Computer Apps Test 3
Unlock all answers in this set
Unlock answersquestion
People that collect and sell personal data are called?
answer
Information resellers
question
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files
answer
employee-monitoring software
question
Small data files that are deposited on a user's hard rive when they visit a Web Site are called?
answer
cookies
question
These are used by advertisers to keep track of your Web activity as you move from one site to the next
answer
Third-party cookies
question
Programs used to secretly record an individual's activity on the internet are called:
answer
Spyware
question
Which type of program would likely be used by investigators to record a potential suspects' internet activities?
answer
Keystroke logger
question
This type of computer criminal creates and distributes malicious programs
answer
Cracker
question
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk
answer
Privacy mode
question
Is Ad-Aware a type of malware?
answer
No
question
A program that replicates itself and clogs computers and networks
answer
worm
question
Free computer games and free screen saver programs are typical carriers of _______?
answer
Trojan Horses
question
What is a way to shut down an ISP or Web site?
answer
Denial of service attack
question
What is a fraudulent or deceptive act designed to trick individuals on the internet into spending time or money for little or no return?
answer
Internet Scam
question
The use of the internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person
answer
cyberbullying
question
These crimes include theft of data in the form of confidential information
answer
White-Collar
question
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
answer
Digital Millennium Copyright Act
question
Corporations often use this to prevent copyright violations
answer
(DRM) Digital rights management
question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
answer
Dictionary attack
question
This type of wi-fi hotspot operates close to a legitimate wi-fi hotspot and steals information such as usernames and passwords
answer
Rogue
question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key
answer
Encryption
question
A ______ acts as a security buffer between a corporation's private network and all eternal networks
answer
firewall
question
What is the most widely used wireless network encryption for home wireless networks?
answer
WPA2
question
Which of the following is not a measure to protect computer security?
answer
Keeping the same password on all systems consistently
question
_______ is concerned with protecting software and data from unauthorized tampering or damage
answer
Data security
question
This is a legal concept that gives content creators the right to control use and distribution of their work
answer
Copyright
question
This law gives you the right to look at your personal records held by government agencies
answer
Freedom of Information Act
question
Computer criminals that create and spread viruses are punished under this law
answer
Computer Fraud and Abuse Act
question
Promoting, selling, and distributing, the organization's goods and services pertains to which of the following functions?
answer
Marketing
question
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
answer
Production
question
Who is responsible for operational matters and monitoring day to day events?
answer
Supervisor
question
This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organzation
answer
Top management
question
This level of management is involved with tactical planning and implementing the long term goals within the organization
answer
middle management
question
______ systems help supervisors by generating databases that act as the foundation for other information systems
answer
Transaction processing
question
What refers to a system that summarizes detailed data from the transaction processing systems into standard reports for middle-level managers?
answer
(MIS) Management information systems
question
Who uses management information systems?
answer
Middle management
question
Which system presents information in a highly summarized form?
answer
(ESS) Executive support System
question
A transaction processing system is also referred to as a:
answer
data processing system
question
The ______ activity records the customer requests for products or services
answer
sales order processing
question
Money collected from or owed by customers is called:
answer
accounts receivable
question
The ____ keeps records of the number of each kind of part or finished good in the warehouse
answer
inventory control system
question
what documentation shows the difference between the income and expenses of the company for a specific time period?
answer
income statements
question
This records assets, liabilities, and the equity owned by the owners of an organzation
answer
balance sheet
question
Regional managers can compare their regular sales reports with that of another regional manager by using:
answer
Periodic reports
question
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts
answer
exception
question
this system is a flexible tool for data analysis, since its reports do not have a fixed format
answer
decision support system
question
in a GDSS, the _____ is generally the decision maker
answer
user
question
this typically consists of transactions from the transaction processing system
answer
internal data
question
this decision model helps middle level managers control the work of the organization
answer
tactical model
question
these systems often can be organized to retrieve information from databases outside the company
answer
executive support systems
question
these systems are use din managing documents, communicating, and scheduling
answer
office automation systems
question
project resources can be scheduled, planned and controlled using:
answer
project managers
question
which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?
answer
expert system
question
a collection of activities and elements organized to accomplish a goal
answer
system
question
in this phase of the systems life cycle, the new information systems is installed, and people are trained to use it
answer
systems implementation
question
in this phase of the systems life cycle, new or alternative information systems are designed
answer
systems design
question
this individual studies an organization's systems to determine what actions to take and how to use computer technology to assist them
answer
systems analyst
question
in the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included?
answer
gathering the data
question
in order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this
answer
prepares a preliminary investigation report
question
gathering and analyzing data is part of this phase
answer
systems analysis
question
this shows the relationship between input and output documents
answer
grid chart
question
which of the following is used to show the decision rules that apply when certain conditions occur?
answer
decision table
question
which of the following tools presents data or information flow within an information system?
answer
data flow diagram
question
these tools, also called computer-aided software engineering (CASE) tools, are used in systems analysis to evaluate alternative hardware and software solutions
answer
automated design tools
question
which among the following would not be described in the systems analysis report?
answer
the training requirements for users
question
this is the final task in Phase 3: Systems Design
answer
write a systems design report
question
this is the first step in the systems design phase
answer
design alternative systems
question
in this activity, it is determined whether the system can be made secure against unauthorized use
answer
selecting the best system
question
this document presents the costs versus the benefits and outlines the effect of alternative designs on the organization
answer
systems design report
question
during which phase of the systems life cycle are users trained to use the new system?
answer
systems implementation
question
this selection is the first step in implementing a new system
answer
conversion type
question
this conversion type is not recommended because problems arising in this approach would be disastrous
answer
direct approach
question
this conversion approach is preferred when there are many people in an organization performing similar operations
answer
pilot approach
question
this is the final step of the systems implementation phase of the systems life cycle
answer
train users
question
identify the sixth phase of the systems life cycle
answer
systems maintenance
question
which of the following phases of the systems life cycle is considered to be an ongoing activity?
answer
systems maintenance
question
this is performed to determine whether the new procedures are actually furthering productivity
answer
systems audit
question
this is the process of building a model that can be modified before the actual system is installed
answer
prototyping
question
_____, a privacy issue, relates to the responsibility of controlling who is able to use data
answer
access
question
using publicly available databases, information resellers create ____ and sell them to direct marketers, fundraisers, and others
answer
electronic profiles
question
____ is the illegal assumption of someone's identity for economic profit
answer
identity theft
question
_____-party cookies store information about the current session
answer
first
question
_____-party cookies are used by advertisers
answer
third
question
a ______ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes
answer
hacker
question
_____ bugs are invisible images or HTML code hidden within a web page or email message
answer
web
question
_____ are programs that travel through networks and operating systems and attach themselves
answer
viruses
question
a _______ attack attempts to slow down or stop a computer system or network by sending repetitive info
answer
denial of service
question
_______ attempts to trick internet users into thinking a fake but official-looking website or email is legitimate
answer
phishing
question
computers infected by a virus that allows them to be controlled remotely
answer
zombies
question
_____ scanning devices use fingerprints an iris scanners
answer
biometric
question
______ private networks encrypt connections between company networks and remote users
answer
virtual
question
the ______ department tracks all sales, payments, and transfers of funds
answer
accounting
question
________ level information is primarily vertical
answer
supervisory
question
basic activities are recorded in the
answer
general ledger
question
a typical ________ system can produce income statements and balance sheets
answer
general ledger
question
an MIS requires _______ management system to integrate data from different departments
answer
database
question
a decision support system consists of four parts: the user, system software, data, and _______
answer
decision models
question
________ systems are also known as knowledge-based systems
answer
expert
question
_______ workers use OAS systems
answer
knowledge
question
an ________ is a collection of hardware, software, people, procedures, and data
answer
information system
question
an important aspect of the preliminary investigation phase is to suggest ________
answer
alternatives