Section 5 Flashcards

1
Q

Created by IT, _-_________ allows the processing, transmission, storage, and viewing of data in a digital form by using the Internet or a computer network.

A

e-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E-business has automated many functions and replaced them with ____-_______ options.

A

self-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is defined as the right of a person or an organization to decide where, when, how much, and what portion of there personal information can be collected in computers, shared, and used by others.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________ privacy related to information stored in a computer, about an individual’s activities performed during the course of their profession.

A

Occupational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____________ privacy relates to an individual’s personal information that is collected and stored in a computer.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ privacy relates to an individual’s financial data that is stored in a computer system. Each company has the obligation to protect each person’s information from any non-intended entity or person.

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____________ privacy refers to organizations or governmental agencies that do not want to reveal their trade secrets or any other activities to non-intended entities or persons, especially to competitors.

A

Organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ privacy relates to an intrusion into someone’s physical body or medical information.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ______-_______-______ ____ (GLBA) requires that financial as well as non-banking institutions ensure the confidentiality and security of their customers’ records and information. Institutions must disclose their policies and practices to their customers and give them an opportunity to opt out.

A

Gramm-Leach-Bliley Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____ __________ ___________ and __________ Act of 1996 (HIPAA) applies to all individuals whose health information is crated by health care providers, health plans, and health care clearinghouses, whether on paper, in electronic form, or orally communicated. Consumers have the right to see a copy of their medical records, request a correction, and to get a notice of a covered entity’s privacy policies.

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the _________ _______ ________ _________ Act of 1998 (COPPA) requires commercial websites that are geared towards children, or that have actual knowledge that children under the age of 13 are using those sites, to obtain “verifiable parental consent” before collecting personal information from children online.

A

Children’s Online Privacy Protection Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The USA _______ Act enables FBI investigators to track emails and website visits by individuals without obtaining a wiretap order or subpoena. Investigators need to inform only a judge that the investigation is relevant to an ongoing criminal investigation.

A

Patriot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Institutions use ______ _______ ______ (SSL) protocol for transmitting private information per the internet. It uses encryption technology (to scramble information), creating a secure connection between a client computer and a server computer.

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

S-HTTP is used to send _________ securely.

A

messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ __________ is used to describe a human creation or invention (art, technology, new drug). There are two categories; Copyright (books, art, music) and Industrial (patents and trademarks)

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A __________ is a unique symbol or sign used by individuals or organizations to identify their products

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The trademark owner can let someone user the trademark for a fee. This is/is not a time limit on trademarks?

A

is not, it can be renewed by paying a fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An _____ _______ is software whose source code, written by a programmer, is made available to the public.

A

open source

19
Q

___________ happens when an employee of a company works from home using a company provided computer, telephone lines, and internet connection.

A

Telecommuting.

20
Q

The purpose of ____________ is to safeguard the computer user’s health, safety, and comfort in order to maximize productivity and efficiency, and reduce the chance of bodily injury.

A

ergonomics

21
Q

___ _______ is a procedure that lists all the assigned tasks, including sub-tasks and duties, a person has to perform to do their job.

A

Job Design

22
Q

Job ___________ means to give different tasks to an employee in order to reduce boredom, motivate the employee to learn more, and increase job specialization, and job satisfaction.

A

enlargement

23
Q

Job _________ allows an employee to work in different departments in order to give a better understanding of, and the skills and knowledge needed for, various positions.

A

rotation

24
Q

Job ____________ is used to motivate employees to assume additional job responsibilities to allow transitioning into a management position.

A

enrichment

25
Q

The following are types of __________ ________ measures:

  • Use of Computer Access Controls (physical security)
  • Hardware Security
  • Cryptographic Technique
  • Authentication Technique /Biometric Devices
  • Firewalls
  • Anti0Virus Software
  • Incident Reporting
  • Computer Intrusion detection
A

computer security aka information security

26
Q

A ________ _________ includes short-term and long-term goals and has 3 levels; business, organizational, and departmental.

A

business strategy

27
Q

_______ competition is a competition between two products or services, in which each of them perform the same function.

A

Direct

28
Q

_________ competition is when two products or two services perform similarly and can easily substitute one another.

A

Indirect

29
Q

________ competition is when a customer will spend whatever money he has available on products or services.

A

Budget

30
Q

A _________ ________ is a sequence of selected activities performed by a business across time and space to complete a selected task. It includes management processes, operational processes, and supporting processes.

A

business process

31
Q

_____ ________ ___________ (TQM) is a business management tool with one objective; all the departments of an organization must collectively operate in a manner that meets the customers’ needs, maximizes the company’s profits, and meets the company’s goals and objectives.

A

Total Quality Management

32
Q

Tools used in ___ include line graphs, scatter plots, run charts, histograms and bar charts, pie charts, checklist, and flowcharts.

A

TQM

33
Q

The 3 parts of _-________ are Business to Business (B2B), Business to Consumers (B2C), and Consumer to Consumer (C2C).

A

e-commerce

34
Q

Advantages of e-commerce (5)

A
  • entry in global market
  • target particular group of customers
  • decreased operational costs and increased profits
  • promotional advertisements on the Web
  • lowers cost for customers
35
Q

A ______ is a computer program that, when executed, links with another computer program and causes damage to a computer’s hardware, software, or data stored in the computer.

A

virus

36
Q

A _____ _____ is a virus program that appears to be a useful program, but, behind the scenes, it may cause damage to information stored on the computer.

A

trojan horse

37
Q

An ____________ ______ is a program that searches for personal files and encrypts the personal data stored so that the data file cannot be read.

A

encryption virus

38
Q

_____ are programs that travel between networks and that attach themselves to files. When executed they cause damage to information or computers.

A

Worms

39
Q

____-______ viruses attach themselves to boot-sector programs located on the hard drive of a computer. It can delete all content stored on a hard drive when it is booted up.

A

boot-sector

40
Q

_____ viruses are small files that contain a series of program statements that when executed cause damage to a computer.

A

script

41
Q

_____ viruses is a series of commands and actions that help automate some tasks,. It will replace a normal tasks with the virus, and are difficult to detect and can be spread throughout email attachments, discs, networks, modems, and the Internet.

A

Macro

42
Q

A _____ ____ is a piece of code that will set off a malicious function when certain conditions are met and are usually not detected by the user of the software.

A

logic bomb

43
Q

A ______-__-______ attack is an attempt to make a computer resource unavailable to its user, preventing a site or service from functioning efficiently or at all.

A

detail of service attack

44
Q

_________ _____ occurs when someone intentionally steals copyrighted software, copies it to sell for profit, or alter or erases the program.

A

Software piracy