Exam 1 Review Modules 1-5 Flashcards

1
Q

Module 1 Terms
What is computer literacy?
Computer literacy is….

A

the skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information literacy?

Information Literacy is….

A

the understanding the role of information in generating and using business intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Business Intelligence?

Business Intelligence is…

A

provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(TPSs) Transaction processing systems are…

A

focus on data collection and processing; the major reason for using them is cost reduction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(MIS) Management information systems are..

A

an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Major components of information systems are

A

data, database, the process, and the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data component

A

consists of raw facts and is a component of an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database component

A

a collection of all relevant data organized in a series of integrated files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process component

A

component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information component

A

consists of facts that have been analyzed by the process component and is an output of an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Useful information must be/have

A

timeliness, integrate with other data/information, consistency and accuracy, relevance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information technologies are

A

support information systems and use the Internet, computer networks, database systems, POS systems, and RFID tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Five Forces Model

A

Buyer Power, Supplier Power, Threat of substitute goods/services, Threat of new entrants, Rivalry among competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Buyer Power

A

Is high when customers have many option and low when they have fewer options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Supplier Power

A

Is high when customers have limited options and is low when customers have more options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

threat of substitute goods/ services

A

organizations use strategies to avoid the threat to gain customer loyalties. Ex. Fees, or Benefits depends on customer’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat of new entrants

A

Typically very low, organizations use focus strategies to prevent others duplicating or take customers from them. Ex. Bank switching takes a lot of time customers don’t want to waste.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Rivalry among competitors

A

is high when multiple competitor occupy the same marketplace, low when there are fewer competitors in a marketplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CTO/CIO

A

chief information officer or chief technology officer person oversees long-range planning and keeps eye on developments in the field that affects an company’s success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPO

A

executive position includes the responsibility of managing the risks and business impacts of privacy laws and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

webmaster

A

designs and maintains an organizations website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

computer programmer

A

writes computer programs or software segments that allow the information system to preform a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

database administrator

A

responsible for database design and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

network administrator

A

This person oversees a company’s internal and external network systems, designing and implementing network systems that deliver correct information to the right decision maker in a timely manner. Providing network and cybersecurity is part of this position’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Module 2

Computers are

A

is a machine that accepts data as input, processes data without human intervention by using stored instructions, and outputs information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Computer system are

A

consists of hardware and software. Hardware components are physical devices, such as keyboards, monitors, and processing units. The software component consists of programs written in computer languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

central processing unit CPU

A

is the heart of a computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

arithmetic logical units ALU

A

performs arithmetic operations (+, −, ∗, /) as well as comparison or relational operations (, =); the latter are used to compare numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

control unit

A

tells the computer what to do, such as instructing the computer which device to read or send output to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

disk drive

A

is a peripheral device for recording, storing, and retrieving information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CPU case

A

is also known as a computer chassis or tower. It is the enclosure containing the computer’s main components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

motherboard

A

is the main circuit board containing connectors for attaching additional boards. It usually contains the CPU, basic input/output system (BIOS), memory, storage, interfaces, serial and parallel ports, expansion slots, and all the controllers for standard peripheral devices, such as the display monitor, disk drive, and keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Speed of computers

A

Computers process data with amazing speed. They are capable of responding to requests faster than humans can, which improves efficiency. Today’s high-speed computers make it possible for knowledge workers to perform tasks much faster than with the slower computers of the past. Typically, computer speed is measured as the number of instructions performed during the following fractions of a second:

Millisecond: 1/1,000 of a second

Microsecond: 1/1,000,000 of a second

Nanosecond: 1/1,000,000,000 of a second

Picosecond: 1/1,000,000,000,000 of a second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Accuracy of computers

A

Unlike humans, computers do not make mistakes. To understand computer accuracy more clearly, take a look at these two numbers:

4. 0000000000000000000000001
4. 0000000000000000000000002

To humans, these two numbers are so close that they are usually considered equal. To a computer, however, these two numbers are completely different. This degree of accuracy is critical in many computer applications. On a space mission, for example, computers are essential for calculating reentry times and locations for space shuttles. A small degree of inaccuracy could lead the space shuttle to land in Canada instead of the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Storage and Retrieval of computers

A

Storage means saving data in computer memory, and retrieval means accessing data from memory. Computers can store vast quantities of data and locate a specific item quickly, which makes knowledge workers more efficient in performing their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

size of storage

A

1 bit A single value of 0 or 1
8 bits 1 byte or character
2^10 bytes 1,000 bytes, or 1 kilobyte (KB)
2^20 bytes 1,000,000 bytes, or 1 megabyte (MB)
2^30 bytes 1,000,000,000 bytes, or 1 gigabyte (GB)
2^40 bytes 1,000,000,000,000 bytes, or 1 terabyte (TB)
2^50 bytes 1,000,000,000,000,000 bytes, or 1 petabyte (PB)
2^60 bytes 1,000,000,000,000,000,000 bytes, or 1 exabyte (EB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

input devices

A

send data and information to the computer. Examples include a keyboard and mouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

output devices

A

is capable of representing information from a computer. The form of this output might be visual, audio, or digital; examples include printers, display monitors, and plotters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

main memory devices

A

stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer’s performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

secondary memory devices

A

which is nonvolatile, holds data when the computer is off or during the course of a program’s operation. It also serves as archival storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

random access memory RAM

A

is volatile memory, in which data can be read from and written to; it is also called read-write memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

cache RAM

A

resides on the processor. Because memory access from main RAM storage takes several clock cycles (a few nanoseconds), cache RAM stores recently accessed memory so the processor is not waiting for the memory transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

read-only memory

A

is nonvolatile; data cannot be written to ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

magnetic disk

A

made of Mylar or metal, is used for random-access processing. In other words, data can be accessed in any order, regardless of its order on the surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

magnetic tape

A

is made of a plastic material and stores data sequentially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

redundant array of independent disks raid

A

system is a collection of disk drives used for fault tolerance and improved performance and is typically found in large network systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

cloud storage

A

Used for online storage and backup, cloud storage involves multiple virtual servers that are usually hosted by third parties. Customers buy or lease storage space from third parties based on their current or future needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

server

A

a computer and all the software for managing network resources and offering services to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

operating system

A

a set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

bus

A

is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

application software

A

can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

machine language

A

the first generation of computer languages, consists of a series of 0s and 1s representing data or instructions. It is dependent on the machine, so code written for one type of computer does not work on another type of computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

assembly language

A

the second generation of computer languages, is a higher-level language than machine language but is also machine dependent. It uses a series of short codes, or mnemonics, to represent data or instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

high level languages

A

are machine independent and part of the third generation of computer languages. Many languages are available, and each is designed for a specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

fourth generation languages

A

use macro codes that can take the place of several lines of programming. The commands are powerful and easy to learn, even for people with little computer training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

fifth generation languages

A

use some of the artificial intelligence technologies, such as knowledge-based systems, natural language processing (NLP), visual programming, and a graphical approach to programming. These languages are designed to facilitate natural conversations between you and the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

object oriented programming

A

language is organized around a system of objects that represent the real world as opposed to a series of computational steps used in traditional languages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

object

A

an item that contains both data and the procedures that read and manipulate it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

modularity

A

Codes are written for specific and self-contained modules. This makes it easier to write codes, modify them, and troubleshoot them easier than traditional codes. New features can easily be added as new modules without any impact on existing modules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

reuse of codes for other purposes

A

Codes written for one object can be simply modified by maintaining its major parts and applying it to another object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

effective problem solving

A

OOP languages allow the programmer to break down a program into small-sized problems that a programmer can solve one module or one object at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Module 3

database

A

a collection of related data that is stored in a central location or in multiple locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

data hierarchy

A

the structure and organization of data, which involves fields, records, and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

database management system dbms

A

software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

sequential access fire structure

A

records in files are organized and processed in numerical or sequential order, typically the order in which they were entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

random access file structure

A

records can be accessed in any order, regardless of their physical locations in storage media. This method of access is fast and very effective when a small number of records need to be processed daily or weekly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

physical view

A

involves how data is stored on and retrieved from storage media, such as hard disks or magnetic tapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

logical view

A

involves how information appears to users and how it can be organized and retrieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

relational model

A

uses a two-dimensional table of rows and columns of data. Rows are records (also called tuples), and columns are fields (also referred to as attributes).

70
Q

data dictionary

A

stores definitions, such as data types for fields, default values, and validation rules for data in each field.

71
Q

primary key

A

uniquely identifies every record in a relational database. Examples include student ID numbers, account numbers, Social Security numbers, and invoice numbers.

72
Q

foreign key

A

a field in a relational table that matches the primary key column of another table. It can be used to cross-reference tables.

73
Q

normalization

A

improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.

74
Q

components of DBMS

A

Database engine

Data definition

Data manipulation

Application generation

Data administration
75
Q

structured query language

A

a standard fourth-generation query language used by many DBMS packages, such as Oracle 12c and Microsoft SQL Server. SQL consists of several keywords specifying actions to take.

76
Q

query by example

A

you request data from a database by constructing a statement made up of query forms. With current graphical databases, you simply click to select query forms instead of having to remember keywords, as you do with SQL. You can add AND, OR, and NOT operators to the QBE form to fine-tune the query.

77
Q

create, read, update, and delete

A

refers to the range of functions that data administrators determine who has permission to perform certain functions.

78
Q

graph database

A

a database that uses graph structures for query operation with nodes, edges, and properties to represent and store data.

79
Q

data-driven web site

A

acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.

80
Q

distributed database management system

A

stores data on multiple servers throughout an organization.

81
Q

fragmentation approach

A

approach to a distributed DBMS addresses how tables are divided among multiple locations. There are three variations: horizontal, vertical, and mixed.

82
Q

replication approach

A

approach to a distributed DBMS has each site store a copy of the data in the organization’s database.

83
Q

allocation approach

A

approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often.

84
Q

object oriented databases

A

both data and their relationships are contained in a single object. An object consists of attributes and methods that can be performed on the object’s data.

85
Q

encapsulation

A

refers to the grouping into a class of various objects along with their attributes and methods—meaning, grouping related items into a single unit. This helps handle more complex types of data, such as images and graphs

86
Q

inheritance

A

refers to new objects being created faster and more easily by entering new data in attributes.

87
Q

data warehouse

A

a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.

88
Q

extraction, transformation, and learning

A

refers to the processes used in a data warehouse. It includes extracting data from outside sources, transforming it to fit operational needs, and loading it into the end target (database or data warehouse).

89
Q

online transaction processing

A

is used to facilitate and manage transaction-oriented applications, such as point-of-sale, data entry, and retrieval transaction processing. It generally uses internal data and responds in real time.

90
Q

online analytical processing

A

generates business intelligence. It uses multiple sources of information and provides multidimensional analysis, such as viewing data based on time, product, and location.

91
Q

data march

A

usually a smaller version of a data warehouse, used by a single department or function.

92
Q

Business analytics

A

uses data and statistical methods to gain insight into the data and provide decision makers with information they can act on.

93
Q

big data

A

is data so voluminous that conventional computing methods are not able to efficiently process and manage it.

94
Q

Five dimensions of big data

A

variety, velocity, veracity, and value.

95
Q

volume

A

The sheer quantity of transactions, measured in petabytes (1,024 terabytes) or exabytes (1,024 petabytes). Here are four examples of big data volume:

All the packages shipped through the U.S. Postal Service the week before Christmas

The sales of all Walmart stores on Black Friday

All the items purchased from Amazon on Cyber Monday

The number of Tweets sent or received around the world per day
96
Q

variety

A

The combination of structured data (e.g., customers’ product ratings between 1 and 5) and unstructured data (e.g., call center conversations or customer complaints about a service or product). Most data available on social networks is unstructured. Businesses combine data collected from the Internet and various handheld and mobile devices with location-related data and multimedia data. Machine-to-machine communication data, which is collected and transmitted automatically, also plays a major role in big data operations.

97
Q

velocity

A

The speed with which the data has to be gathered and processed. As an example, imagine a billboard that could display a particular ad as soon as a particular customer drives by it. The billboard would recognize the driver’s face by comparing it to a huge database, integrate that data with the driver’s social media data, find out what the driver’s favorites are based on the number of likes and dislikes on his or her Facebook page, then display the applicable ad. All of this would need to happen in a nanosecond; otherwise, the window of opportunity will be lost!

98
Q

veracity

A

The trustworthiness and accuracy of the data. For example, social media posts, abbreviations, typos, and colloquial speeches make this dimension important. However, in most cases volumes make up for the lack of quality or accuracy

99
Q

value

A

The value that the collected data brings to the decision-making process. If there is no value then the entire process of data collection and analysis would be a waste of resources and miss the windows of opportunities. That is why “value” is the most important “V” of big data.

100
Q

privacy risks

A

Discrimination: Big data analytics may reveal information that gives a decision maker—such as a banker— a reason to approve or decline an individual’s loan application.

Privacy breaches and embarrassments: Big data analytics may reveal that a customer of a retailer, for example, is pregnant, by sending out pregnancy promotional materials. The individual may not have yet made her pregnancy public, creating embarrassment and privacy issues for that individual.

Unethical actions based on interpretations: Big data analytics may be misinterpreted and offer support for a decision that, while legal, may not be ethical.

Loss of anonymity: Big data analytics, by combining several datasets and cross-referencing various data, could easily reveal the identity of individuals whose data were analyzed.

Few legal protections exist for the involved individuals: There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics.
101
Q

database marketing

A

uses an organization’s database of customers and potential customers to promote products or services.

102
Q

Tableau

A

a data visualization tool used for generating business intelligence. It is used to analyze data for generating trends using graphs and charts.

103
Q

Power BI

A

a platform that allows a user to analyze and visualize data from different sources with different formats.

104
Q

Module 4

fake news

A

news, stories, or hoaxes created to intentionally misinform or deceive readers.

105
Q

deep fakes

A

news, stories, or hoaxes created to intentionally misinform or deceive readers.

106
Q

acceptable use policies

A

a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

107
Q

accountability

A

refers to issues involving both the user’s and the organization’s responsibilities and liabilities.

108
Q

nonrepudiation

A

is a method for binding all the parties to a contract.

109
Q

spam

A

is an unsolicited e-mail sent for advertising purposes.

110
Q

Ten Commandments of Computer Ethics

A

Thou shalt not use a computer to harm other people.

Thou shalt not interfere with other people’s computer work.

Thou shalt not snoop around in other people’s files.

Thou shalt not use a computer to steal.

Thou shalt not use a computer to bear false witness.

Thou shalt not use or copy software for which you have not paid.

Thou shalt not use other people’s computer resources without authorization.

Thou shalt not appropriate other people’s intellectual output.

Thou shalt think about the social consequences of the program you write.

Thou shalt use a computer in ways that show consideration and respect

111
Q

social media networking ethics

A

advocates that social media should be open and provide fair access to all of its users.

112
Q

SME Continued…

A

Authenticity—Members should be trustworthy and sincere

Transparency—Members should be honest and open with no hidden agenda

Communication—Members should be open to know other members and be able to communicate openly
113
Q

business networking ethics

A

advocates that in order to maintain a business network, not only should the organization provide open and fair access to all authorized users, it should also consider three types of networking, including utilitarian, emotional, and virtuous.

114
Q

Types of BNE

A

Utilitarian networking—Ensures that the networking is a true utility, truthful, and is not wasting its users’ time.

Emotional networking—Ensures that users will empathize with being ethical in all situations and emotion should not play a role.

Virtuous networking—Ensures that all parties will act in good faith by sharing honest goals and participating in legitimate activities.
115
Q

Censorship

A

hiding or limit the access and information from the Internet

116
Q

Public information

A

posted by an organization or public agency, can be censored for public policy reasons—such as not allowing military secrets to be published, lest the information fall into enemy hands. Public information can also be censored if the content is deemed offensive to a political, religious, or cultural group. However, private information—what is posted by a person—is not subject to censorship because of your constitutional freedom of expression.

117
Q

private information

A

what is posted by a person—is not subject to censorship because of your constitutional freedom of expression

118
Q

Restricted Access to the Web

A

Another type of censorship is restricting access to the Web. Some countries, such as China, Myanmar (Burma), and Singapore, restrict or forbid their citizens’ access to the Web or try to censor the information posted on the Web.

119
Q

internet neutrality

A

Internet neutrality (also known as “net neutrality”) must be practiced in all cases. According to this principle, Internet service providers (ISPs) and government agencies should treat all data on the Internet equally—that is, they should not block traffic, charge different rates, or discriminate in any way based on user, content, Web site, types of equipment in use, telecommunication provider, platform, or application

120
Q

Children locks for parents on the Internet

A

Another concern is children searching for information on the Web. If a search includes keywords such as toys, pets, boys, or girls, for example, the results could list pornography sites. Guidelines for Web use have been published to inform parents of the benefits and hazards of the Web, and parents can use these to teach their children to use good judgment while on the Web

121
Q

intellectual property

A

is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses.

122
Q

cybersquatting

A

is registering, selling, or using a domain name to profit from someone else’s trademark.

123
Q

digital divide

A

Information technology and the Internet have created a digital divide. Computers are still not affordable for many people. The digital divide has implications for education.

124
Q

virtual organizations

A

are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.

125
Q

IT Harms

A

Teen tendonitis: Too much texting and poor posture cause pain in the hands, back, and neck.

Stress: Too much time spent on handheld devices causes stress and fatigue.

Sleep loss: Because most teenagers (and many adults) keep their smartphones nearby while sleeping, sleep interruption and sleep deprivation may result.

Accidents: Some teens use their smartphones while driving for answering calls or texts; this may cause accidents.

Increased anxiety: Delays in response or no response causes anxiety for teens.

Cyberbullying: Studies show that nearly one-third of teens are victims of cyberbullying where identities of the perpetrators cannot be recognized.

Risk of cancer: Although this is not conclusive, teens may have a greater risk of developing brain cancer for excessive use of smartphones compared to adults.
126
Q

It Therapy Advice

A

Admit that you have a problem.

Limit your Internet and smartphone use.

Change communication patterns by not using mobile devices.

Socialize with family and friends more.

Find interests that does not involve mobile devices.

Set and adhere to a schedule for mobile device use.

Keep mobile devices inaccessible.

Turn off your mobile devices at certain times of the day.

Don’t bring your mobile device to bed.

Ask for professional help!
127
Q

Green computing

A

involves the design, manufacture, use, and disposal of computers, servers, and computing devices (such as monitors, printers, storage devices, and networking and communications equipment) in such a way that there is minimal impact on the environment.

128
Q

Module 5

Costs of Cyber crime

A

cybercrime could cost companies globally $5.2 trillion over the next five years The total cost will also include the expense of enhancing and upgrading a company’s network security after an attack. The CSIS (Center for Strategic and International Studies) report went further and included the opportunity costs associated with downtime and lost trust as well as the loss of sensitive business information. Job losses would include manufacturing jobs as well as jobs where stolen trade secrets and other intellectual properties resulted in jobs being moved overseas.In fact, the total cost may even be higher than the CSIS report projects, given that businesses often do not reveal or admit certain cybercrimes or do not even realize the amount of damage that has been caused by computer criminals and cyber criminals.

129
Q

Spyware

A

software that secretly gathers information about users while they browse the Web.

130
Q

Adware

A

a form of spyware that collects information about the user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.

131
Q

phishing

A

sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

132
Q

pharming

A

directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. The difference is that pharmers usually hijack an official Web site address, then alter its IP address so that users who enter the correct Web address are directed to the pharmers fraudulent Web site.

133
Q

Baiting

A

in similar to phishing attacks. What distinguishes it from phishing is the promise that the baiter gives to the recipient.

134
Q

quid pro quo

A

Similar to baiting, quid pro quo involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize.

135
Q

smishing

A

This technique tricks a user to download malware onto his or smartphone or other mobile devices.

136
Q

vishing

A

This technique tricks a user to download malware onto his or smartphone or other mobile devices.

137
Q

keystroke loggers

A

This technique tricks a user to download malware onto his or smartphone or other mobile devices.

138
Q

sniffing

A

capturing and recording network traffic.

139
Q

computer fraud

A

the unauthorized use of computer data for personal gain.

140
Q

confidentiality

A

means that a system must prevent disclosing information to anyone who is not authorized to access it

141
Q

integrity

A

refers to the accuracy of information resources within an organization.

142
Q

availability

A

means that computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

143
Q

fault tolerant system

A

ensure availability in the event of a system failure by using a combination of hardware and software.

144
Q

internal threats

A

Viruses

Worms

Trojan programs

Logic bombs

Backdoors

Blended threats (e.g., a worm launched by a Trojan)

Rootkits

Denial-of-service attacks

Social engineering

Cryptojacking
145
Q

virus

A

consists of self-propagating program code that is triggered by a specified time or event. When the program or operating system containing the virus is used, the virus attaches itself to other files, and the cycle continues.

146
Q

worms

A

travels from computer to computer in a network, but it does not usually erase data. Unlike viruses, worms are independent programs that can spread themselves without having to be attached to a host program.

147
Q

Trojan program

A

contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program. Users run the program, unaware that the malicious program is also running in the background.

148
Q

logic bomb

A

a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program.

149
Q

backdoor

A

(also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

150
Q

blended threat

A

a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

151
Q

rootkit

A

is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected

152
Q

denial of service

A

attack floods a network or server with service requests to prevent legitimate users’ access to the system.

153
Q

social engineering

A

takes advantage of the human element of a security system to trick others into revealing private information.

154
Q

cryptojacking

A

where hackers secretly use the computing power of a user in order to mine cryptocurrency.

155
Q

biometeric security measures

A

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

156
Q

callback modems

A

verifies whether a user’s access is valid by logging the user off (after he or she attempts to connect to the network) and then calling the user back at a predetermined number.

157
Q

firewalls

A

a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

158
Q

intrusion detection system

A

an protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

159
Q

physical security measures

A

primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.

160
Q

access controls

A

designed to protect systems from unauthorized access in order to preserve data integrity.

161
Q

passwords

A

a combination of numbers, characters, and symbols that is entered to allow access to a system.

162
Q

VPN

A

A virtual private network (VPN) provides a secure “tunnel” through the Internet for transmitting messages and data via a private network

163
Q

data encryption

A

transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

164
Q

Secure Sockets Layer (SSL)

A

a commonly used encryption protocol that manages transmission security on the Internet.

165
Q

Transport Layer Security (TLS)

A

a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet.

166
Q

PKI (public key infrastructure)

A

enables users of a public network such as the Internet to securely and privately exchange data through the use of a pair of keys—a public one and a private one—that is obtained from a trusted authority and shared through that authority.

167
Q

Asymmetric encryption

A

uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient’s

168
Q

symmetric encryption

A

(also called secret key encryption), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.

169
Q

CERT

A

The Computer Emergency Response Team (CERT) was developed by the Defense Advanced Research Projects Agency (part of the Department of Defense) in response to the 1988 Morris worm attack, which disabled 10 percent of the computers connected to the Internet. Many organizations now follow the CERT model to form teams that can handle network intrusions and attacks quickly and effectively. Currently, CERT focuses on security breaches and DoS attacks and offers guidelines on handling and preventing these incidents. CERT also conducts a public awareness campaign and researches Internet security vulnerabilities and ways to improve security systems. Network administrators and e-commerce site managers should check the CERT Coordination Center for updates on protecting network and information resources.

170
Q

zero trust security

A

requires every person and every device that accesses a network must be secured regardless if it is within the organization or outside of it.

171
Q

business continuity planning

A

outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.