You are on page 1of 5

ID

4/13/2010

, Msc.

.
5 .
45 . !
1

1
() () . (2 ):
1. , , ,
.
2. TPS , ,
/ .
3. ,
.
4. , :
"
".
5. -
.
6. a .
7. ER ,,
8. Online analytical processing (OLAP) .
9. - ,
, ,
- .
10. Data Warehousing uva at i i
.

2
. 3
1. :
a. , , ,
b.
c.
d. ) )
e.
2. :
a.
b.
c. e-commerce
d.
e. , ,
3. :
a.
b.
c.
d.

4. (
) ( , .).
:
a. Worms ()
b. Trojan horses
c. Logic bombs
d. Back doors
e. Phishing
5. _____ (character).
a. bit
b. byte
c. field
d. record
e. file
6. (SIS)?
a.

.
b.

c.
d. .
7. , ,
:
a. hacktivist
b. cracker
c. hacker
d.
e. cyberterrorist
8. :
a.

b.
c.
d.
e.
9. :
a.
b.
c.
d.
e.
10. .
a. government-to-citizen
b. consumer-to-consumer
c. business-to-business
d. business-to-consumer
e.

(a,b,c,d,) (
1 )!
1.
2. Worms

_________
()

_________

3. Trojan horses

_________

4.

_________

5. Back doors

_________

6. Denial-of-Service

_________

a)


b)
.
c) Password ,

.
d)


.
e)


.
f)

.


( 6 )
1. , , ? ?

2. ? ! !

3. ,
. (
)

4. , , ?

You might also like