• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/5

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

5 Cards in this Set

  • Front
  • Back

define Call back procedures

User logs onto a computer which immediately


disconnects the line then dials the user back which avoids the user logging in with someone else s details.

define Firewalls

A dedicated gateway machine with special security precautions on it to monitor a network especially those against hackers through the internet.

define Data integrity

Integrity is ensured by:


Parity: A bit added onto the end of a byte making all bytes transmitted EVEN, if it recived and is odd, the data is corrupt and will not be used.


Checksum: All the bits transmitted are added and the value is known as the check-sum, if the value received equates to less than this then data has been corrupted


Cyclic Redundancy Check: Like the checksum

define possible disasters

.Fire, Floods, hurricanes


.Hardware failure


.Software failure


.deliberate vandalism


.accidents


.network failure

define the steps taking towards disaster planning

[BEFORE]


.risk analysis


.preventative measures


.staff training


[DURING]


.what response staff should make to disaster


[AFTER]


.Recovery measures


Hardware-Easily (expensive) replaced


Software-Can be reinstalled, Data is the most important variable to protect and the hardest to retrieve


Backups-VERY IMPORTANT TO BACK ALL DATA, TAKES A LONG TIME