, database
  • Vendor provides software, such as email, Office 365, Canvas or the software application that runs your business. For example, Mymadison, Salesforce, etc.

Answers (Solved Papers)

Personal Area Network (PAN) - Correct Answers ✅• Wireless

  • Bluetooth Local Area Network (LAN) - Correct Answers ✅• Geographic location
  • Floor in an office or entire building
  • Building may have multiple network, each has a different purpose Wide Area Network (WAN) - Correct Answers ✅• 2 or more LAN
  • May use outside vendor to connect, or not Packets - Correct Answers ✅formatted unit of data carried by a network Router/Router Switch - Correct Answers ✅forwards data packets between computer networks Switch - Correct Answers ✅manage the flow of data across a network by transmitting a received network packet to the one or more devices for which the packet is intended, like the post office

Answers (Solved Papers)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

  • Correct Answers ✅Local area network management for sending packets over Wireless
  • Beneficial in a wireless LAN due to stations being able to see the Access Point, but not each other
  • Wireless nodes are hidden until they transmit
  • If there is traffic, do not send Components of a Cyber Security Model
  1. Assets/Target - Correct Answers ✅resource or information that needs to be protected (cost of repair or replacement) Components of a Cyber Security Model
  2. Threat - Correct Answers ✅capabilities, intentions, and methods for harm to an asset can be human error, computer crime, or natural event Components of a Cyber Security Model

Answers (Solved Papers)

  1. Vulnerabilities - Correct Answers ✅weakness in an information system that allows a threat the opportunity to compromise or gain access to an asset (often human error) Components of a Cyber Security Model
  2. Safeguards/Controls - Correct Answers ✅used to block or minimize the impact of threats Technical Safeguards - Correct Answers ✅Hardware/software Technical Safeguards - Correct Answers ✅- Identification/authorization
  • Encryption
  • Firewalls
  • Malware Protection -Application Design Data Safeguards - Correct Answers ✅Data data safeguards - Correct Answers ✅- data rights and responsibilities

Answers (Solved Papers)

  • Something the user is - Correct Answers ✅- also known as biometrics
  • is an authentication method that examines a person's innate physical characteristics
  • Fingerprint scan/facial recognition Authentication
  • Something the user has - Correct Answers ✅- (ID) cards Authentication
  • Something the user does - Correct Answers ✅- voice and signature recognition
  • giving off body heat or perspiration Authentication
  • Something the user knows - Correct Answers ✅passwords and passphrases Authorization - Correct Answers ✅determines which actions, rights, or privileges the person has, based on his or her verified identity

Answers (Solved Papers)

Symmetric encryption - Correct Answers ✅the same key is used to encode and decode Asymmetric encryption - Correct Answers ✅two keys are used; one key encodes the message, and the other key decodes the message Public Key encryption - Correct Answers ✅- Public key to encrypt (the lock)

  • Private key to decrypt (combination for the lock) Malware - Correct Answers ✅• Viruses
  • Trojan horses
  • Worms
  • Spyware
  • Adware
  • Ransomware
  • Payload Malware Symptoms - Correct Answers ✅• Slow system startup

Answers (Solved Papers)

  • Doors (locked or fireproof)
  • Fencing
  • Gates
  • Locks
  • Badges
  • Guards
  • Alarm Systems Your Employees (Human Safeguards) - Correct Answers ✅• Position definition
  • Hiring and screening
  • Dissemination and enforcement
  • Termination Non Employees (Human Safeguards - Correct Answers ✅• Require vendors and partners to perform appropriate screening and security training.
  • Contract specifies security responsibilities.
  • Provide accounts and passwords with least privilege and remove accounts as soon as possible.

Answers (Solved Papers)

Systems Monitoring (Human Safeguards) - Correct Answers ✅• Server activity logs

  • P C O/S produce record of log-ins and firewall activities
  • Employ utilities to assess vulnerabilities.
  • Honeypots for computer criminals to attack.
  • Investigate security incidents.
  • Constantly monitor to determine adequacy of existing security policy and safeguards. Server activity logs
  • Firewall log - Correct Answers ✅Lists of all dropped packets, infiltration attempts, unauthorized access, attempts from within the firewall. Server activity logs
  • DBMS - Correct Answers ✅Successful and failed logins. Server activity logs
  • Web Servers - Correct Answers ✅Voluminous logs of Web activities

Answers (Solved Papers)

Digital Signature - Correct Answers ✅mathematical method to verify integrity (1. signature and document are turned into a number, 2. number sent, 3. receiver uses same method to turn signature and document into a number, 4. numbers are compared) Certificates - Correct Answers ✅associated with an individual, does person and certificate match Redundancy - Correct Answers ✅multiple systems that do the same thing, build into the process Fault tolerance - Correct Answers ✅system continues to run, even with failures in the system Patching - Correct Answers ✅keeping data available in the short term with stability and closing security holes PII - Correct Answers ✅Personally Identifiable Information BI Applications - Correct Answers ✅the software component of a BI system

Answers (Solved Papers)

Acquire Data - Correct Answers ✅obtain, clean, organize, relate and catalog the source BI analysis - Correct Answers ✅reporting (result of a query), data mining, and big data Publish results - Correct Answers ✅by push publishing or pull publishing Business Intelligence - Correct Answers ✅Information systems that process operational, social, and other data to identify patterns, relationships and trends for decision-makers Big Applications of BI - Correct Answers ✅• Purchasing patterns from sales data

  • Entertainment from viewing, listening, renting, buying,
  • Just-in-Time Medical reporting from patient records
  • Financial investment from corporate successes and failures
  • Public health - probably the most important use in 2020!! From case, death, recovery

Answers (Solved Papers)

Perform Analysis - Correct Answers ✅• Mathematical problem solving (from points of central tendency to advanced statistics)

  • Data mining for relationships and patterns
  • Maybe Machine Learning (the software teaches itself to find patterns)
  • Reporting by putting in meaningful form (tables, graphs, etc.) Data Warehouse - Correct Answers ✅• Acquires the data, cleans the data, processes the data, locates the data on a shelf of the warehouse (raw, but good data)
  • Data Analyst (computer person, computer science) manages the data Data Mart - Correct Answers ✅• Data collected to address needs or for a purpose
  • Data for a specific function Reporting Analysis - Correct Answers ✅(used for all fields and applications)
  • Sort, group, filter, and format structured data (found in a database or

Answers (Solved Papers)

spreadsheet, rows and columns) 2 ways to reporting analysis

  • Reporting applications - Correct Answers ✅regular reports 2 ways to reporting analysis
  • Exception Reports - Correct Answers ✅out of the normally Reporting Application Example:
  • RFM Analysis (Recently, Frequently, Money Spent) (Used for Marketing) - Correct Answers ✅• Recently - did the customer buy today, yesterday, day before, last week?• Frequently - did the customer by once, twice, thrice, or more?• Money Spent - how much does the customer spend with us? Reporting Application Example
  • Online Analytical Processing (OLAP) - Correct Answers ✅• Ability to Sum, Count, Average, and other simple arithmetic to groups of data
  • OLAP examines Measures and Dimensions