Combo with "BCIS Ch.5 Morley" and 1 other – Flashcards

Unlock all answers in this set

Unlock answers
question
Our networked society has raised a number of ____ concerns.
answer
privacy
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
answer
1,000 feet
question
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
answer
system failure
question
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
answer
security slot
question
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
answer
Cable locks
question
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
answer
FDE
question
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.
answer
encrypted
question
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
answer
recovery
question
____ devices are designed to withstand much more physical abuse than conventional devices.
answer
ruggedized
question
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
answer
pads
question
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
answer
ruggedized
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
answer
UPS
question
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
answer
patches
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
disaster recovery plan
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
answer
backup
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
hot site
question
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
answer
7-10 years
question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
answer
information privacy
question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
Marketing databases
question
A marketing activity that can be considered a privacy risk is ____.
answer
electronic profiling
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
When spam is sent via IM it is called ____.
answer
spim
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer
throw-away email address
question
One common way to deal with spam that makes it to your computer is to use a(n) ____.
answer
email filter
question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
opting out
question
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.
answer
opt. in
question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
answer
Computer monitoring software
question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer
video surveillance
question
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
answer
Video surveillance
question
____ refers to companies recording or observing the actions of employees while on the job.
answer
Employee monitoring
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
video cards
question
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
answer
Presence technology
question
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
answer
Antispyware software
question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer
CAN-SPAM act
question
Both manufacturers and online retailers—often called _____ —can sell directly to customers via their Web sites.
answer
e-tailers (or e-retailers)
question
Banner ad _____ facilitate displaying banner ads for your site on other Web sites, in return for you displaying other banner ads on your site.
answer
exchanges
question
Many _____ are available to gather prices, shipping, and delivery information from multiple sites for a particular product and summarize the results to help locate the best buys from potential vendors.
answer
shopping bots (used by comparison shopping Web sites)
question
A(n) _____ exchange site is designed to help match organizations with goods or services to sell with potential buyers who desire those resources.
answer
market
question
_____ is the process of making changes to Web pages, as needed, to increase their visibility in search site results.
answer
Search engine optimization
question
An important promotional strategy is regularly _____ your site with new content.
answer
updating
question
Each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and transfers it to the _____.
answer
merchant account
question
Widely-used _____ services that an e-commerce Web site might include are online order tracking, online versions of product instruction manuals, and customer service via e-mail or live chat. These are used to support customers and increase their satisfaction and loyalty.
answer
eCRM (electronic customer relationship management)
question
Dynamic multimedia ads are also called _____ ads.
answer
rich media
question
A market exchange site is sometimes referred to as a(n) _____.
answer
e-marketplace
question
Instead of selling an actual physical or electronic product to customers, _____ sites sell access to online services.
answer
subscription
question
The _____ model includes any type of e-commerce transaction taking place between two businesses.
answer
B2B (business-to-business)
question
_____ credit cards are credit cards that are preloaded with a specific amount of money, which becomes the total liability of the card.
answer
Prepaid
question
Many businesses have both brick-and-mortar stores and an online store. These businesses are sometimes referred to as _____ stores.
answer
click-and-mortar (or bricks-and-clicks)
question
_____ sites facilitate the exchange of financial items (such as stocks, bonds, futures, and options) between buyers and sellers.
answer
Financial brokerage
question
Secure Web sites use _____ to safely transfer sensitive data over the Internet.
answer
encryption
question
Explain the consumer-to-consumer (C2C) e-commerce business model.
answer
The consumer-to-consumer (C2C)—sometimes referred to as the person-to-person (P2P)—model involves individuals selling directly to other individuals. Typically, C2C transactions are carried out via intermediary Web sites set up to facilitate this, such as online auction sites like eBay and online classified ad sites like Craigslist. In fact, with millions of products up for auction at any time, eBay is one of the largest C2C e-commerce sites today.
question
What are electronic gift certificates, gift cards, and coupons?
answer
Digital gift certificates and gift cards are convenient methods of allowing a gift recipient to select the items he or she wantstobuyatanonlinestore.Theyworksimilarlytoconventionalgiftcertificatesandgiftcardsbuta serial number or other identifying number is entered during the checkout process to verify the certificate or card. Some gift certificates and gift cards that are redeemed electronically are purchased in physical form; others are entirely electronic. Digital coupons consist of codes—typically called coupon codes—that are entered into the appropriate box on a checkout page in order to deduct the coupon amount from a purchase total.Manysitesspecializein gatheringandsummarizingcouponcodesforavarietyofonlinemerchants.Ifan invalidcouponcodeisenteredor ifacouponcodehasexpired,thecoupondiscountwillnotbeapplied.
question
What is storefront software?
answer
Storefront software is a type of software that can be used to create an online store. Storefront software varies widely in capabilities and some programs have multiple versions available in order to create different types of e- commerce businesses. For instance, some programs are most appropriate for a small business owner who wants to begin selling a limited number of products online; others are designed for large businesses that require real-time inventory capabilities, multiple pricing structures, the ability for salespeople to place orders from the field, and other more complex features. Virtually all storefront software programs support credit card sales and secure checkout pages; some have wizards and other tools to help create the storefront quickly and easily.
question
Discuss click fraud.
answer
Click fraud occurs when sponsored links-such as on a search site results page-are clicked when there is no interest in the product or service associated with the sponsored link. The links can be clicked by a person or by an automated clicking program (sometimes referred to as a clickbot and often performed by botnets). The motive for click fraud is usually financial. For instance, although viewed as unethical in the business world, a company might click on a competitor's sponsored links in order to deplete that company's advertising budget. In addition,some companiesorindividualscreateWebpagesconsistingprimarilyofsponsoredlinks(usually sponsoredlinksfrom Google,Yahoo!,orothersearchsitesthatareplacedonothersitesviaadnetworks)for the purpose of click fraud. Web sites hosting a sponsored link get a fee each time the link on that page is clicked,sothesecompaniesor individualsmanuallyorautomatically(viasoftwareorbotnets)clicktheadson their sites to fraudulently generate revenue. In fact, the independent click fraud monitoring and reporting service Click Forensics estimates that more than 60% of all ad traffic coming from these types of sites is fraudulent.
question
Discuss how costs are reduced for businesses using e-commerce.
answer
Many of the cost reductions result from the need for smaller facilities and fewer staff. In particular, stores with only an online (not a physical) presence experience lower costs because they do not have the expenses associated with maintaining a physical storefront, like conventional brick-and-mortar stores do. Even though a dot-com store may need a company headquarters and possibly one or more inventory warehouses, these types of facilities are much less expensive to operate than a retail store that may need to have a physical presence in multiple prime locations in order to reach potential customers. Other potential areas of cost reductions associated with e- commerce include the ability to sell directly to customers (and, therefore, save the cost associated with using retailersorother middlemen),usingelectronicmarketingresources(suchase-mailpromotionsandWebsite ads) instead of printed materials to save on marketing and advertising costs, and increased accuracy in order processing and pricing.
question
Web sites such Amazon.com, Walmart.com, Overstock.com, and BestBuy.com are examples of _____ sites. a. B2B b. B2C c. B2G d. C2C
answer
b (B2C)
question
In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) _____. a. Internet merchant account b. Net merchant account c. Internet business account d. Web card account
answer
a (Internet merchant account)
question
The collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) _____. a. Net-commerce system b. Internet B-platform c. e-commerce system d. EB-platform
answer
c (e-commerce system)
question
The C2C model is also known as the _____ model. a. B2B b. P2P c. B2G d. B2C
answer
b (P2P)
question
_____ bring buyers and sellers together to facilitate transactions between the two parties. a. M-Brokers b. E-tailers c. Shop carts d. Brokerage sites
answer
d (brokerage sites)
question
With the _____, businesses sell goods or services to individual consumers. a. business-to-consumer (B2C) model b. business-to-government (B2G) model c. business-to-business (B2B) model d. consumer-to-consumer (C2C) model
answer
a (B2C)
question
_____ seals are issued by the Certificate Authority issuing the site's SSL or EV SSL certificate and are designed to remind shoppers that the site is protected by that certificate. a. Privacy b. Protection c. Warranty d. Security
answer
d (security)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) _____. a. order-fulfillment company b. electronic storefront c. brick-and-mortar store d. smart card
answer
a (order-fulfillment company)
question
_____ is an online payment service that allows individuals to transfer money easily from their online payment account to someone else's. a. SimpleTech b. PayPal c. Wal-Mart d. eBay
answer
b (PayPal)
question
The goal of _____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business. a. VOD b. SEO c. OTP d. URLP
answer
b (SEO)
question
Although B2C was initially expected to be the most prominent type of e-commerce business model, revenues from the _____ model are now expected to far surpass the B2C marketplace. a. C2C b. B2G c. B2B d. B2E
answer
c (B2B)
question
_____ businesses sell products and services to local, state, and federal government buyers. a. B2B b. C2C c. B2C d. B2G
answer
d (B2G)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He recently received a contract to print T-shirts for the US Department of Justice. This is an example of a _____ transaction. a. B2C b. B2B c. B2G d. C2C
answer
c (B2G)
question
_____ store checkout information in the customer's account for use with purchases on that site only. a. Site-specific smart cards b. Site-specific electronic check accounts c. Site-specific online payment accounts d. Site-specific digital wallets
answer
d (site-specific digital wallets)
question
Companies that follow the _____ do not sell goods or services directly to others, but instead bring buyers and sellers together within a specific industry or business process. a. business-to-government (B2G) model b. person-to-person (P2P) model c. business-to-business (B2B) model d. intermediary hub model
answer
d (intermediary hub model)
question
To reassure customers, all e-commerce sites should develop and display a _____ policy stating how collected customer information will be used. a. business model b. customer c. privacy d. database
answer
c (privacy)
question
Comparison shopping Web sites are sometimes called _____. a. shopping bots b. shopping bags c. shopping carts d. e-shopping
answer
a (shopping bots)
question
Perhaps the biggest disadvantage of e-commerce from a customer standpoint is the _____. a. inability to return items b. difficulty of using credit cards c. risk of fraud d. inability to see merchandise
answer
c (risk of fraud)
question
Many e-commerce sites require shoppers to enter the _____ printed on the back of the credit card to prove they have possession of the card. a. Virtual Credit card number b. Card Verification Code (CVC) c. OTP code d. eWallet code
answer
b (CVC)
question
For businesses that already have an existing Web site and just need to add ordering capabilities and checkout procedures to that site, _____ can be used. a. e-order software b. shopping robot software c. shopping cart software d. online order software
answer
c (shopping cart software)
question
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a _____ to authenticate the validity of any contracts she signs electronically. a. digital certificate b. banner ad c. digital wallet d. permission-based ad
answer
a (digital certificate)
question
_____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site. a. Web site planning b. Web site design c. Web site deployment d. Web site development
answer
d (web site development)
question
Common _____ activities include providing online order status information, links for tracking delivery shipments, a. C2C c. eCMS downloadable product manuals, and online technical support, such as via e-mail or live chat. b. eCRM d. CBT
answer
b (eCRM)
question
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. Some of John's customers want to buy Christmas presents for their friends, but are unsure of what to select. John should encourage these customers to purchase _____ that the recipients can redeem at a later date. a. digital wallets b. digital gift certificates c. smart cards d. electronic storefronts
answer
b (digital gift certificates)
question
One of the most recognized privacy seals is the _____ trustmark. a. PayPal b. TRUSTe c. SimpleTech d. Peer Impact
answer
b (TRUSTe)
question
Instead of selling an actual physical or electronic product to customers, _____ sell access to online services. a. subscription sites b. video-on-disk sites c. online auction sites d. B2G sites
answer
a (subscription sites)
question
____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database. a. Page b. Search c. Site d. Meta
answer
d (Meta)
question
Because of the low overhead costs associated with _____, new e-commerce businesses can enter the marketplace relatively inexpensively. a. shopping carts b. online stores c. shopping bags d. storebots
answer
b (online stores)
question
Instead of a formal auction with a specific ending time and an automatic winner, dynamic pricing sites— such as _____ —allow buyers to bid on items or services listed for sale, and then the seller decides whether or not to accept each offer on an individual basis. a. PriceGrabber.com b. eBay c. Priceline.com d. PayPal
answer
c (Priceline.com)
question
If you own the trademark to your business name, the _____ Consumer Protection Act protects your trademark in cyberspace. a. Anticybersquatting b. Online c. Cyberbusiness d. Trademark
answer
a (Anticybersquating)
question
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Sharon has a different password for each Web site that she uses. However, she is afraid of forgetting some of these passwords and being unable to access her records. The best solution is for her to use _____. a. shopping cart software b. storefront software c. banner ads d. a digital wallet
answer
d (digital wallet)
question
When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called _____ hubs. a. vertical b. horizontal c. centered d. subscription
answer
a (vertical)
question
_____ is the term used to describe conducting business transactions—generally financial transactions—via communications technology. a. Internet-transaction b. E-commerce c. Net-commerce d. Net-business
answer
b (e-commerce)
question
Banner ads can be _____ —that is, ads that are targeted to individuals based on their preferences, buying habits, or interests. a. behavioral targets b. behavioral ads c. preference ads d. ad mining
answer
b (behavioral ads)
question
Law enforcement agencies contend that _____ systems and public video surveillance are no different than the many private video surveillance systems in place today.
answer
face recognition
question
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer _____ software.
answer
tracking
question
_____ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.
answer
Opting out
question
A(n) _____ app can lock and unlock your computer automatically as your iPhone moves in and out of range.
answer
proximity
question
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge _____ with a computer whenever it is plugged into a power outlet.
answer
suppressor
question
By _____ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
answer
educating
question
_____ procedures, such as making copies of important documents and storing them in a safe location, also apply to important non-electronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
answer
Backup
question
A growing illegal use of computer monitoring software is for a hacker to use a(n) _____ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
answer
keystroke logging
question
_____, the unauthorized copying of a computer program, is illegal in the United States and many other—but not all—countries.
answer
Software piracy
question
The U.S. _____ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
answer
SAFE WEB
question
One antipiracy tool is requiring a unique _____ code.
answer
Activation (or registration)
question
_____ occurs when hardware is stolen from an individual or from a business, school, or other organization.
answer
Hardware theft
question
Heat, dust, static and _____ fluctuations can all damage computer hardware
answer
power
question
_____ labels change their appearance if someone (such as a thief) tries to remove them.
answer
Tamper evident
question
Discuss the proper disposal of hardware containing sensitive information.
answer
CDs, DVDs, and other media containing sensitive data should be shredded, and the hard drives of computers to be disposed of should be wiped—overwritten several times using special disk-wiping or disk-erasing software— before they are sold or recycled. Unlike the data on a drive that has merely been erased or even reformatted (which can still be recovered), data on a properly wiped drive is very difficult or impossible to recover. Wiping is typically viewed as an acceptable precaution for deleting sensitive data (such as Web site passwords and tax returns) from hard drives and other storage media belonging to individuals, as well as for storage media to be reusedwithinan organization.However,beforedisposingofstoragemediacontainingsensitivedata,businesses shouldconsider physicallydestroyingthemedia,suchasbyshreddingormeltingthehardware.Tohelpwith this process, data destruction services can be used. To ensure that all hardware containing business data is properlydisposedof,itis importantforallbusinessestodaytodevelopandimplementapolicy(oftencalleda mediasanitizationordata destructionpolicy)fordestroyingdatathatisnolongerneeded.
question
Describe e-mail filters.
answer
Custom e-mail filters are used to route messages automatically to particular folders based on stated criteria. For example, you can specify that e-mail messages with keywords frequently used in spam subject lines (such as free, porn,opportunity,lastchance,weight,pharmacy,andsimilarterms)beroutedintoafoldernamedPossible Spam, and you can specify that all e-mail messages from your boss's e-mail address be routed into an Urgent folder. Filtering can help you find important messages in your Inbox by preventing it from becoming cluttered with spam. However, you need to be sure to check your Possible Spam or Junk E-mail folder periodically to locate any e-mail messages mistakenly filed there—especially before you permanently delete those messages.
question
Discuss the features and benefits of continuous data protection.
answer
For an even higher level of security than a scheduled backup, continuous data protection (CDP) can be used. A CDP backup system backs up data in real time as it changes so that data can be recovered from any point in time (even just a few minutes ago) with no data loss, and recovery can be as fast as five minutes after a failure. Although expensive when used with large quantities of data, it is one of the best ways to ensure that company data is protected. In addition to business data, CDP is beginning to be used by individuals to safeguard their data. For extra protection against data loss due to a natural disaster or other geographic-specific risk, businesses should use cloud providers that are in a physical location that is different from the company's location.
question
Why should you be concerned about computer security?
answer
Today, there are a number of security concerns surrounding computers and related technology that all individuals should be concerned about, including having your computer stolen, losing a term paper because the storage medium your paper was stored on becomes unreadable, losing your mobile phone containing your entire contact listand calendar,orrunningtheriskofbuyingpiratedordigitallycounterfeitedproducts.
question
What do surge suppressors do?
answer
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge suppressor; the surge suppressor should be used to connect a computer and other hardware whenever they are plugged into a power outlet. When electrical power spikes occur, the surge suppressor prevents them from harming your devices. For the best protection, surge suppressors should be used with all the powered components that have a wired connection to the computer (such as a monitor or printer). There are small surge suppressors designed for use while on the go, and others designed for business and industrial use.
question
_____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities. a. Computer monitoring b. Computer surveillance c. Multimedia surveillance d. Video surveillance
answer
d (video surveillance)
question
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews fromotherbuyersbeforebuyingaproduct.However,Samuelisalsoconcernedaboutprotectinghis personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's _____. a. protection history b. consumer policy c. privacy record d. privacy policy
answer
d (privacy policy)
question
_____ are small programs that take care of software-specific problems, or bugs, such as security holes. a. Backups b. Applets c. Scripts d. Patches
answer
d (patches)
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____. a. junkie e-mail address b. throw-away e-mail address c. one-use e-mail address d. second-hand e-mail address
answer
b (throw-away email address)
question
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its _____. a. recycle b. recovery c. repair d. running
answer
b (recovery)
question
Creating a _____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. a. mirror b. hotspot c. hot file d. backup
answer
d (backup)
question
Although many of us may prefer not to think about it, _____ —the complete malfunction of a computer system—and other types of computer-related disasters do happen. a. software piracy b. interrupted power c. spikes d. system failure
answer
d (system failure)
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach _____ to these devices. a. kill switches b. surge suppressors c. asset tags d. keyloggers
answer
c (asset tags)
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly _____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes. a. 50 feet b. 1,000 feet c. 100 feet d. 2 miles
answer
b (1,000)
question
One common way to deal with spam that makes it to your computer is to use a(n) _____. a. e-mail filter b. spam e-mail address c. encryption scheme d. hot site
answer
a (email filter)
question
Most businesses and Web sites that collect personal information have a(n) _____ that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy
answer
d (privacy policy)
question
_____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software. a. Antivirus software b. Antispyware software c. Antispoof software d. Antiphish software
answer
b (antispyware software)
question
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case? a. kill switch hard drives b. surge suppressors c. DataDots d. keylogging software
answer
a (kill switch hard drive)
question
When spam is sent via IM it is called _____. a. spoof b. phish c. spim d. junk
answer
c (spim)
question
_____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object. a. Surge suppressors b. Password locks c. Spike suppressors d. Cable locks
answer
d (cable lock)
question
_____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction. a. USB b. RFID c. IDC d. FDE
answer
d (FDE)
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of _____. a. proximity cards b. presence technology c. face recognition d. video cards
answer
a (proximity cards)
question
The _____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry. a. Sarbanes-Oxley Act b. USA Patriot Act c. CAN-SPAM act d. Junk Fax Prevention Act
answer
c (CAN-SPAM act)
question
By _____, you instruct companies you do business with that they cannot share your personal data with third parties. a. signing piracy agreements b. opting out c. contracting legal help d. e-mailing them
answer
b (opting out)
question
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital Counterfeiting
answer
a (information privacy)
question
_____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service. a. Government databases b. Marketing databases c. Educational databases d. Research databases
answer
b (Marketing databases)
question
_____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity. a. Surveillance software b. Video software c. Computer monitoring software d. Audio software
answer
c (computer monitoring software)
question
A marketing activity that can be considered a privacy risk is _____. a. security threads b. watermarking c. electronic profiling d. microprinting
answer
c (electronic profiling)
question
To supplement backup procedures, businesses and other organizations should have a(n) _____. a. insurance plan b. continuation rule c. disaster recovery plan d. survival guide
answer
c (disaster recovery plan)
question
A(n) _____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going. a. buddy site b. alternate pad c. hot site d. white room
answer
c (hot site)
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) _____. a. UPS b. surge suppressor c. voltage controller d. voltage meter
answer
a (UPS)
question
_____ devices are designed to withstand much more physical abuse than conventional devices. a. Secured b. Ruggedized c. Malleable d. Flexible
answer
b (ruggedized)
question
_____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status. a. Presence technology b. Computer monitoring c. Digital surveillance d. Detection technology
answer
a (presence)
question
DeQuervain's _____ is a condition in which the tendons on the thumb side of the wrists are swollen and irritated.
answer
tendonitis
question
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing _____.
answer
plagiarism
question
The 1976 _____ extended copyright protection to nonpublished works, so, immediately after creating a work in some type of material form, the creator automatically owns the copyright of that work.
answer
Copyright Act
question
If the current _____ holder has a legitimate reason for using that name and does not appear to be a cybersquatter, WIPO may allow the holder to continue to use that domain name.
answer
domain name
question
Some _____ centers will accept computer equipment, but many charge a fee for this service.
answer
recycling
question
The term _____ refers to standards of moral conduct.
answer
ethics
question
A(n) _____ is a policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
answer
code of ethics
question
A trademark used to identify a service is also called a(n) _____.
answer
service mark
question
Carpal Tunnel Syndrome is an example of a(n) _____ injury.
answer
repetitive stress (RSI)
question
_____ are written with the purpose of being circulated to as many people as possible.
answer
hoaxes (e-mail hoaxes)
question
_____ are the standards of conduct that guide a business's policies, decisions, and actions.
answer
Business ethics
question
Sometimes a different lens prescription or special computer _____ can be used to reduce eyestrain while working on a PC.
answer
glasses
question
View your _____ as a temporary location only; after reading an e-mail message, immediately delete it, flag it, or file it in an e-mail folder.
answer
e-mail Inbox
question
The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as _____, is both dishonest and unethical.
answer
resume padding
question
A(n) _____ is designed primarily to elevate the display screen of a notebook or tablet computer to the proper height.
answer
notebook stand (or docking station)
question
_____ are the legal rights to which the creators of intellectual property—original creative works—are entitled.
answer
Intellectual property rights
question
To help identify and prosecute a "cammer," most movie studios now embed invisible _____ in each print released to a theater.
answer
digital watermarks
question
It now appears that the so-called _____ office that many visionaries predicted would arrive is largely a myth. Instead, research indicates that global paper use has grown more than six-fold since 1950, and one-fifth of all wood harvested in the world today ends up as paper.
answer
paperless
question
The _____ makes it illegal to circumvent antipiracy measures built into digital media and devices.
answer
Digital Millennium Copyright Act (DMCA)
question
What is a computer hoax?
answer
A computer hoax is an inaccurate statement or story—such as the "fact" that flesh-eating bacteria have been found in banana shipments or that Applebee's will send you a gift certificate for forwarding on an e-mail—spread through the use of computers. These hoaxes are sometimes published on Web pages, but they are more commonly spread via e-mail. Common computer hoax subjects include nonexistent computer viruses, serious health risks, impending terrorist attacks, chain letters, and free prizes or giveaways. Inaccurate information posted on a Web site or wiki just to be misleading can also be considered a computer hoax. E-mail hoaxes are written with the purpose of being circulated to as many people as possible.
question
Give some examples of ethically questionable business practices that have been in the news.
answer
One ethical issue a business may run into is whether or not to implement a business process or decision that is ethically questionable. For example, Google and Microsoft are in an ongoing battle about Microsoft's decision to offer its own YouTube app (which Google blocked shortly after its release because the app violated Google's terms of service), and Microsoft is facing a possible $7 billion fine for its decision not to display a screen that would enable European Union Windows users to choose between Internet Explorer and other browsers. Other ethically questionable business decisions relate to customer privacy. For example, several plastic surgeons have been sued recently for posting pre-op and postop photos of patients on their Web sites; in one current case, the photos were posted even though the patient signed a statement that she did not give consent to use her photos for promotional purposes.
question
Explain how patents work.
answer
Unlike copyrights (which protect artistic and literary works) and trademarks (which protect a company's logo and brand names), a patent protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. A patented invention is typically a unique product, but it can also be a process or procedure that provides a new way of doing something or that offers a new technical solution to a problem. Like trademarks, U.S. patents are issued by the U.S. Patent and Trademark Office (USPTO).
question
What is ergonomics?
answer
Ergonomics is the science of fitting a work environment to the people who work there. It typically focuses on making products and workspaces more comfortable and safe to use. With respect to computer use, it involves designinga safeandeffectiveworkspace,whichincludesproperlyadjustingfurnitureandhardwareandusing ergonomic hardware when needed. A proper work environment—used in conjunction with good user habits and procedures— can prevent many physical problems caused by computer use. A proper work environment is importantforanyone whoworksonacomputer,includingemployeesusingacomputeronthejob,individuals usingacomputerathome, andchildrendoingcomputeractivitiesathomeoratschool.
question
What is a trademark? How long do trademarks last?
answer
trademark is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. A trademark used to identify a service is also called a service mark. Trademarks that are claimed but not registered with the U.S. Patent and Trademark Office (USPTO) can use the mark TM; nonregistered service marks can use the symbol SM. The symbol ® is reserved for registered trademarks and service marks. Trademarks for products usually appear on the product packaging with the appropriate trademark symbol; service marks are typically used in the advertising of a service because there is no product on which the mark can be printed. Trademarked words and phrases—such as iPod®, Chicken McNuggets®, Google DocsTM, and FedEx OfficeSM—are widely used today. Trademarked logos are also common. Trademarks last 10 years, but they can be renewed as many times as desired, as long as they are being used in commerce.
question
_____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties. a. WIPO b. DRM c. OLPC d. USPTO
answer
a (WIPO)
question
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. In order to prevent others from stealing her logo, Jill should get a _____. a. patent b. trademark c. copyright d. digital watermark
answer
b (trademark)
question
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is _____. a. copyright law b. religion c. vaporware d. corporate missions
answer
a (copyright law)
question
The term _____ refers to the gap between those who have access to information and communications technology and those who do not. a. digital have not b. digital divide c. Internet divide d. bit divide
answer
b (digital divide)
question
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then _____ and resold. a. reprogrammed b. refurbished c. recharged d. recycled
answer
c (recharged)
question
The goal of _____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self- expression. a. OX b. Simputer c. OLPC d. InternetWorld
answer
c (OLPC)
question
A teacher sharing a poem with a class, leading the class to believe the poem was his original work constitutes _____. a. bad manners b. plagiarism c. trademark theft d. patent infringement
answer
b (plagiarism)
question
To prevent sore or stiff neck, _____. a. use a footrest, if needed, to keep your feet flat b. cover windows or adjust lighting to eliminate glare c. rest and gently stretch your fingers and arms every 15 minutes or so d. place the monitor directly in front of you
answer
d (position the monitor)
question
_____ is an example of assistive output devices. a. One-handed keyboard b. Head-pointing system with puff switch c. Voice input system d. Screen reader software
answer
d (screen reader software)
question
A _____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. a. trademark b. watermark c. patent d. copyright
answer
c (patent)
question
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the _____ of the computer being used to share the movie. a. IP address b. broadcast flag c. RAM d. serial port
answer
a (IP address)
question
A condition known as _____ has been linked to the repetitive finger movements made when using a keyboard. a. ergonomics b. carpal tunnel syndrome (CTS) c. burnout d. computer hand syndrome (CHS)
answer
b (carpal tunnel syndrome)
question
A _____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment. a. code of security b. code of conduct c. privacy policy d. piracy policy
answer
b (code of conduct)
question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of _____. a. DRM b. AACSB c. patents d. RSI
answer
a (DRM)
question
A(n) _____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting. a. trademark b. copyright c. patent d. intellectual ownership right
answer
b (copyright)
question
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to _____ —a state of fatigue or frustration brought about by overwork. a. burnout b. CTS c. CVS d. RSI
answer
a (burnout)
question
n addition to being a copyright concern, _____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even create false or misleading photographs. a. digital counterfeiting b. identity theft c. plagiarism d. digital manipulation
answer
d (digital manipulation)
question
To combat his backache, Jack's doctor advised him to _____. a. use a footrest b. use a lower screen resolution c. turn down the volume when using headphones d. use a light touch on the keyboard
answer
a (footrest)
question
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as _____. a. cyberinvasion b. cyberintrusion c. digital invasion d. cybersquatting
answer
d (cybersquatting)
question
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require _____ to personally vouch for the truth and fairness of their company's disclosures. a. CEOs and CIOs b. CEOs and CFOs c. SOAs and DRMs d. CCVs and DRMs
answer
b (CEOs and CFOs)
question
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the _____ (ADA). a. American Data Act b. Assistive Data Act c. American Democracy Act d. Americans with Disabilities Act
answer
d (Americans with Disabilities Act)
question
One controversial patent granted to Google in 2013 is for "_____" advertising—a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device" (speculated to be Google Glass). a. pay-to-look b. pay-for-play c. pay-for-gaze d. pay-to-view
answer
c (pay-for-gaze)
question
Copyrights apply to both published and unpublished works and remain in effect until _____. a. 10 years after the creation of the work b. 70 years after the creation of the work c. 10 years after the creator's death d. 70 years after the creator's death
answer
d (70 years after creator's death)
question
In 1992, the U.S. Environmental Protection Agency (EPA) introduced _____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions. a. ENERGY STAR b. Eco-Label c. VeriChip d. the Green Power Initiative
answer
a (Energy Star)
question
A _____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder. a. digital patent b. digital trademark c. digital watermark d. digital copyright
answer
c (digital watermark)
question
ill plans to publish a book based on her experiences in order to help young entrepreneurs. To help protect her publishing rights, she should register a _____. a. patent b. trademark c. copyright d. digital watermark
answer
c (copyright)
question
With more than 78% of its population online, _____ is the leading world region in Internet users. a. Middle East b. Europe c. Africa d. North America
answer
d (North America)
question
In addition to being annoying and a waste of time, _____ bog(s) down e-mail systems and clog users' Inboxes. a. computer worms b. Trojan horses c. e-mail hoaxes d. digital manipulation
answer
c (e-mail hoaxes)
question
e-portfolio
answer
A(n) ____ is a collection of an individual's work accessible through a Web site.
question
keyword search
answer
The ____ is the most commonly used Internet search type.
question
RSS
answer
Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.
question
What is RSS?
answer
RSS (Rich Site Summary) is a format for delivering regularly changing web content. Many news-related sites, weblogs and other online publishers syndicate their content as an RSS Feed to whoever wants it.
question
search engine
answer
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
question
Field searches
answer
limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.
question
Address bar
answer
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.
question
search sites
answer
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.
question
XHTML
answer
Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?
question
Snopes
answer
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories
question
Netiquette
answer
____ refers to guidelines for online behavior
question
Ultrabooks
answer
Ultraportables conforming to Intel's standards can be marketed as ____.
question
computer network
answer
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other
question
smart appliances
answer
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
question
software
answer
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
question
two and a half years
answer
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand
question
mouse
answer
Common input devices include the keyboard and ____.
question
Input
answer
____ occurs when data is entered into the computer
question
modems
answer
Two of the most common types of communications hardware are ____ and network adapters.
question
Internet addresses
answer
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people
question
mobile device
answer
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.
question
convertible tablets
answer
Hybrid notebook-tablet computers are also called ____.
question
Shouting
answer
____ refers to typing your entire e-mail message or discussion group post using only capital letters
question
midrange server
answer
A(n) ____ is a medium-sized computer used to host programs and data for a small network
question
microcomputer
answer
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time
question
third-generation computers
answer
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.
question
uniform resource locator (URL)
answer
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page
question
information
answer
When data is processed into a meaningful form, it becomes ____.
question
wikis
answer
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.
question
VOD
answer
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
question
Cable Internet access
answer
____ is the most widely used type of home broadband connection, with over half of the home broadband market.
question
Privacy
answer
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom
question
Online portfolio
answer
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
question
VOIP
answer
Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is ____.
question
blog
answer
Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.
question
Reference
answer
____ sites allow you to generate map and driving directions and provide access to specific types of useful information
question
e-commerce
answer
Online shopping and online investing are examples of ____.
question
BoF
answer
____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.
question
RSS
answer
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.
question
Web-based training (WBT)
answer
____ refers to any instruction delivered via the Web
question
cookies
answer
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences.
question
Internet service providers (ISPs)
answer
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
question
Application service providers (ASPs)
answer
____ are companies that manage and distribute Web-based software services to customers over the Internet.
question
message boards
answer
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects
question
author
answer
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.
question
ICANN (Internet Corporation for Assigned Names and Numbers)
answer
____ is charged with such responsibilities as IP address allocation and domain name management
question
Third-party
answer
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company
question
ARPANET
answer
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
question
security
answer
One advantage of a dial-up connection is ____.
question
Internet Options
answer
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
question
56 Kbps
answer
Conventional dial-up connects to the Internet at a maximum of ____.
question
broadband
answer
Direct Internet connections are typically ____ connections
question
Internet backbone
answer
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies
question
typosquatting
answer
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites
question
USA Patriot Act
answer
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
question
computer worm
answer
Like a computer virus, a ____ is a malicious program designed to cause damage.
question
Data-leakage prevention
answer
software can control which devices can be connected to an employee's computer
question
dot cons
answer
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____
question
bot
answer
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
question
cyberstalking
answer
Repeated threats or other harassment carried out online between adults is referred to as ____.
question
common sense
answer
The best protection against many dot cons is ____.
question
worm
answer
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
question
war driving
answer
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
question
Wi-Fi piggybacking
answer
The term ____ refers to accessing someone else's unsecured WiFi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
question
public
answer
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
question
IPS
answer
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
question
virtual private network
answer
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network
question
Malware
answer
____ is a generic term that refers to any type of malicious software.
question
Pharming
answer
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
question
threat definitions
answer
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
question
EV
answer
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.
question
virus
answer
The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.
question
HushMail
answer
Some Webbased encrypted email systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system
question
Passwords
answer
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual
question
codes of conduct
answer
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
question
Trojan horse
answer
A ____ is a malicious program that masquerades as something else—usually as some type of application program
question
Identity theft
answer
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name
question
Remote
answer
One emerging type of Trojan horse is called a ____-Access Trojan.
question
virus
answer
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
question
Computer sabotage
answer
____ includes any acts of malicious destruction to a computer or computer resource
question
firewall
answer
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
question
Private key encryption
answer
____ uses a single secret key to both encrypt and decrypt the file or message.
question
Biometric access systems
answer
____ identify users by a particular unique biological characteristic
question
firewall
answer
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through
question
Homeland Security Act of 2002
answer
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies
question
Possessed object
answer
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems
question
Hacking
answer
____ refers to the act of breaking into a computer or network.
question
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
answer
HushMail
question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
answer
virtual private network
question
____ are acts of malicious destruction to a computer or computer resource.
answer
Computer sabotage
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
bot
question
____ is a generic term that refers to any type of malicious software.
answer
Malware
question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
answer
virus
question
Like a computer virus, a ____ is a malicious program designed to cause damage.
answer
computer worm
question
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
answer
Trojan horse
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
answer
worm
question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name.
answer
Identity theft
question
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
answer
Identity theft
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
answer
typosquatting
question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
answer
Farming
question
The best protection against many dot cons is ____.
answer
common sense
question
Repeated threats or other harassment carried out online between adults is referred to as ____.
answer
cyberstalking
question
Computer crime is sometimes referred to as ____.
answer
cybercrime
question
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
answer
Unauthorized access
question
____ refers to the act of breaking into a computer or network.
answer
Hacking
question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer
war driving
question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
answer
Wi-Fi piggybacking
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
Passwords
question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
answer
Possessed object
question
____ identify users by a particular unique biological characteristic.
answer
Biometric access systems
question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
answer
firewall
question
____ uses a single secret key to both encrypt and decrypt the file or message.
answer
Private key encryption
question
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
answer
Patches
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
answer
backup
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
disaster recovery plan
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
hot site
question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
answer
information privacy
question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
Marketing databases
question
A marketing activity that can be considered a privacy risk is ____.
answer
electronic profiling
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
When spam is sent via IM it is called ____.
answer
spim
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer
throw-away e-mail address
question
One common way to deal with spam that makes it to your computer is to use a(n) ____.
answer
e-mail filter
question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
opting out
question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
answer
Computer monitoring software
question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer
Video surveillance
question
____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
answer
Video Surveillance
question
____ refers to companies recording or observing the actions of employees while on the job.
answer
Employee monitoring
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
proximity cards
question
Our networked society has raised a number of ____ concerns.
answer
privacy
question
Hardware loss, as well as other security issues, can result from hardware damage (both intentional and accidental) and ____.
answer
system failure
question
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
answer
system failure
question
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
answer
security slot
question
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
answer
Cable locks
question
One recent development in new technology is ____ that can remove contaminants from water sources.
answer
nonparticles
question
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
answer
optical
question
While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.
answer
opto-electronic
question
One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ conferencing.
answer
telepresence
question
Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.
answer
electrical
question
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____.
answer
the number of solid objects between the access point and PC (walls, doors); interference from devices using radio frequencies (baby monitors, microwave ovens); the hardware being used
question
____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
answer
Artificial intelligence
question
____ provide help or assistance for a particular application program. Some can detect when the user might be having trouble with the program and automatically offer appropriate advice.
answer
Application assistants
question
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents.
answer
Semantic
question
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations-for example, the systems that check products for defects at manufacturing plants.
answer
vision
question
When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.
answer
expert
question
____ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled individuals.
answer
BCI
question
Privacy-rights advocates worry that the ____ could someday be used by the government to track citizens.
answer
VeriChip
question
____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty.
answer
DARPA
question
An emerging military robotic application is the ____ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection.
answer
exoskeleton
question
Telesurgery is typically ____ than normal surgery.
answer
less invasive and more precise
question
Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.
answer
silicon
question
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.
answer
external
question
To record data, holographic storage systems split the light from a blue laser beam into two beams-a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.
answer
reference
question
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM) which translates the data's 0s and 1s into a hologram.
answer
spatial
question
Which of the following is an invention of the industrial age?
answer
Telegraph
question
Which of the following is an invention of the information age?
answer
Transistor
question
___ uses computers to test product designs before the physical prototype is built.
answer
Computer aided engineering (CAE)
question
A ___ system lets manufacturers purchase and receive components just before they are needed on the assembly line
answer
Just-in-time manufacturing
question
Which of the following is NOT a component of an MRP system?
answer
Financial Analysis
question
Libraries use the ___ bar code to identify items
answer
CODABAR
question
A bar code represents data that identifies the ___
answer
manufacturer and item number
question
A ___ records purchases, process credit or debit cards, and updates inventory
answer
Point-of-sale system (POS system)
question
Database marketing allows companies to ___
answer
Mine customer databases and create marketing lists
question
___ is technology that allows users connected to a network to transfer money from one back account to another.
answer
EFT
question
An ATM initially connects to a ___ through a network.
answer
Host processor
question
A ___ stores data on a thin microprocessor embedded in the card.
answer
Smart Card
question
Which of the following was NOT used to gather data for the 2000 census?
answer
Optical Character Recognition System
question
The IRS allows you to do all of the following at its site except
answer
Have online chats with reps
question
Which of the following FBI databases contains DNA profiles?
answer
CODIS
question
The ___ was established to help gun dealers perform background checks
answer
NICS
question
Which type of criminal database is often made available to the public?
answer
Sexually violent offenders
question
Computers in red-light systems perform all of the functions except
answer
Sending an electronic message to the violator
question
A Lo-jack device is a wireless
answer
Radio frequency transciever
question
Foreign students with visas to attend US schools must provide personal info to the ___ system
answer
SEVIS
question
A ___ system helps track and manage events during a crisis
answer
Web-based collaboration system
question
The US VISIT database currently stores all of the following types of biometric identifiers except
answer
DNA information
question
All of the following military tech uses GPS except
answer
Computer simulations
question
Computer based patient records are entered, stored, and maintained with the help of an ___ system.
answer
Electronic medical record (EMR)
question
A ___ is a test that records the electrical activity of the heart
answer
Electrocardiogram (EKG)
question
MRI take images inside the body by
answer
Using a powerful magnet & transmitting radio waves through the body
question
DXplain is an example of a ___ system
answer
decision support
question
Which medical website provides a database of reference and abstracts from the National Library of Medicine
answer
MEDLINEplus
question
Which medical website would be most helpful in providing travelers health information on specific destinations
answer
Centers for Disease Control and Prevention
question
What does a GlucoWatch G2 biographer monitor?
answer
Blood Sugar Level
question
Which of the following is NOT used in computer surgery?
answer
Haptic feedback
question
___ is the use of advanced computer tech to help health care professionals consult with each other and work together on cases regardless of where the patients, medical professional and relevant clinical data are located.
answer
Telemedicine
question
Which of the following technologies does NOT use satellite links to transmit data?
answer
Radioscondes
question
Humans have approximately 30,000 ___ that identifies their physical makeup
answer
Genes
question
What is the purpose of the six/four software program?
answer
It gives user in countries that monitor Internet access permission to connect to the Internet through a secure network
question
US courts are not yet settled in regards to the fair use of copyright material for ___
answer
format-shifting
question
Which of the following is not a tenet of the digital millennium copyright act?
answer
Limiting liability of nonprofit information of faculty and graduate students
question
Which of the following protections does the Copyright Term Extension Act provide?
answer
Extends fair use to include ISPs
question
What is the primary objection of the courts towards legislation that limits the distribution of objectionable content?
answer
The government has no right to limit free
question
Which of the following statements is true of cyber stalking?
answer
Cyber stalkers typically locate their victims in chat rooms, bulletin boards or newspaper
question
Which of the following ethical viewpoints state they, if any action is not right for everyone to take, then it is not right for anyone to take?
answer
Universal Law
question
How do news firms counter the ethical concerns over the mixing of advertising links with news stories in a user's search results?
answer
The results pages clearly distinguish the sponsored listings from the other search results
question
_____ magazine altered an image of OJ Simpson in 1994 to
answer
Time
question
Who receives the largest percentages of the profiles ... from downloading music files?
answer
Record Label
question
What service does the web site www.TurnItIn.com provide?
answer
Appraisal of the originality of a student's report
question
Computer process data as ___ that represent on and off states.
answer
Bits
question
A(n)___creates sound from digital instructions input by the user, either via a standard computer keyboard or devices resembling.
answer
synthesizer
question
Which of the following is NOT a MIDI component?
answer
Sequencer
question
In recent years, __ file sharing networks exploded in popularity as a means for people to share music, video, and other files stores on their personal computers.
answer
P2P
question
File ___ involves uploading a music file to a file-sharing network with distortion, silence, or copyright law warnings
answer
Spoofing
question
Dancers rely on a technology called ____to record and analyze their dance movement?
answer
Motion Capture
question
Which of the following theatre departments does not use CAD software?
answer
Box Office
question
Sculptor use ___ to digitally recreate an existing physical object.
answer
3D Scanning
question
After you have created a model for you sculpture. You can use _____ to shape your desired medium.
answer
CNC milling machines
question
Computer - generated fractals use ____ to create art.
answer
Mathematical formulas
question
A home or business photographer must likely use the _____ type of digital camera?
answer
Point-and-Shoot
question
Smart cars maintain a safe driving interval between your car and other vehicles through a(n) ___system.
answer
Adaptive cruise control
question
Which of the following is NOT true of today's smart ties?
answer
Adjust tire pressure dynamically, depending on where you are driving
question
OnStar is an example of a (n) ___ system?
answer
Cell center telematics
question
An electronic toll-collection system uses a ___ to store basic account information.
answer
Transponder
question
A light curtain and treadles are used in an electronic toll collection system to ensure that ____.
answer
All cars are counted and billed correctly.
question
Modern airplanes rely on ____ technology to control landing gear, spoilers and other airplane components?
answer
Fly-by-Wire
question
Which of the following is still performed by human drivers on a civic bus?
answer
Braking
question
The____ oversees all air traffic control in the United States.
answer
ATSCC
question
The U.S. airspace is divided into ____centers.
answer
21
question
Sabre was the first ___ system to be widely distributed.
answer
GDS
question
CAPPS II is a passenger screening system that stores your ticket information in a ___.
answer
Passenger name Record
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
answer
Backup
question
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used.
answer
Information Privacy
question
Collecting in-depth information about an individual is known as_____.
answer
Electronic Profiling
question
Many web site have a(an)____that discloses how the personal information you provide while visiting that web site or while completing a product registration will be used.
answer
Privacy Policy
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____.
answer
Throw-away e-mail address
question
By______, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
Opting Out
question
___ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work - related or crime - prevention purpose.
answer
Video Surveillence
question
____ refers to companies recording of observing the action of employees while on the job.
answer
Employee monitoring
question
____ programs can be used to determine if your activities are being monitored by a hacker or other unauthorized individual.
answer
Anti-spyware Software
question
The ____ Act of 2003 implemented regulations for unsolicited e-mail mess and laid the groundwork for a federal Do Not Email Registry.
answer
CAN-SPAN
question
____ displays are transparent and can emit light toward the top and bottom of the display surface; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen.
answer
TOLED
question
With holographic storage systems, the signal bean passes through a device called a _____ light modulator (SLM) which translates the data's 0s and 1s into a hologram
answer
Spatial
question
One recent development in new technology is ____ that can remove contaminants from water sources.
answer
Nanoparticles
question
A(n) _____ computer uses light, such as from laser beams or infrared beams, to perform digital computations
answer
Optical
question
Power over Ethernet (POE) allow both____ power and data to be sent over standard Ethernet cables
answer
Electrical
question
Developed in the late 1990s, Wi-Fi is a family of wireless networking standards that use the ____IEEE standard.
answer
802.11
question
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____________.
answer
All of the Above
question
_____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
answer
Artificial intelligence
question
_____ provide help or assistance for a particles application program some can detect when the user might be having trouble with the program and automatically offer appropriate advice
answer
Application assistant
question
The _____ web is a predicted evolution of the current web in which all web content is stored in formats that are more easily read by software applications and intelligent agents
answer
Semantic
question
When using a(an) _______system. It's important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users
answer
Expert
question
89. Computer crime is something referred to us_________.
answer
Cybercrime
question
____occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
answer
Unauthorized access
question
_____ refers to the act of breaking into another computer system.
answer
Hacking
question
______ the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
Passwords
question
_____are flash memory drivers that are inserted into a computer to grant access to a network, supply Web site user names and passwords and provides other security features.
answer
USB security token
question
______ identifies users by a particular unique biological characteristic.
answer
Biometric access system
question
______ uses a single secret key to both encrypt and decrypt the file or message.
answer
Private Key encryption
question
______ refers to acts of malicious destruction to a computer or computer resource.
answer
Computer sabotage
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____
answer
Bot
question
_____ is a generic term that refers to any type of malicious software
answer
Malware
question
A_____ is a malicious program that masquerades as something else _usually as some type of application program.
answer
Trojan Horse
question
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
answer
codes of conduct
question
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.
answer
the United States
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New