IFSM201 Final Exam Review Chapters 9-16

Unlock all answers in this set

Unlock answers
question
involves using a computer resource for unauthorized activities.
answer
unauthorized use
question
includes any illegal act involving a computer.
answer
computer or cyber crime
question
systems determine whether or not the person attempting access is actually who he or she claims to be.
answer
identification
question
one of the biggest disadvantages is that passwords can be forgotten.
answer
password-based systems
question
advocates of __ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer
war driving
question
increasingly, USB security keys, also called USB security ___-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features - are being used.
answer
tokens
question
systems identify users by a particular unique bilogical characteristic.
answer
biometric access
question
is a type of scam that uses spoofed domain names to obtain personnel information for use in fraudulent.
answer
pharming
question
repeated threats or other harrassment carried out online between adults is refferred to as
answer
cyberstalking
question
melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ___, which appears as asterisks on the screen as it is being entered.
answer
password
question
one of the first items that melissa installed was a(n) ___, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
answer
IPS
question
melissa also decided to use an (n) ___, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occuring and block them.
answer
intrusion prevention system (IPS)
question
occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
answer
unauthorized access
question
is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.
answer
encryption
question
has the advantage of presenting material in multiple learning styles.
answer
multimedia
question
after the objectives, intended audience, and basic content to be included in a ___ have been determined, the structure and layout of the site can be designed.
answer
web site
question
multimedia refers to web sites containing more than one type of media-typically sound, video, or animation, in addition to text and images.
answer
web-based
question
the ___ format is commonly used with scanned images.
answer
TIF
question
although broadband internet use is becoming the norm, there are still individuals using __ internet connections.
answer
dial-up
question
users should be able to get to most pages on a web site within __ mouse clicks.
answer
three
question
images are available in many formats, us as TIF, BMP, GIF, JPEG, and ___.
answer
PNG
question
with a streaming audio file, only small portion of the audio file is initially downloaded and ___, and then the audio file can begin playing while the remainder of the file downloads simultaneously.
answer
buffered
question
is a video format developed by microsoft for use with window media player.
answer
.wmv
question
are table of contents pages that contain links to all main pages on the sites.
answer
site maps
question
when a markup language is used, markup ___ are inserted around the web page content to identify where elements are to be displayed and how they should look when displayed.
answer
tags
question
once a web site has been carefully designed, it is time to create it. this process is called ___.
answer
web site development
question
some of the most popular web site authoring programs are microsoft expression web and ___.
answer
adobe dreamweaver
question
in the "about us" section of the web site, the doctor wants to include a photo of her office. she should save this image in the ___ format.
answer
JPEG
question
once andrea has recorded her music in an audio file, she would need to use a ___ method to reduce the size of the file before making it available through her web site.
answer
compression
question
one of the first steps in designing a multimedia application or web sit should be determining the primary objectives of the site and the intended ___.
answer
audience
question
for long web pages, you can include a(n) ___ at the top of the page that allows users to jump to a particular section of the document.
answer
link
question
The newest version of HTML under development is ___ and is designed to replace the current versions of HTML and XHTML.
answer
HTML5
question
although some people are hesitant to send their ___ over the internet, it is by far the most common payment method used for online purchases.
answer
credit card
question
web sites can be designed and developed in-house; instead, businesses have to outsource these tasks to a professional web development company.
answer
e-commerce
question
is available in both installed and web-based versions.
answer
storefront software
question
performed via a mobile phone or other mobile device is referred to as ___.
answer
m-commerce
question
of a site refers to advertising its existence, purpose, and URL.
answer
promotion
question
the collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) ___.
answer
e-commerce system
question
because of the low overhead costs associated with ___, new e-commerce businesses can enter the marketplace relatively inexpensively.
answer
online stores
question
business sell products and services to local, state, federal goverment buyers.
answer
B2G
question
some ___ (VOD) services (like Netflix) offer monthly subscriptions for ulimited movie rental downloads.
answer
video-on-demand
question
___ (owned by ebay) is an online payment service that allows individuals to transfer money easily from their online payment account to someone else's.
answer
paypal
question
___ store checkout information in the customer's account for use with purchases on that site only.
answer
site-specific digital wallets
question
to reassure customers, all e-commerce sites should develop and display a ___ policy stating how collected customer information will be used.
answer
privacy
question
___ are special HTML or XHTML codes that provide information about a Web page and that are inserted into a webpage's code at the time the page is created.
answer
meta tags
question
the goal of ___ is for our web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a web search using keywords related to your site or business.
answer
SSO
question
digital coupon consist of codes-typically called ___ that are entered into the appropiate location on a checkout page to deduct the coupon amount from a purchase total.
answer
coupon codes
question
each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and tranfers it to the ___.
answer
merchant account
question
secure web sites use ___ to safely transfer sensitive data over the internet.
answer
secure web server
question
are typically interactive and provide information on demand whenever a decision needs to be made.
answer
MISs
question
large integrated system that ties together all of a business's activities.
answer
ERP
question
some ___ are designed to take the place of human experts, while others are designed to assist them.
answer
expert systems
question
A(n) ___ typically stores data for an entire enterprise.
answer
data warehouse
question
A(n) ___ (GIS) is an information system that combines geographic information (such as maps and topology and terrain data) with other types of data in order to provide a better understanding of the relationships among the data.
answer
geographic information system
question
can take place in-house or it can be outsourced to external companies.
answer
system development
question
according to the bureau of labor statistics, two of the top five projected fastest growing careers in the united states through 2016 are __.
answer
IT jobs
question
A(n) ___ codes system software, fine-tunes operating system performance, and performs other systems software-related tasks.
answer
application programmers
question
A(n) ___ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer
information system
question
is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
business intelligence
question
managers are usually classified into three categories: executive, ___, and operational.
answer
middle
question
the various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ___, and telecommuting.
answer
collaborative (workgroup) computing
question
an inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ___ management system (WMS).
answer
warehouse
question
artificial intelligence systems that attempt to imitate the way a human brain works are called ___.
answer
neural networks
question
when a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ___.
answer
preliminary investigation
question
systems that link and are used by multiple enterprises-such as a business and its suppliers and other business paartners- are often called ___ systems.
answer
inter enterprise
question
when the data in a decision table is expressed in a tree format, it is called a (n)___.
answer
decision tree
question
describe the types of objects in a system and list the class name, as well as the attributes and methods used with that class.
answer
class diagrams
question
if an application is going to need to interact with existing programs, it will likely be coded in the same ___ as those other programs.
answer
language
question
the property that makes 4GLs easier to use is that they are ___, rather than th procedural third-generation languages.
answer
declarative
question
in a(n) ___program, variables can be accessed and their value changed from any module in the program, as appropriate.
answer
procedural
question
is the process of writing the actual program steps in the proper format for a particular programming language.
answer
program coding
question
errors are notice after all syntax errors are corrected an the program can be executed.
answer
run time
question
although there is no precise definition of ___, they are even further from machine language than fourth-generation languages, and, therefore, are much easier to use.
answer
4GLs
question
much of the coding in a ___ programming language consists of mouse clicks to select instructions and issue commands to the program.
answer
declarative
question
programming focuses on the step-by-step instructions that tell the computer what to do to solve a problem.
answer
procedural
question
in a computer program, ___ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.
answer
variables
question
a ___ is used to illustrate when, how, and in what order the statements in a computer program, module, or method are performed.
answer
control structure
question
with the ___, the instructions in the loop are repeated as long as a certain condition is false.
answer
do until structure
question
a(n) ___ occurs when a do while condition never becomes false or a do until condition never becomes true.
answer
infinite loop
question
a(n) ___ is designed for a specific programming language and translates programs written in that language in to machine language so it can be executed.
answer
complier
question
programmers often use temporary dummy print statements - print statement that are temporarily inserted into the code- to help locate a ___.
answer
logic error
question
programs created for mass distribution often have two stages of testing: an internal onsite test and one or more rounds of outside tests (called ___).
answer
beta tests
question
(ALM) is a broad term to describe creating and managing an application throughout its entire lifecycle-from design through testing.
answer
application lifecycle management
question
Java is currently on the most popular programming languages and has replaced ___ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.
answer
C++
question
(UML) is a set of standard notations that is widely used for modeling object-oriented programs.
answer
unified modeling language
question
at the end of the preliminary debugging process, the original programmer-or, preferably, someone else-runs the program with extensive ___ data to try to find any additional errors remaining in the program.
answer
test
question
common business oriented language is a structured programming language designed for business transaction processing.
answer
COBOL
question
in some systems, ___ is enforced on a per transaction basis.
answer
data integrity
question
arranging data for efficient retrieval is called___.
answer
data organization
question
hashing procedures usually result in two or more records being assigned the same storage address, an event known as a ___.
answer
collision
question
program contains a hybrid XML/relational database server.
answer
IBM's DB2 9
question
one advantage of the ___ architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.
answer
n-tier
question
in determining the location where specific data is to be stored in a(n) ___, factors such as communications cost, response time, storage cost, and security are key considerations.
answer
centralized DBMS
question
objects stored in an ___ can be retrieved using queries, such as with a(n) object query language (OQL)-an object-oriented version of SQL,
answer
OODBMS
question
a field is also called ___.
answer
column
question
a ___ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.
answer
field
question
a record is also called a ___.
answer
row
question
one of the properties that can be assigned to a field is a(n) ___ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.
answer
input mask
question
___ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.
answer
data privacy
question
with ___, the computer uses each record's primary key field and a mathematical formula called hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.
answer
direct organization
question
one of the simplest hashing algorithms involves dividing the primary key field by a particular ___.
answer
prime number
question
in a typical client-server database application, the client is called the ___.
answer
front end
question
if a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ___.
answer
migration
question
web-based database requests are received by the web server, which then converts the request into a database query and passes it on to the database server with the help of software called ___.
answer
middleware
question
a database typically consists of interrelated ___ consisting of fields and records.
answer
tables
question
a(n) ___ is a specific field in a database table that uniquely identifies the records in that table.
answer
primary key
question
___ can occur because of a hardware problem, software problem, or a computer virus.
answer
system failure
question
in response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available ___.
answer
online records
question
at the present time, ___ procedures are confusing and time consuming, and they do not always work well.
answer
opting-out
question
a growing illegal use of computer monitoring software is the use of a keystroke logging system by ___.
answer
hackers
question
one the most obvious types of hardware is ___.
answer
hardware theft
question
to comply with truth-in-advertising laws, a(n) ___ e-mail address included in a unsolicited e-mail must be working address.
answer
unsubscribe
question
___ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
research databases
question
___ met with significant objection to its Beacon advertising service. Beacon introduced in late 2007, was designed to track members' web purchases and other web activities on more than 40 partner sites and share those purchases and activities with the user's friends.
answer
facebook
question
collecting in-depth information about an individual is known ___.
answer
electronic profiling
question
by ___, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
opting out
question
___ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
answer
antispyware software
question
by ___ businesses and consumers about the legal use of software and the possible negative consequences associate with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
answer
educating
question
law enforcement agencies contend that ___ systems and public video surveillance are no different than the many private video surveillance systems in place today.
answer
face recognition
question
a device that protects a computer system from damage due to electrical failure.
answer
surge suppressors
question
our networked society has raised a number of ___ concerns.
answer
privacy
question
___ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime prevention purposes.
answer
video surveillance
question
___ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
answer
backup
question
the ___ recently began pursuing civil litigation against movie pirates.
answer
MPAA
question
employees who reveal wrong doing within an organization to the public or to authorities are referred to as ___.
answer
whistle blowers
question
the ___, such as the ones surronding executives at enron, tyco international, and worldcom, involved lies, fraud, deception, and other illegal and unethical behavior.
answer
scandals
question
in some countries, ___ copies of music, cds, and movie dvds are sold openly.
answer
bootleg
question
___ print embossed output in braille format on paper.
answer
braille printers
question
___ is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidently arrive at the site when trying to type the URL of the legitimate site.
answer
typohunting
question
is new option for taking your legally purchased movies with you on your computer or portable digital media player.
answer
digital copy
question
people who refer to written documents while working on their PCs should use ___ to keep their documents close to their monitors.
answer
document holders
question
a(n) is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
answer
copyright
question
___ is a specialized agency of the united nations and attempts to resolve international commerical disputes about intellectual property between private parties.
answer
WIPO
question
a ___ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.
answer
patent
question
to catch people who are sharing movies illegally on the internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and the identifies the responsible individual by using ___ of the computer being used to share the movie.
answer
IP address
question
in additon to being annoying and a waste of time, ___ bog(s) down e-mail systems and clog user's inboxes.
answer
e-mail hoaxes
question
a conditiion known as carpal tunnel syndrome has been linked to the repetitive finger movements made when using a keyboard.
answer
CTS
question
to prevent sore or ___, place the monitor directly in front of you.
answer
stiff neck
question
___ is an example of assistive output devices.
answer
screen reader software
question
to combat his ___, Jack's doctor advised him to use a lower screen resolution
answer
eyestrain
question
in order to prevent other from stealing her logo, jill should get a ___.
answer
trademark
question
to help identify and prosecute a "cammer" most movie studios now embed invisible ___ in each print released to a theater.
answer
digital
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New