Test 2 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

A set of rules specifying the legal and ethical use of a system and the consequence of non compliance

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to the issues involving both the users and the organizations responsibilities and liabilities

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A method for binding all the parties to a contract

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An unsolicited email sent for advertising purposes

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Small text files with unique ID tags that are embedded in a wb browser and saved on the users hard drive.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Generated by the web server software to record a users actions on a web site

A

Log Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for creations of the mind. Developed by people or businesses

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information technology and internet have created what? Due to computers not being affordable for many people.

A

Digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so they can share skills and costs and have access to each other’s markets.

A

Virtual organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software that secretly gathers information about users while they browse the web.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A form of spyware that collects information about the user (without the users consent) to determine which advertisements to display in the users web browser.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sending fraudulent emails that seem to come from a legitimate source such as a bank or university.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Monitor and record keystrokes and can be software or hardware devices

A

Keystroke loggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attempt to gain access to a network by posing as an authorized user in order to find sensitive information such as passwords and credit card info.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Directing internet users to fraudulent websites with the intention of stealing their personal information.

A

Pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The unauthorized use of computer data for personal gain.

A

Computer fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system must prevent disclosing information to anyone who is not an authorized user. This is called what?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Systems ensure availability in the event of a system failure by using a combination of hardware and software

A

Fault-tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This backup power unit continues to provide electrical power in the even of blackouts and other power interruptions.

A

Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A collection of disk drives used to store data in multiple places. If one drive fails in this system data stored on it can be reconstructed from data stored on remaining drives.

A

Redundant array of independent disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Use two disks containing the same data and can be a suitable RAID system for a small organization.

A

Mirror Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Consists of self propagating program code that is triggered by a specified time or event.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Travels from computer to computer in a network but it does not usually erase. They are independent programs that can spread themselves without having to be attached to a host program.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A type of Trojan program used to release a virus, work or other destructive code.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attack floods a network or server with service requests to prevent legitimate users access to the system

A

Denial-of-service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Means using people skills such as being a good listener to trick people into revealing private information

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Security measures which use a physiological element that’s unique to a person and cannot be stolen.

A

Biometric security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A combination of hardware and software that acts as a filter or barrier between a private network and external networks including internet.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Protects against both internal and external access. Usually placed in front of a firewall and can identify attack signatures and cause routers to terminate connections with suspicious sources.

A

Intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Corner bolts, electronic trackers, and identification badges are common what?

A

Physical computer network security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Provides a secure tunnel through the internet for transmitting messages and data via a private network.

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Transforms data called plaintext or clear text into a scrambled form called ciphertext that cannot be read by others.

A

Data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The electronic transfer of data from one location to another

A

Data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The amount of data that can be transferred from one point to another in a certain time period.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The loss of power in a signal as it travels from the sending device to the receiving device

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Multiple pieces of data are sent simultaneously to increase the transmission rate

A

Broadband data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Voice grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred in a specific period of time.

A

Narrowband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Rules that govern data communication including error detection, message length and transmission speed

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A common carrier service, is a high speed service that uses ordinary phone lines.

A

Digital subscriber line (DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

All processing is done at one central computer

A

Centralized processing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Maintains central control and decentralized operations. Processing power is distributed among several locations.

A

Distributed processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A seven layer architecture for defining how data is transmitted from computer to computer in a network.

A

Open systems interconnection (OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Connects workstations and peripheral devices that are in close proximity

A

Local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Can span several cities, states, or even countries and it is usually owned by several different parties.

A

Wide area network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Consists of a central computer and a series of nodes connected to it.

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Computers and devices are arranged in a circle so each node is connected to two other nodes.

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Connects nodes along a network segment but the ends of the cable are not connected as they are in a ring topology

A

Bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An industry standard suite of communication protocols that enables interoperability.

A

Transmission Control Protocol/Internet protocol (TCP/IP)

50
Q

The process of deciding which path to take on a network

A

Routing

51
Q

A network connection device containing software that connects network systems and controls traffic flow between them.

A

Router

52
Q

Software runs the local computer and communicates with the remote server to request information or services

A

Client/server model

53
Q

Security protocol that uses EAP to obtain a master key. After the session is terminated the master key is discarded.

A

WPA2

54
Q

Similar to bandwidth, it is the amount of data transferred or processed in a specific time

A

Throughput

55
Q

Worldwide collection of millions of computers and networks of all sizes. The network of all networks.

A

Internet

56
Q

The foundation network linked with fiber optic cables that can support very high bandwidth. It is made up of many interconnected government academic commercial and other high capacity data routers.

A

Internet backbone

57
Q

The web organizes data by using what?

A

Hypermedia

58
Q

The embedded references in hypermedia documents are called what?

A

Hypertext

59
Q

Domain names are converted to IP addresses by what?

A

Domain name system (DNS)

60
Q

Where are domain names used?

A

URL’s

61
Q

The language used to create web pages. Defines a page layout and appearance by using tags and attributes

A

Hypertext Markup Language (HTML)

62
Q

One of the most widely used services on the internet.

A

E-mail

63
Q

Using the internet rather than the telephone network to exchange spoken conversations

A

Internet telephony

64
Q

A network within an organization that uses internet protocols and technologies

A

Intranet

65
Q

A journal or newsletter that is updated frequently and intended for the general public

A

Blog

66
Q

An electronic audio file such as an MP3 file that is posed on the web for users to download to their mobile devices or computers

A

Podcast

67
Q

Encompasses all the activities a company performs in selling and buying products and services using computers and communication technologies.

A

E-business

68
Q

Buying and selling goods over the internet

A

E-Commerce

69
Q

Introduced the value chain concept in 1985

A

Michael Porter

70
Q

Movement of materials and parts from suppliers and vendors to production or storage facilities.

A

Inbound logistics

71
Q

Processing raw materials into finished goods and services

A

Operations

72
Q

Capitalize on the advantages of online interaction with their customers yet retain the benefits of having a physical store location.

A

Click and brick e commerce

73
Q

Uses the internet to sell goods and services

A

E commerce

74
Q

Brings sellers and buyers together on the web and collects commissions on transactions between these parties.

A

Brokerage model

75
Q

Involves using the internet to sell directly to consumers

A

Business to consumer e commerce

76
Q

Involves electronic transactions between businesses

A

Business to business e commerce (B2B)

77
Q

Enables employees in an organization to order and receive supplies and services directly from suppliers

A

E procurement

78
Q

Concentrated on a specific industry or market such as the utilities industries

A

Vertical market

79
Q

Concentrated on a specific function or business process

A

Horizontal market

80
Q

Uses voice recognition and text to speech technologies

A

Voice based e commerce

81
Q

Transaction which money or scrip is exchanged electronically

A

Electronic payment

82
Q

About the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information.

A

Smart card

83
Q

An error which can be in grammar, punctuation or logic.

A

Bug

84
Q

Removing errors

A

Debut or debugging

85
Q

Segment of executable program code enclosed in a control structure

A

Code block

86
Q

Move procedure is performed in what manner?

A

Self centric

87
Q

A turn is a rotational action requiring two arguments what are they?

A

Direction and amount

88
Q

Requires an argument for its vehicle property

A

setVehicle procedure

89
Q

One or more lines or text intended for the human reader

A

Comment

90
Q

Do in order is an example which determines the order in which statements are executed

A

Control structure

91
Q

Breaking down a complex action into two or more simpler step

A

Decomposition

92
Q

A procedure gets a link to a skeletal joint what is that called?

A

Joint reference

93
Q
  1. Creating documentation with comments
  2. Decomposing complex actions into simpler steps
  3. Writing code
A

Implementation

94
Q

Set grid blocks to 1 meter on a side

A

Snap grid

95
Q

All objects in an Alice scene have a vehicle property

A

Vehicle

96
Q

Creates a code block and tells Alice to execute code statements concurrently

A

Do together

97
Q

Control structure that creates a code block for repetition

A

Count loop control structure

98
Q

Count loop is often referred to as

A

For loop

99
Q

Makes a speech bubble appear above a characters head

A

Say method

100
Q

Once a procedure has been written it can be called again and again this concept is called?

A

Code reuse

101
Q

Press and hold CTRL key

A

Copy and paste keyboard shortcut

102
Q

Scene is activated and a runtime window is splayed and my first method is called

A

Run button is clicked

103
Q

Procedure written by the programmer

A

Custom procedure

104
Q

a name is this when it sufficiently describes the action performed by the procedure

A

Self documenting

105
Q

Writing the name of your custom procedure as all one word with no spaces this is called

A

camelCase

106
Q

Contains the statements that tell Alice how to perform the action of the procedure

A

Procedures code block

107
Q

Design technique that repeatedly decomposes a complex action again and again into smaller pieces

A

Stepwise refinement

108
Q

A feature of object oriented program languages that allows objects of a class to reuse methods

A

Inheritance

109
Q

Implements a family based hierarchy of classes

A

Alice Gallery

110
Q

A special type of object that remembers a location and orientation for the camera

A

Marker

111
Q

Color and texture

A

Paint object (resource)

112
Q

Alice provides a feature that allows for exporting code for reuse in the other animation projects

A

Export and Import

113
Q

File extension for edited classes

A

.a3c

114
Q

Must be imported into your project from the Alice sound gallery

A

Audio source file

115
Q

What type of devices have serious health and other negative impacts on teens including stress, sleep loss, accidents and increased anxiety

A

Handheld devices

116
Q

A virus consists of what type of code?

A

Self propagating

117
Q

The protocol used for internet telephony is?

A

Voice over Internet protocol

118
Q

HTML uses these two things to define a page layouts appearance

A

Tag and attributes

119
Q

Specified a value such as a font color for a page

A

HTML Attribute

120
Q

What do count loops use to determine the number of repetitions?

A

Loop control value