Cp102

Only available on StudyMode
  • Download(s) : 91
  • Published : April 22, 2013
Open Document
Text Preview
Lecture 18

Midterm
* 10-11:20
* Room BA102
* Chapters 6-9, 11 and PowerPoint
* Cheat Sheet
* Abbreviations, definition, classifications, processes, facts/history and compare & contrast

CPU
* CPU usage
* Cache memory
* Front side of bus
* GPU
* Moore’s law

Hard drive
* Access time
* Data transfer rate
* eSATA

Ram
* Memory module
SSD
Blur-ray disc

Audio
* Sound card
* Surround sound

Networking Equipment
* Networking-ready
* Network adapter
* Switch
* Router
* Hub

Transmission Mediums
* Wired
* Coaxial oble
* Twisted pair cabel
* Fiber optic line
* Wireless
* Radio waves
* Wireless range expander
* Data transfer rate
* Throughput
* Internet backbone

Networks & Servers
* Home network server
* Client/server
* Peer-to-peer
* Han/LAN/MAN/WAN
* DSN server
* Point of presence

Cybercrime
* Hackers
* Keystroke logger
* Distributed denial-of –service
* Zombies
* Identity theft
* Software
* Adware
* Spyware
* Virus
* Antivirus software

Chapter 6
* CPU
* RAM
* Storage devices
* Video
* Audio
* Desktop vs notebook
* Parts of the CPU
* Control unit
* ALU
* Does all the errors of calculations
* Machine cycle
* Fetch – move next instruction from RAM to CPU
* Decode – figure out what instruction is
* Execute – have CPU do it
* Store – save the result
* Multiple cores
* Hyperthreading
* Don’t have to wait for the whole cycle to finish, can start multiple commands

Chapter 7
* What’s a network? Benefits?
* Peer-to-peer vs Client/server
* How do they differ
* When do you use P2P
* Where does it often get used
* What types of transmissions mediums are there?
* Wired
* Wireless
* Data transfer rate vs throughout
* Bandwidth and actual speed you get
* What factors affect throughput
* How do your protect your wireless network?
* Disable your SSID
* Change default password
* Implement media access control

Chapter 8
*

Chapter 9
* Cybercrime
* Fraud
* Computer intrusions
* Unsolicited email
* What’s a virus?
* How can you get infected?
* Sharing disks or flash drives
* Opening email attachments
* Downloading infected files
* Types of viruses
* Boot-sector irus
* Logic bombs
* Tiem bombs
* Worms
* Script viruses
* Macro virsus
* E-mail viruses
* Encryption viruses
* Classifications
* Polymorphic
* Multipartite
* Stealth
* How do you safeguard against viruses?
* Hackers
* Keylogger
* Trojan horse
* White hat hackers
* Black hat hackers
* Script kiddies
* Evil twins
* DoS
* DDoS

Chapter 11

Information Systems
* Office support systems
* Transaction processing systems
* Management information systems
* Decisions support systems

Data Minning methods
* Classification
* Estimation
* Affinity grouping
* Clustering
* Description and visualization
*
tracking img