exam iii Flashcards

1
Q

attempts to slow down or stop a computer by flooding information

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bullying on the internet

A

cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

privacy sercutiy ethics

A

ism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

allows your work to be protected

A

digital millennium copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

allows your work to be protected

A

digital rights management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an attempted illegal entry to a computer system that uses a dictionary headword list to generate possible passwords

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

vpn hack

A

encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

blocks hacks

A

firewall buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wap2 msot popular

A

wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

to view your records held by government agencies

A

freedom of information act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what your do echos

A

Digital footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

small data files stored on your hard disk from websites your have visited

A

cookie files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

steal on of. yours own indignity

A

indemnity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

generated by an advertising company that is affiliated with the website

A

third party cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

misgryae though networks web browsers and attach to different programs

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempts to trick internet users into thinking a fake but official looking website or email is legitimate

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

computers infected by viruses worm or trojan horse

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

protected wifi encrypts

A

visual private networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

incognito blocks

A

privacy mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

displays online advertisements

A

ad ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

viruses worms trojans horse

A

computer bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

produced at regular intervals

A

periods reports

23
Q

custom reports created to answer specific questions or for a specific purpose

A

ad hoc reports

24
Q

call attention to unseal events

A

exception reports

25
track routine operation an records events in database also known as data processing system
transiting processing system designed for top management
26
are designed priamryoly to support data works
office automation system project managers videocornfrecing systems
27
is to integrate data from different departments
a database management
28
operating sytem
system software
29
are also known as knowledgable base systems
expert systems
30
video conferencing sytem
video
31
sql
structured query language
32
data stored in tables consisting of rows and columns
relational database
33
integrated files used by just one person information or data banks available to users on a wide scale of topics common operation or commonly used fields shared in an organization
individual dats bases commercial databases company databases
34
data is processed in two ways; batch and real time
data is collected over a period f time and the processing happens later all at one time batch
35
also known as online processing because it happens immediately during the transaction
real time processing
36
defines logical estruture
data dictionary
37
inputting information into records AND TABLES
forms
38
same information into multiple files
data redundancy
39
accurate updating of files
data integrity
40
describes the process thay maybe related as long as certain conditions remain true
loop
41
structured programming instructed code spagethii design
structured programming unstructured code spaghetti
42
debugging
the process of eliminating errors such as
43
user malfunction user error
syntax vs logic
44
program maintenance
75% of the cost
45
machine learning
first generation
46
program or code
list of instructions
47
source code to machine learning
a complier
48
converts anf runs the code one statement at a time inmate machine code
an interpreter
49
∞th generation five language
are known as artificial intelligence
50
input
process outpu
51
an outline of the program you will write
psuedecodesummary of the program before it is written
52
selection process
if then else
53
graphically
flowchart
54