chapter 4
chapter 5
chapter 6
100

title of chapter 4

information security

100

title to chapter 5

data and knowledge managment

100

what are we learning?

telecommunications and networking

200

the 2 access controls

authentication and authorization

200

one of the seven data hierarchy

byte

200

types of network processing

client/server computing and peer to peer processing(P2P)

300

name one of the 3 software attacks

logic bomb

300

the three characteristics of big data?

volume, velocity, variety

300

the two basic concepts

digital signals and modem or modulator-demodulator

400

which two areas pose significant threats?

human resources and information systems

400

what does database management systems maximize?

data security, data integrity, data independence

400

the three communications media and channels?

twisted-pair wire, coaxial cable, and fiber

500

name the 4 types of alien software

adware, spyware, spamware, and cookies

500

issues with big data

big data changes, especially in data streams

500

four layers of the TCP/IP reference model

application layer, transport layer, internet layer, and network interface layer

M
e
n
u