CIS150 chapters 5, 11 – Flashcards
Unlock all answers in this set
Unlock answersquestion
true
answer
Both Windows and Mac operating systems include firewall capabilities.
question
true
answer
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
question
false
answer
Biometric objects are entirely foolproof.
question
true
answer
Websites often collect data about you so that they can customize advertisements and send you personalized email messages.
question
true
answer
Your browsing history is a list of all websites you have visited over a period of time.
question
true
answer
To remove spyware, users need to obtain a special program that can detect and delete it.
question
true
answer
FOIA enables public access to most government records.
question
true
answer
HIPAA protects individuals against the wrongful disclosure of their health information.
question
true
answer
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
question
false
answer
It is illegal for employers to use software programs that monitor employees.
question
A. database
answer
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
question
D. data integrity
answer
Which of the following identifies the quality of data in a database?
question
A. file maintenance
answer
Which of the following refers to the procedures that keep data current?
question
A. query
answer
Which of the following is a request for specific data from a database?
question
A. backup
answer
Which of the following, with regard to the entire database, should be made on a regular basis?
question
D. relationship
answer
In a database which of the following is a connection within the data?
question
A. Structured Query Language
answer
SQL stands for which of the following?
question
A. a field
answer
In a database, what is the smallest unit of data a user accesses?
question
C. a record
answer
In your school's database, in which of the following is all of the information about a particular student stored?
question
A. a window on the screen that provides areas for entering or modifying data in a database
answer
Which of the following statements best describes a form?
question
piggybacking
answer
type of malware that is spread when you distribute infected files, especially as e-mail attachments.
question
virus
answer
a slowed down wi-fi connection can be the result of this
question
worm
answer
type of malware that spreads without human interaction, sending itself out to everyone in your address book
question
phishing
answer
scam that looks like a genuine message or web site, but ties to get you to revel sensitive information
question
spyware
answer
type of malware that collects bits of data, life your surfing habits
question
cookie
answer
used by commercial web site vendors to identify users and customize web pages
question
malware
answer
common forms include computer viruses, trojan horses, and worms
question
adware
answer
displays unwanted advertisements in banners or pop-up windows on your computer
question
spyware
answer
software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission
question
bot
answer
computer taken over by hackers to perform malicious tasks across a network
question
uninterruptible
answer
type of power supply/battery backup device that can prevent some forms of data loss
question
black hat
answer
type of hacker who intends serious harm though espionage, theft, or disruption of a network
question
white hat
answer
type of hacker who wants to shoe off their skills and doesn't intend any serious damage
question
cyberterrorism
answer
using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
question
hurricanes and storms
answer
events that account for almost half of total catastrophic data losses