Foundations of ITM Flashcards

1
Q

refers to the comprehensive set of tools, systems, and processes that manage, store, process, and communicate information in electronic form

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the collection of physical and virtual resources that support and enable the functioning of IT systems

A

Information technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provides the necessary foundation for IT systems to operate, ensuring their stability, reliability, and scalability

A

IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an individual part or element of an information technology (IT) system or infrastructure

A

IT component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

work together to support the delivery of IT services and enable the functioning of an organization’s technology environment

A

IT component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

broadly categorized into hardware, software, and networking elements

A

IT components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the application of technical expertise, processes, and resources to create, manage, and deliver value to customers or end-users within an organization

A

IT Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

include, but are not limited to, data storage and backup, cloud services, cybersecurity, and IT consulting

A

IT Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to the delivery of computing resources, services, and applications over the internet rather than hosting them on-premises within an organization’s own IT infrastructure

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a collection of hardware, software, data, people, and procedures that work together to process, store, and distribute information to support decision-making, coordination, control, analysis, and visualization in an organization

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

six components of IT infrastructure

A
  1. hardware
  2. software
  3. networks
  4. data
  5. people
  6. processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

physical and tangible parts of a computer

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the “brains” of the computer and executes instructions required by the software

A

central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a main circuit board

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A popular interface for connecting high-definition displays, such as monitors and TVs, to computers

A

HDMI (High-Definition Multimedia Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Older video interfaces used to connect monitors and projectors to computers.

A

VGA (Video Graphics Array) and DVI (Digital Visual Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A high-performance video and audio interface used to connect monitors and other displays to computers

A

DisplayPort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A wired networking interface used to connect computers to local area networks (LANs) and the internet.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ports for connecting audio devices, such as speakers, microphones, and headphones, to computers

A

Audio jacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A wireless technology used to connect peripherals, such as keyboards, mice, headphones, and speakers, without the need for cables

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A wireless networking technology that allows computers to connect to the internet or local networks without the need for Ethernet cables.

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a set of computer instructions that tell the computer how to work and perform tasks.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 categories of software

A
  1. application
  2. utility
  3. system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

software an end user chooses to use that accomplishes a specific task for the user (e.g., Microsoft Excel and Adobe Photoshop)

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

software that performs a particular function in the background and requires little to no interaction with the user but is essential to the functioning of the computer (e.g., printer drivers and virus protection)

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

software that supports a computer’s basic functions, such as scheduling tasks, executing applications, and controlling peripherals (e.g., Microsoft Windows, macOS, and Linux)

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A computer network consists of two or more devices

A

network nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

allow employees to access resources and work remotely from different locations

A

Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

facilitate centralized management of IT resources, making it easier to monitor, maintain, and troubleshoot systems and devices

A

Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

enable organizations to implement centralized backup and disaster recovery solutions, ensuring data protection and continuity in case of system failures or other issues

A

Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

often considered as the backbone of the IT infrastructure

A

Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

raw, unprocessed facts, figures, and information collected and stored in various formats

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

very valuable asset that a company can acquire

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

an organized collection of structured data that is stored and managed in a way that allows for efficient access, retrieval, modification, and manipulation

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

smaller, focused data storage solutions catering to specific business units, departments, or functions, containing a subset of data from a larger data warehouse

A

data marts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

centralized storage systems for raw, unprocessed, or semi-structured data, capable of handling various file formats and types of data, often used for big data analytics, machine learning, and AI applications

A

Data lakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

large, centralized repositories for storing, managing, and analyzing vast amounts of structured and semi-structured data from various sources across an organization

A

data warehouses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

centralized data storage and integration platforms that connect and consolidate data from multiple sources, focusing on data integration, data sharing, and data governance, ensuring data consistency and quality

A

data hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

refers to the people who design, develop, maintain, and use software and hardware systems and the methodologies, processes, and practices that they follow

IT Professional

A

peopleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

who install and repair computers

IT Professional

A

hardware tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

who install software and assist users in using the software

IT Professional

A

software tech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

design, install, and monitor the network to ensure it is running at maximum efficiency

IT Professional

A

network technicians and administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

who design, create, and monitor databases so they can store and retrieve data crucial to the business processes

IT Professional

A

database administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

who oversee the IT department, manage IT resources, and are responsible for setting IT policies and strategies within an organization

IT Professional

A

IT managers and directors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

who design, develop, and maintain software applications or systems, working with programming languages, frameworks, and tools to create custom solutions for businesses or end users

IT Professional

A

software developers and engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

who focus on protecting an organization’s data, networks, and systems from cyber threats

IT Professional

A

IT security professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

who are responsible for overseeing IT projects from inception to completion, ensuring that projects are delivered on time and within budget

IT Professional

A

IT project managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

who analyze business users’ needs and find ways for IT to make processes more efficient or write specifications for programmers to write code

IT Professional

A

systems analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

People also include those who use the hardware, software, networks, and databases in their daily work.

IT Professional

A

end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

the execution of software, data manipulation, and communication between different components within the IT infrastructure

A

processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An online store facilitates web purchases that electronically process the order, credit card authorization, and payment

Type of Process

A

Order processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The DMV issues and updates drivers’ licenses

Type of process

A

License management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A bank accepts deposits and enables customer withdrawals of funds from a web portal, ATM, or teller

Type of Process

A

Banking transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A patient record is automatically updated based on user input to the patient’s chart in a secure database management system

A

Healthcare record update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A process is used to manage customer interactions, tracking communication, sales, and support history to improve customer satisfaction and retention

A

Customer relationship management (CRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A process is used to track the performance and availability of a network, proactively detecting and resolving issues to ensure smooth business operations

Type of Process

A

Network monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A process is used for recruiting, onboarding, evaluating, and managing employees, ensuring compliance with labor laws and maintaining a productive workforce.

A

Human resources management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Security measures that are made up of a combination of hardware and software that make intranets secure

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

means it has been written by a company and it meets the needs of the business right out of the box

A

Off-the-shelf software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

the knowledge that enables a person to understand something

A

Competency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

a management process, technique, or method that is most effective at arriving at a desired outcome or a better outcome than any other process, technique, or method

A

best practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

computing power doubles every 18 month

A

Moore’s law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What hardware component performs most of the calculations for a computer?

A

Central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

the major markup language used to create webpages

A

Hypertext Markup Language (HTML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

protocol used to define how messages are formatted and transmitted on the internet

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

a tiny computer part that helps other parts of the computer talk to each other

A

chipset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

are massive, room-sized computers that process and store enormous amounts of bulk data and information

A

Mainframe Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

require a huge amount of physical space and have special requirements like specialized air-conditioning units and fire protection systems

A

mainframes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

are less powerful and smaller in physical size than mainframe computers and perform many of the same things but on a smaller scale

A

Midrange Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

are smaller than mainframes and midrange computers and are so common that they are most commonly referred to simply as computers and sometimes just referred to as boxes

A

Microcomputers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

least powerful computers in terms of processing and come in four typical configurations: desktop, laptop, tablet, and handheld.

A

Microcomputers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

made to reside on a desk and is not portable

A

desktop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

has the same basic components as a desktop and is designed specifically for portability

A

laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

compact but far less powerful than desktops or laptops

A

Handheld Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

a collection of computer programs that work together to manage hardware and software to ensure that they are working properly

A

An operating system (OS), often called a platform

76
Q

the storing and organizing files in the memory of a computer

A

file management

77
Q

a digital resource that stores data, information, or instructions that can be accessed by a computer program

A

computer file

78
Q

refers to the physical components in a computer system that store digital data and information temporarily or permanently

Type of memory

A

Computer memory

79
Q

computer’s short-term working memory that the CPU accesses directly

A

RAM, or Random Access Memory

80
Q

a section of a hard disk that mimics a computer’s RAM

A

Virtual memory

81
Q

plays an important role in the operating system by allowing end users to run more applications than the system has physical RAM to support

A

Virtual memory

82
Q

faster than the RAM but has minimal storage capacity

A

Cache memory

83
Q

are the smallest and fastest type of memory

84
Q

a solid-state storage device that uses integrated circuit assemblies as memory to store data persistently

A

solid-state drive (SSD)

85
Q

refers to nonvolatile, secondary storage on a physical device like a hard drive

A

Disk storage

86
Q

a computer disk that uses optical storage techniques and technology to read and write data

A

optical disk

87
Q

is a software application designed to organize, analyze, and manipulate data using rows and columns of cells

A

Spreadsheets

88
Q

an application software used to create, compose, edit, format, and print documents

A

word processor

89
Q

is used to present information in a slideshow format

A

Presentation Software

90
Q

is used to create a collection of related files called tables that consist of records (rows) of data separated by fields (columns) that can be queried to produce populations of information

A

Database software, or database management system software (DBMS)

91
Q

a type of database that organizes data into one or more tables, each with a unique key identifying each row

A

relational database

92
Q

collection of business computer application programs of associated functionality that share a common graphical user interface (GUI) and have the capacity to exchange data across the programs smoothly

A

Software suites

93
Q

where users can pay a monthly or annual fee to access the software

A

Subscription-based services

94
Q

allow users to purchase and download software directly to their devices

A

App stores

95
Q

can be accessed through a web browser without the need for installation or licensing

A

Cloud-based software

96
Q

free to use and can be downloaded from the internet without the need for purchase or licensing

A

Open-source software

97
Q

allows a user to select an entire area from one application and a part of another

A

Object embedding

98
Q

Which type of memory is crucial to a computer’s ability to perform multitasking effectively?

99
Q

Which type of computer category does a smartphone belong to?

A

Handheld computer

100
Q

Which category of computer does a business laptop belong to?

A

Microcomputer

101
Q

Which type of software is responsible for managing computer hardware, running applications, and controlling peripherals?

A

Systems software

102
Q

encompasses technologies, practices, and processes designed to protect networks and their devices, programs, and data from theft, damage, or unauthorized access

A

cybersecurity

103
Q

defined as two or more computers connected together to communicate and share resources

A

computer network

104
Q

Each device connected to a network

105
Q

connected to a central computer

106
Q

network made up of computers like desktops, laptops, and portable devices

107
Q

a card that is plugged into a slot on the motherboard inside of the computer and allows a network cable to be plugged in so it can interface or communicate with other computers

A

network interface controller (NIC) card

108
Q

provides the computer with a unique 48-bit address called a MAC (media access control) address

A

Ethernet card

109
Q

responsible for the transmission of data packets to and from the network interface card, and to and from another remotely shared channel

A

MAC (media access control) address

110
Q

a standard language that devices connected to a network use to communicate and transfer data

111
Q

second basic network component

112
Q

The third component that all networks have in common

A

physical cable system

113
Q

the first component of all network

A

Network Interface Controller

114
Q

The most used network cable

A

Ethernet cable

115
Q

is the fourth component of a computer network

A

network hub

116
Q

most common hub

A

Ethernet hub

117
Q

is a device that acts as a central connection point for devices on a network

A

network hub

118
Q

what replaced ethernet hubs

119
Q

direct data to specific devices on the network rather than sending it to all devices like a hub does, which helps to reduce collisions and improve network performance.

120
Q

a set of protocols used to connect a network to the internet

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

121
Q

is software that resides on a network server and controls an entire network

A

Network operating system (NOS)

122
Q

responsible for controlling network traffic, administering packets, managing files, administering certain functions like backup, and maintaining network security

A

network operating system (NOS)

123
Q

allows several processes to occur simultaneously

A

multiprocessing

124
Q

responsible for smooth network operations, network performance, and implementation of new nodes or even new networks

IT Professional

A

network administrator

125
Q

refers to the physical and logical layout of a computer network, including the connections between nodes (devices)

Type of Topology

A

network topology

126
Q

a network topology where each of a network’s nodes is connected to a common linear backbone that has two endpoints

A

bus topology or linear bus

127
Q

named for the star shape created by nodes that radiate around a central node in a spoke-like fashion

Type of Topology

A

star topology

128
Q

ring shape created by network nodes where each node is connected to two other nodes with the first and last nodes being connected to each other

A

ring topology

129
Q

each node is connected to every other node in the network

A

mesh topology

130
Q

a computer network that is relatively small, typically in a single building but sometimes as small as a single room

A

local area network (LAN)

131
Q

a computer network that connects two or more LANs that are located on a physical campus, like an organization’s national headquarters, or even an industrial complex

A

campus area network (CAN)

132
Q

a computer network that connects two or more LANs or CANs together but within the boundaries of a town or city

A

metropolitan area network (MAN)

133
Q

are computer networks that encompass a wide geographical area and connect LANs, CANs, and MANs together

A

Wide area networks (WAN)

134
Q

are computer networks that generally connect computers directly to one another without using a server

A

Peer-to-Peer Networks (P2P)

135
Q

a cloud storage service that utilizes P2P networking to provide faster and more reliable file synchronization across devices

136
Q

a GPS navigation app that provides real-time traffic updates and routing information using a P2P network of drivers who share data on road conditions

137
Q

world’s largest network and connects thousands of other networks together including LANs, CANs, MANs, WANs, and P2P.

138
Q

is the practice of protecting computer networks and the information they contain from unauthorized access, theft, or damage

A

Network Security

139
Q

secret word or combination of keyboard characters typed in by a user to authenticate one’s identity for joining a computer network

140
Q

is a security process that requires more than one way to prove you are who you say you are before you can access a computer or online account

A

Multi-Factor Authentication (MFA)

141
Q

restrict or grant access to specific files and folders on a computer network to a user or group of users

A

permissions

142
Q

can be described as a combination of specialized hardware and software that ensures that only authorized personnel can access and use an organization’s network

143
Q

refers to the protection of a computer system from physical damage, theft, or unauthorized access, whether from an external attacker or an internal user

A

computer security

144
Q

includes the recognition, consequences, and assessment of risk to a computer’s assets and developing strategies to manage and protect them

A

risk management

145
Q

typically someone who attempts to invade, or disable, a computer’s security measures to steal the computer resources

146
Q

is extremely easy to breach, especially by a seasoned hacker

A

unsecured computer

147
Q

Computer files that infect IT systems and reproduce like a biological virus by making copies of themselves within a host, such as a computer’s memory or storage or on a network

A

computer virus

148
Q

A program that uses networks to travel by sending copies of themselves to other parts of the network without a user’s knowledge or intervention

malware

149
Q

A type of malware that encrypts a user’s files or locks their computer, making data inaccessible. The attacker then demands a ransom payment in exchange for the decryption key or unlocking the system

A

ransomware

150
Q

A set of software tools that provide an attacker with stealthy and persistent access to a compromised system by hiding their presence and activities from users and security software

151
Q

A collection of compromised computers, known as “bots” or “zombies,” remotely controlled by an attacker for various malicious activities

152
Q

A program that misleads users of its true intent. When executed, it may release one or many harmful viruses, worms, or any other sort of malicious programs into a computer or networked system

A

trojan horses

153
Q

A program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent

154
Q

A program that automatically displays or downloads advertising to a computer

155
Q

A program that uses an electronic email system to arbitrarily send millions of unsolicited bulk messages to various users and accounts

156
Q

A program that can make a computer or any of its resources unavailable to its intended users

A

Denial-of-Service (DoS)

157
Q

A program that simply records every keystroke made at the workstation’s keyboard

A

keylogging

158
Q

computer programs that attempt to identify, prevent, and eliminate computer viruses and malware, typically before they reach a computing system or network

A

antivirus software

159
Q

broad term that refers to any fraudulent activity in an online setting

A

internet fraud

160
Q

an internet fraud scheme that automatically passes a user to an advertiser, whether they had any intention of visiting or not, in order to collect a per-click fee

A

click fraud

161
Q

involve buyers (typically in another country) who approach merchants via spam and ask whether they can pay for shipping with a credit card

A

Purchase Scams

162
Q

Cybercriminals steal personal data, such as Social Security numbers, addresses, or credit card details, to impersonate someone and carry out fraudulent activities in the victim’s name

A

Identity Theft

163
Q

On online auction platforms, fraudsters may list items for sale and either not deliver them after receiving payment or deliver counterfeit, damaged, or significantly different items than advertised

A

Auction Fraud

164
Q

Scammers pretend to be tech support agents to convince victims that their computers have problems

A

Tech Support Scams

165
Q

Fraudsters advertise non-existent or misleading job opportunities that supposedly allow individuals to work from home

A

Work-from-home Scams

166
Q

criminal activity involving using social engineering techniques and attempts to gain private information deceptively, like usernames, PIN numbers, passwords, and credit card details, by masquerading as a legitimate business organization, typically in a legitimate-looking email

167
Q

can be defined simply enough as the ability of an individual to keep personal information out of public view

168
Q

can pose privacy risks, as these networks can be monitored or intercepted by hackers

A

Public Wi-Fi Networks

169
Q

are a list of stored or cached websites on a user’s computer that is essentially an account of where and what a user’s web browser has visited on the web

A

History files

170
Q

a criminal in an office or a public place will simply glance over the victim’s shoulder and watch the person dial a phone number, or type in a password on a laptop, or use a credit card number

A

Shoulder Surfing

171
Q

How does a peripheral device function in a network?

A

As a shared resource utilized by multiple end users

172
Q

Two or more computers connected to share resources and communicate

A

computer network

173
Q

How does creating an office network simplify the maintenance of employee workstations?

A

Client computers’ software updates can be done at once from the server.

174
Q

Which component is essential for each client computer in the office to connect to the new network?

A

A network interface card

175
Q

Which network type is appropriate for a business with 25 employees working at a single location?

A

Local area network (LAN)

176
Q

Which network component is specifically designed to prevent unauthorized access when the business handles sensitive data and requires high network security?

177
Q

Which type of computer runs a network operating system (NOS)?

178
Q

Which type of software is designed to easily generate Gantt charts?

A

Project management software

179
Q

Which term describes physical aspects of a computer?

180
Q

Which application software features tables, records, and fields that can be queried, updated, and managed by users, programmers, and business analysts?

A

Database software

181
Q

What is the purpose of a firewall?

A

Prevent unauthorized access

182
Q

Which term refers to any person in a business who uses a computer to complete their day to day tasks of the business?

183
Q

A large company is investing in new IT systems, including a new server.

Which IT professional should be tasked with setting up and maintaining the server?

A

Computer System Administrator

184
Q

A small business has a single network that allows every employee to connect through a central server when they are in the company’s main office.

Which type of network is the business using?

A

Local area network (LAN)

185
Q

What term refers to the study, design, development, implementation, support, and management of computer-based information systems?

A

Information Technology

186
Q

An employee receives an email that appears to be from the IT department. The email asks the recipient to click a link to verify their username and password. Upon closer inspection, the employee realizes that the email is a fraudulent attempt to obtain their password.

Which type of fraud does this email represent?