Computer Apps Test 3

100 test answers

Unlock all answers in this set

Unlock answers 100
question
People that collect and sell personal data are called?
answer
Information resellers
question
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files
answer
employee-monitoring software
question
Small data files that are deposited on a user's hard rive when they visit a Web Site are called?
answer
cookies
question
These are used by advertisers to keep track of your Web activity as you move from one site to the next
answer
Third-party cookies
question
Programs used to secretly record an individual's activity on the internet are called:
answer
Spyware
Unlock the answer
question
Which type of program would likely be used by investigators to record a potential suspects' internet activities?
answer
Keystroke logger
Unlock the answer
question
This type of computer criminal creates and distributes malicious programs
answer
Cracker
Unlock the answer
question
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk
answer
Privacy mode
Unlock the answer
question
Is Ad-Aware a type of malware?
answer
No
Unlock the answer
question
A program that replicates itself and clogs computers and networks
answer
worm
Unlock the answer
question
Free computer games and free screen saver programs are typical carriers of _______?
answer
Trojan Horses
Unlock the answer
question
What is a way to shut down an ISP or Web site?
answer
Denial of service attack
Unlock the answer
question
What is a fraudulent or deceptive act designed to trick individuals on the internet into spending time or money for little or no return?
answer
Internet Scam
Unlock the answer
question
The use of the internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person
answer
cyberbullying
Unlock the answer
question
These crimes include theft of data in the form of confidential information
answer
White-Collar
Unlock the answer
question
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
answer
Digital Millennium Copyright Act
Unlock the answer
question
Corporations often use this to prevent copyright violations
answer
(DRM) Digital rights management
Unlock the answer
question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
answer
Dictionary attack
Unlock the answer
question
This type of wi-fi hotspot operates close to a legitimate wi-fi hotspot and steals information such as usernames and passwords
answer
Rogue
Unlock the answer
question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key
answer
Encryption
Unlock the answer
question
A ______ acts as a security buffer between a corporation's private network and all eternal networks
answer
firewall
Unlock the answer
question
What is the most widely used wireless network encryption for home wireless networks?
answer
WPA2
Unlock the answer
question
Which of the following is not a measure to protect computer security?
answer
Keeping the same password on all systems consistently
Unlock the answer
question
_______ is concerned with protecting software and data from unauthorized tampering or damage
answer
Data security
Unlock the answer
question
This is a legal concept that gives content creators the right to control use and distribution of their work
answer
Copyright
Unlock the answer
question
This law gives you the right to look at your personal records held by government agencies
answer
Freedom of Information Act
Unlock the answer
question
Computer criminals that create and spread viruses are punished under this law
answer
Computer Fraud and Abuse Act
Unlock the answer
question
Promoting, selling, and distributing, the organization's goods and services pertains to which of the following functions?
answer
Marketing
Unlock the answer
question
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
answer
Production
Unlock the answer
question
Who is responsible for operational matters and monitoring day to day events?
answer
Supervisor
Unlock the answer
question
This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organzation
answer
Top management
Unlock the answer
question
This level of management is involved with tactical planning and implementing the long term goals within the organization
answer
middle management
Unlock the answer
question
______ systems help supervisors by generating databases that act as the foundation for other information systems
answer
Transaction processing
Unlock the answer
question
What refers to a system that summarizes detailed data from the transaction processing systems into standard reports for middle-level managers?
answer
(MIS) Management information systems
Unlock the answer
question
Who uses management information systems?
answer
Middle management
Unlock the answer
question
Which system presents information in a highly summarized form?
answer
(ESS) Executive support System
Unlock the answer
question
A transaction processing system is also referred to as a:
answer
data processing system
Unlock the answer
question
The ______ activity records the customer requests for products or services
answer
sales order processing
Unlock the answer
question
Money collected from or owed by customers is called:
answer
accounts receivable
Unlock the answer
question
The ____ keeps records of the number of each kind of part or finished good in the warehouse
answer
inventory control system
Unlock the answer
question
what documentation shows the difference between the income and expenses of the company for a specific time period?
answer
income statements
Unlock the answer
question
This records assets, liabilities, and the equity owned by the owners of an organzation
answer
balance sheet
Unlock the answer
question
Regional managers can compare their regular sales reports with that of another regional manager by using:
answer
Periodic reports
Unlock the answer
question
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts
answer
exception
Unlock the answer
question
this system is a flexible tool for data analysis, since its reports do not have a fixed format
answer
decision support system
Unlock the answer
question
in a GDSS, the _____ is generally the decision maker
answer
user
Unlock the answer
question
this typically consists of transactions from the transaction processing system
answer
internal data
Unlock the answer
question
this decision model helps middle level managers control the work of the organization
answer
tactical model
Unlock the answer
question
these systems often can be organized to retrieve information from databases outside the company
answer
executive support systems
Unlock the answer
question
these systems are use din managing documents, communicating, and scheduling
answer
office automation systems
Unlock the answer
question
project resources can be scheduled, planned and controlled using:
answer
project managers
Unlock the answer
question
which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?
answer
expert system
Unlock the answer
question
a collection of activities and elements organized to accomplish a goal
answer
system
Unlock the answer
question
in this phase of the systems life cycle, the new information systems is installed, and people are trained to use it
answer
systems implementation
Unlock the answer
question
in this phase of the systems life cycle, new or alternative information systems are designed
answer
systems design
Unlock the answer
question
this individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them
answer
systems analyst
Unlock the answer
question
in the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included?
answer
gathering the data
Unlock the answer
question
in order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this
answer
prepares a preliminary investigation report
Unlock the answer
question
gathering and analyzing data is part of this phase
answer
systems analysis
Unlock the answer
question
this shows the relationship between input and output documents
answer
grid chart
Unlock the answer
question
which of the following is used to show the decision rules that apply when certain conditions occur?
answer
decision table
Unlock the answer
question
which of the following tools presents data or information flow within an information system?
answer
data flow diagram
Unlock the answer
question
these tools, also called computer-aided software engineering (CASE) tools, are used in systems analysis to evaluate alternative hardware and software solutions
answer
automated design tools
Unlock the answer
question
which among the following would not be described in the systems analysis report?
answer
the training requirements for users
Unlock the answer
question
this is the final task in Phase 3: Systems Design
answer
write a systems design report
Unlock the answer
question
this is the first step in the systems design phase
answer
design alternative systems
Unlock the answer
question
in this activity, it is determined whether the system can be made secure against unauthorized use
answer
selecting the best system
Unlock the answer
question
this document presents the costs versus the benefits and outlines the effect of alternative designs on the organization
answer
systems design report
Unlock the answer
question
during which phase of the systems life cycle are users trained to use the new system?
answer
systems implementation
Unlock the answer
question
this selection is the first step in implementing a new system
answer
conversion type
Unlock the answer
question
this conversion type is not recommended because problems arising in this approach would be disastrous
answer
direct approach
Unlock the answer
question
this conversion approach is preferred when there are many people in an organization performing similar operations
answer
pilot approach
Unlock the answer
question
this is the final step of the systems implementation phase of the systems life cycle
answer
train users
Unlock the answer
question
identify the sixth phase of the systems life cycle
answer
systems maintenance
Unlock the answer
question
which of the following phases of the systems life cycle is considered to be an ongoing activity?
answer
systems maintenance
Unlock the answer
question
this is performed to determine whether the new procedures are actually furthering productivity
answer
systems audit
Unlock the answer
question
this is the process of building a model that can be modified before the actual system is installed
answer
prototyping
Unlock the answer
question
_____, a privacy issue, relates to the responsibility of controlling who is able to use data
answer
access
Unlock the answer
question
using publicly available databases, information resellers create ____ and sell them to direct marketers, fundraisers, and others
answer
electronic profiles
Unlock the answer
question
____ is the illegal assumption of someone's identity for economic profit
answer
identity theft
Unlock the answer
question
_____-party cookies store information about the current session
answer
first
Unlock the answer
question
_____-party cookies are used by advertisers
answer
third
Unlock the answer
question
a ______ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes
answer
hacker
Unlock the answer
question
_____ bugs are invisible images or HTML code hidden within a web page or email message
answer
web
Unlock the answer
question
_____ are programs that travel through networks and operating systems and attach themselves
answer
viruses
Unlock the answer
question
a _______ attack attempts to slow down or stop a computer system or network by sending repetitive info
answer
denial of service
Unlock the answer
question
_______ attempts to trick internet users into thinking a fake but official-looking website or email is legitimate
answer
phishing
Unlock the answer
question
computers infected by a virus that allows them to be controlled remotely
answer
zombies
Unlock the answer
question
_____ scanning devices use fingerprints an iris scanners
answer
biometric
Unlock the answer
question
______ private networks encrypt connections between company networks and remote users
answer
virtual
Unlock the answer
question
the ______ department tracks all sales, payments, and transfers of funds
answer
accounting
Unlock the answer
question
________ level information is primarily vertical
answer
supervisory
Unlock the answer
question
basic activities are recorded in the
answer
general ledger
Unlock the answer
question
a typical ________ system can produce income statements and balance sheets
answer
general ledger
Unlock the answer
question
an MIS requires _______ management system to integrate data from different departments
answer
database
Unlock the answer
question
a decision support system consists of four parts: the user, system software, data, and _______
answer
decision models
Unlock the answer
question
________ systems are also known as knowledge-based systems
answer
expert
Unlock the answer
question
_______ workers use OAS systems
answer
knowledge
Unlock the answer
question
an ________ is a collection of hardware, software, people, procedures, and data
answer
information system
Unlock the answer
question
an important aspect of the preliminary investigation phase is to suggest ________
answer
alternatives
Unlock the answer
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New