Test 2 Flashcards

1
Q

A set of rules specifying the legal and ethical use of a system and the consequence of non compliance

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to the issues involving both the users and the organizations responsibilities and liabilities

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A method for binding all the parties to a contract

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An unsolicited email sent for advertising purposes

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Small text files with unique ID tags that are embedded in a wb browser and saved on the users hard drive.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Generated by the web server software to record a users actions on a web site

A

Log Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for creations of the mind. Developed by people or businesses

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information technology and internet have created what? Due to computers not being affordable for many people.

A

Digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.

A

Virtual organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software that secretly gathers information about users while they browse the web.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A form of spyware that collects information about the user (without the users consent) to determine which advertisements to display in the users web browser.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sending fraudulent emails that seem to come from a legitimate source such as a bank or university.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Monitor and record keystrokes and can be software or hardware devices

A

Keystroke loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attempt to gain access to a network by posing as an authorized user in order to find sensitive information such as passwords and credit card info.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directing internet users to fraudulent websites with the intention of stealing their personal information.

A

Pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The unauthorized use of computer data for personal gain.

A

Computer fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system must prevent disclosing information to anyone who is not an authorized user. This is called what?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Systems ensure availability in the event of a system failure by using a combination of hardware and software

A

Fault-tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This backup power unit continues to provide electrical power in the even of blackouts and other power interruptions.

A

Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A collection of disk drives used to store data in multiple places. If one drive fails in this system data stored on it can be reconstructed from data stored on remaining drives.

A

Redundant array of independent disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Use two disks containing the same data and can be a suitable RAID system for a small organization.

A

Mirror Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Consists of self propagating program code that is triggered by a specified time or event.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Travels from computer to computer in a network but it does not usually erase. They are independent programs that can spread themselves without having to be attached to a host program.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of Trojan program used to release a virus, work or other destructive code.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.
Backdoor
26
Attack floods a network or server with service requests to prevent legitimate users access to the system
Denial-of-service (DOS)
27
Means using people skills such as being a good listener to trick people into revealing private information
Social engineering
28
Security measures which use a physiological element that’s unique to a person and cannot be stolen.
Biometric security.
29
A combination of hardware and software that acts as a filter or barrier between a private network and external networks including internet.
Firewall
30
Protects against both internal and external access. Usually placed in front of a firewall and can identify attack signatures and cause routers to terminate connections with suspicious sources.
Intrusion detection system (IDS)
31
Corner bolts, electronic trackers, and identification badges are common what?
Physical computer network security measures.
32
Provides a secure tunnel through the internet for transmitting messages and data via a private network.
Virtual private network (VPN)
33
Transforms data called plaintext or clear text into a scrambled form called ciphertext that cannot be read by others.
Data encryption.
34
The electronic transfer of data from one location to another
Data communication
35
The amount of data that can be transferred from one point to another in a certain time period.
Bandwidth
36
The loss of power in a signal as it travels from the sending device to the receiving device
Attenuation
37
Multiple pieces of data are sent simultaneously to increase the transmission rate
Broadband data transmission
38
Voice grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time.
Narrowband
39
Rules that govern data communication including error detection, message length and transmission speed
Protocols
40
A common carrier service, is a high speed service that uses ordinary phone lines.
Digital subscriber line (DSL)
41
All processing is done at one central computer
Centralized processing system
42
Maintains central control and decentralized operations. Processing power is distributed among several locations.
Distributed processing
43
A seven layer architecture for defining how data is transmitted from computer to computer in a network.
Open systems interconnection (OSI)
44
Connects workstations and peripheral devices that are in close proximity
Local area network (LAN)
45
Can span several cities, states, or even countries and it is usually owned by several different parties.
Wide area network (WAN)
46
Consists of a central computer and a series of nodes connected to it.
Star topology
47
Computers and devices are arranged in a circle so each node is connected to two other nodes.
Ring topology
48
Connects nodes along a network segment but the ends of the cable are not connected as they are in a ring topology
Bus topology
49
An industry standard suite of communication protocols that enables interoperability.
Transmission Control Protocol/Internet protocol (TCP/IP)
50
The process of deciding which path to take on a network
Routing
51
A network connection device containing software that connects network systems and controls traffic flow between them.
Router
52
Software runs the local computer and communicates with the remote server to request information or services
Client/server model
53
Security protocol that uses EAP to obtain a master key. After the session is terminated the master key is discarded.
WPA2
54
Similar to bandwidth, it is the amount of data transferred or processed in a specific time
Throughput
55
Worldwide collection of millions of computers and networks of all sizes. The network of all networks.
Internet
56
The foundation network linked with fiber optic cables that can support very high bandwidth. It is made up of many interconnected government academic commercial and other high capacity data routers.
Internet backbone
57
The web organizes data by using what?
Hypermedia
58
The embedded references in hypermedia documents are called what?
Hypertext
59
Domain names are converted to IP addresses by what?
Domain name system (DNS)
60
Where are domain names used?
URL’s
61
The language used to create web pages. Defines a page layout and appearance by using tags and attributes
Hypertext Markup Language (HTML)
62
One of the most widely used services on the internet.
E-mail
63
Using the internet rather than the telephone network to exchange spoken conversations
Internet telephony
64
A network within an organization that uses internet protocols and technologies
Intranet
65
A journal or newsletter that is updated frequently and intended for the general public
Blog
66
An electronic audio file such as an MP3 file that is posed on the web for users to download to their mobile devices or computers
Podcast
67
Encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.
E-business
68
Buying and selling goods over the internet
E-Commerce
69
Introduced the value chain concept in 1985
Michael Porter
70
Movement of materials and parts from suppliers and vendors to production or storage facilities.
Inbound logistics
71
Processing raw materials into finished goods and services
Operations
72
Capitalize on the advantages of online interaction with their customers yet retain the benefits of having a physical store location.
Click and brick e commerce
73
Uses the internet to sell goods and services
E commerce
74
Brings sellers and buyers together on the web and collects commissions on transactions between these parties.
Brokerage model
75
Involves using the internet to sell directly to consumers
Business to consumer e commerce
76
Involves electronic transactions between businesses
Business to business e commerce (B2B)
77
Enables employees in an organization to order and receive supplies and services directly from suppliers
E procurement
78
Concentrated on a specific industry or market such as the utilities industries
Vertical market
79
Concentrated on a specific function or business process
Horizontal market
80
Uses voice recognition and text to speech technologies
Voice based e commerce
81
Transaction which money or scrip is exchanged electronically
Electronic payment
82
About the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information.
Smart card
83
An error which can be in grammar, punctuation or logic.
Bug
84
Removing errors
Debut or debugging
85
Segment of executable program code enclosed in a control structure
Code block
86
Move procedure is performed in what manner?
Self centric
87
A turn is a rotational action requiring two arguments what are they?
Direction and amount
88
Requires an argument for its vehicle property
setVehicle procedure
89
One or more lines or text intended for the human reader
Comment
90
Do in order is an example which determines the order in which statements are executed
Control structure
91
Breaking down a complex action into two or more simpler step
Decomposition
92
A procedure gets a link to a skeletal joint what is that called?
Joint reference
93
1. Creating documentation with comments 2. Decomposing complex actions into simpler steps 3. Writing code
Implementation
94
Set grid blocks to 1 meter on a side
Snap grid
95
All objects in an Alice scene have a vehicle property
Vehicle
96
Creates a code block and tells Alice to execute code statements concurrently
Do together
97
Control structure that creates a code block for repetition
Count loop control structure
98
Count loop is often referred to as
For loop
99
Makes a speech bubble appear above a characters head
Say method
100
Once a procedure has been written it can be called again and again this concept is called?
Code reuse
101
Press and hold CTRL key
Copy and paste keyboard shortcut
102
Scene is activated and a runtime window is splayed and my first method is called
Run button is clicked
103
Procedure written by the programmer
Custom procedure
104
a name is this when it sufficiently describes the action performed by the procedure
Self documenting
105
Writing the name of your custom procedure as all one word with no spaces this is called
camelCase
106
Contains the statements that tell Alice how to perform the action of the procedure
Procedures code block
107
Design technique that repeatedly decomposes a complex action again and again into smaller pieces
Stepwise refinement
108
A feature of object oriented program languages that allows objects of a class to reuse methods
Inheritance
109
Implements a family based hierarchy of classes
Alice Gallery
110
A special type of object that remembers a location and orientation for the camera
Marker
111
Color and texture
Paint object (resource)
112
Alice provides a feature that allows for exporting code for reuse in the other animation projects
Export and Import
113
File extension for edited classes
.a3c
114
Must be imported into your project from the Alice sound gallery
Audio source file
115
What type of devices have serious health and other negative impacts on teens including stress, sleep loss, accidents and increased anxiety
Handheld devices
116
A virus consists of what type of code?
Self propagating
117
The protocol used for internet telephony is?
Voice over Internet protocol
118
HTML uses these two things to define a page layouts appearance
Tag and attributes
119
Specified a value such as a font color for a page
HTML Attribute
120
What do count loops use to determine the number of repetitions?
Loop control value