Morley Ch 4, 5, and 8 MC Flashcards

1
Q

Computer crime is sometimes referred to as ____.

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

A

unoauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ refers to the act of breaking into a computer or network.

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ are sets of tools that allow hackers to access a system.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

A

Wi-Fi piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

A

Possessed Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.

A

tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ identify users by a particular unique biological characteristic.

A

Biometric access systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ uses a single secret key to both encrypt and decrypt the file or message.

A

Private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.

A

Hushmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company

A

Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ are acts of malicious destruction to a computer or computer resource.

A

Computer sabatoge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ is a generic term that refers to any type of malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Like a computer virus, a ____ is a malicious program designed to cause damage.

A

computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A ____ is a malicious program that masquerades as something else—usually as some type of application program.

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

A

computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One emerging type of Trojan horse is called a ____-Access Trojan.

A

Remote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

A

dot cons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

A

virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

A

typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The best protection against many dot cons is ____.

A

common sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Repeated threats or other harassment carried out online between adults is referred to as ____.

A

cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Our networked society has raised a number of ____ concerns.

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hardware loss, as well as other security issues, can result from hardware damage (both intentional and accidental) and ____.

A

system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.

A

system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.

A

security slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

A

Cable locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.

A

FDE

37
Q

Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.

A

recovery

38
Q

____ devices are designed to withstand much more physical abuse than conventional devices.

A

ruggedized

39
Q

Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

A

sleeves

40
Q

____ devices typically have a durable case and are spill-resistant, but may not withstand falls from three feet or more onto concrete.

A

Semirugged

41
Q

____ are small programs that take care of software-specific problems, or bugs, such as security holes.

A

patches

42
Q

Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

A

backup

43
Q

To supplement backup procedures, businesses and other organizations should have a(n) ____.

A

disaster recovery plan

44
Q

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.

A

hot site

45
Q

To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

A

7-10 years

46
Q

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A

information privacy

47
Q

____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.

A

Marketing databases

48
Q

A marketing activity that can be considered a privacy risk is ____.

A

electronic profiling

49
Q

Collecting in-depth information about an individual is known as ____.

A

electronic profiling

50
Q

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A

privacy policy

51
Q

When spam is sent via IM it is called ____.

A

spim

52
Q

For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A

throw-away email address

53
Q

One common way to deal with spam that makes it to your computer is to use a(n) ____.

A

email filter

54
Q

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

A

opting out

55
Q

To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

A

opt in

56
Q

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.

A

Computer monitoring software

57
Q

____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

A

Video surveillance

58
Q

____ refers to companies recording or observing the actions of employees while on the job.

A

Employee monitoring

59
Q

____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

A

Video surveillance

60
Q

For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

A

proximity cards

61
Q

Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.

A

silicon

62
Q

____ chips have a special coating that changes its physical state when heat is applied.

A

PRAM

63
Q

____ displays are transparent and can emit light toward the top and bottom of the display surface; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen.

A

TOLED

64
Q

Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.

A

external

65
Q

To record data, holographic storage systems split the light from a blue laser beam into two beams–a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.

A

reference

66
Q

With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM) which translates the data’s 0s and 1s into a hologram.

A

spatial

67
Q

Today’s holographic storage systems typically consist of a holographic drive and removable recordable holographic media cartridges; current capacity is ____ GB per cartridge, with 1.6 TB cartridges expected in the near future.

A

300

68
Q

Most people agree that nanotechnology involves creating computer components, machines, and other structures that are less than ____ nanometers in size.

A

100

69
Q

The wall of a single-walled carbon nanotube is only one carbon atom thick and the tube diameter is approximately ____ times smaller than a human hair.

A

10,000

70
Q

One recent development in new technology is ____ that can remove contaminants from water sources.

A

nanoparticles

71
Q

A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.

A

optical

72
Q

While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.

A

opto-electronic

73
Q

One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ conferencing.

A

telepresence

74
Q

Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.

A

electrical

75
Q

Developed in the late 1990s, Wi-Fi (for wireless fidelity) is a family of wireless networking standards that use the IEEE standard ____.

A

802.11

76
Q

The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____.

A

The number of solid objects between the access point and PC (walls, doors)

Interference from devices using radio frequencies (baby monitors, microwave ovens)

The hardware being used

77
Q

In general, Wi-Fi is designed for data transfers between ____ feet indoors.

A

100 and 300

78
Q

____ is one of the Wi-Fi standards most widely used today.

A

802.11g

79
Q

____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.

A

Artificial intelligence

80
Q

____ provide help or assistance for a particular application program. Some can detect when the user might be having trouble with the program and automatically offer appropriate advice.

A

Application assistants

81
Q

The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents.

A

Semantic

82
Q

One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations–for example, the systems that check products for defects at manufacturing plants.

A

vision

83
Q

When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.

A

expert

84
Q

____ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled

A

BCI

85
Q

Privacy-rights advocates worry that the ____ could someday be used by the government to track citizens.

A

VeriChip

86
Q

____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty.

A

DARPA

87
Q

An emerging military robotic application is the ____ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection.

A

exoskeleton

88
Q

Telesurgery is typically ____ than normal surgery.

A

more precise

less invasive