Chapter 10 Flashcards

1
Q

Reverse ________ list telephone numbers followed by subscriber names.

A

directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The privacy issue that relates to the responsiblity of controlling who is able to use data is:

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two basic types of cookies are _________

A

ad network and traditional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A small image or other HTML code that is hidden within an e-mail message is called a ________.

A

web bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

People who create or improve programs and share those programs are ________.

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

A

denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secret words or phrases used to gain access to a computer system are called

A

passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer __________ are guidlines for the morally acceptable use of computers to our society.

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Copyright is a(n) __________ concept that gives content creators the right to control use and distribution of their work.

A

legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_________ is a collection of technologies designed to prevent copyright violations.

A

DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Programs that record virtually every activity on a computer system.

A

Snoopware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of cookie that records activities across different sites.

A

Ad Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Relates to who owns data and rights to software

A

Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack that overwhelms Web sites with data making them inaccessible.

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security hardware and software that controls access to internal computer networks.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Belief that there is little threat to personal privacy via the Internet.

A

Illusion of anonymity

17
Q

Programs that alert users when certain viruses enter a system

A

virus checkers

18
Q

Gains unauthorized access to a system for malicious purposes

A

cracker

19
Q

Illegal action involving special knowledge of computer technology.

A

Computer crime

20
Q

Replicates itself over a network–spreading to other systems automatically

A

worm