exam iii Flashcards

1
Q

attempts to slow down or stop a computer by flooding information

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bullying on the internet

A

cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

privacy sercutiy ethics

A

ism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

allows your work to be protected

A

digital millennium copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

allows your work to be protected

A

digital rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an attempted illegal entry to a computer system that uses a dictionary headword list to generate possible passwords

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

vpn hack

A

encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

blocks hacks

A

firewall buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wap2 msot popular

A

wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

to view your records held by government agencies

A

freedom of information act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what your do echos

A

Digital footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

small data files stored on your hard disk from websites your have visited

A

cookie files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

steal on of. yours own indignity

A

indemnity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

generated by an advertising company that is affiliated with the website

A

third party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

misgryae though networks web browsers and attach to different programs

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempts to trick internet users into thinking a fake but official looking website or email is legitimate

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

computers infected by viruses worm or trojan horse

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

protected wifi encrypts

A

visual private networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

incognito blocks

A

privacy mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

displays online advertisements

A

ad ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

viruses worms trojans horse

A

computer bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

produced at regular intervals

A

periods reports

23
Q

custom reports created to answer specific questions or for a specific purpose

A

ad hoc reports

24
Q

call attention to unseal events

A

exception reports

25
Q

track routine operation an records events in database also known as data processing system

A

transiting processing system designed for top management

26
Q

are designed priamryoly to support data works

A

office automation system project managers videocornfrecing systems

27
Q

is to integrate data from different departments

A

a database management

28
Q

operating sytem

A

system software

29
Q

are also known as knowledgable base systems

A

expert systems

30
Q

video conferencing sytem

A

video

31
Q

sql

A

structured query language

32
Q

data stored in tables consisting of rows and columns

A

relational database

33
Q

integrated files used by just one person information or data banks available to users on a wide scale of topics common operation or commonly used fields shared in an organization

A

individual dats bases commercial databases company databases

34
Q

data is processed in two ways; batch and real time

A

data is collected over a period f time and the processing happens later all at one time batch

35
Q

also known as online processing because it happens immediately during the transaction

A

real time processing

36
Q

defines logical estruture

A

data dictionary

37
Q

inputting information into records AND TABLES

A

forms

38
Q

same information into multiple files

A

data redundancy

39
Q

accurate updating of files

A

data integrity

40
Q

describes the process thay maybe related as long as certain conditions remain true

A

loop

41
Q

structured programming instructed code spagethii design

A

structured programming unstructured code spaghetti

42
Q

debugging

A

the process of eliminating errors such as

43
Q

user malfunction user error

A

syntax vs logic

44
Q

program maintenance

A

75% of the cost

45
Q

machine learning

A

first generation

46
Q

program or code

A

list of instructions

47
Q

source code to machine learning

A

a complier

48
Q

converts anf runs the code one statement at a time inmate machine code

A

an interpreter

49
Q

∞th generation five language

A

are known as artificial intelligence

50
Q

input

A

process outpu

51
Q

an outline of the program you will write

A

psuedecodesummary of the program before it is written

52
Q

selection process

A

if then else

53
Q

graphically

A

flowchart

54
Q
A