Shared Flashcard Set

Details

CIS Ch 14
the studyguide for CIS
80
Computer Science
Undergraduate 3
12/05/2012

Additional Computer Science Flashcards

 


 

Cards

Term

The CAN-SPAM Act allows the sending of most e-mail spam as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.

 

Definition
False
Term

Rejected e-mail automatically goes to the junk e-mail of your e-mail service.

Definition
True
Term

When waste is identified, it usually points to one common cause: the improper management of information systems and resources

Definition
true
Term

Over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic Web sites.

Definition
true
Term

Because of the importance of maintaining accurate data and of people understanding their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system’s various modules.

Definition
true
Term

                According to the 2009 FBI Internet Crime Report, from 2008 to 2009, there was a decrease in the number of complaints of Internet crime filed with law enforcement officers and a decrease in the total dollar loss from these cases.

 

Definition
False
Term

The vast majority of computer-related crimes are reported to authorities.

 

Definition
False
Term

The National Infrastructure Protection Center serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism attacks against the country’s critical infrastructure.

 

Definition
False
Term

Cyberterrorists are believed to have invaded the U.S. power grid and planted software that could interrupt the system during a time of crises or war.

Definition
true
Term

             While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.

 

Definition
false
Term

   Smartphones such as the iPhone and Google’s Android phone that can run applications are impervious to malware.

Definition
False
Term

                Deleting the contents of the Recycle Bin makes it impossible for individuals to view the deleted data.

 

Definition
False
Term

   Copyright laws protect processes, machines, and compositions of matter.

Definition

Copyright laws protect processes, machines, and compositions of matter.

Term

  It is estimated that the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales.

Definition
True
Term

   The patent review and granting process of the U.S. Patent Office is generally conceded to be one of the most smoothly functioning processes of the U.S. government.

Definition
false
Term

                                                                                                  

   

Recent court cases and police reports involving computer crime show that lawmakers are not yet ready to introduce newer and tougher computer crime legislation.

 

 

 

Definition
False
Term

  Role-based system access means that only people who fill or used to fill a certain role can access a specific system.

Definition
false
Term
  Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
Definition
false
Term

Unfortunately, many Intrusion Detection Systems frequently provide false alarms that result in wasted effort.

Definition
True
Term

 

 

 

          Few small and medium sized organizations are willing to outsource their network security operations.

 

 

Definition
False
Term

Tracking software for laptops is not yet available.

Definition
False
Term

The Identity Theft and Assumption Deterrence Act of 1998 assigns responsibility to the Department of Homeland Security for helping identity theft victims to restore their credit and ease the impact of the imposter.

Definition
false
Term

To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.

Definition
True
Term

The use of e-mail among public officials might violate “transborder data flow” laws.

Definition
False
Term

Federal law prohibits private employers from monitoring e-mail sent or received by their employees.

Definition
False
Term

Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.

Definition
False
Term

All U.S. companies are required to have privacy policies.

Definition
false
Term

It has been clearly  proven that increased use of cell phones can lead to an increased chance of brain cancer.

Definition
False
Term

            A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome.

Definition

            A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome.

Term

Flexibility is a major component of ergonomics and an important feature in computer devices.

Definition
True
Term

Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring ____.

Definition

a.

a formal justification statement before computer equipment is purchased

b.

definition of standard computing platforms

c.

use of preferred vendors for all acquisitions

d.

all of the above


D) ALL OF THE ABOVE

 

Term

A good example of a useful policy to minimize waste and mistake is ____.

Definition

c.

users should implement proper procedures to ensure correct input data

 

Term

The Leads Online Web-based service system is used by law enforcement to ____.

Definition
C.) recover stolen property
Term

                    Originally a(n) ____ was a person who enjoyed computer technology and spent time learning and using computer systems.

 

Definition
C) hacker
Term

____ have extra knowledge that make them especially dangerous - they know logon ids, passwords, and company procedures that help them evade detection.

Definition
C) insiders
Term

____ is a type of malware that executes when specific conditions occur.

Definition
C) Logic Bomb
Term

____ is a set of programs that enables its user to gain administrator level access to a computer or network.

Definition
C) Rootkit
Term

A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____.

Definition
D) password sniffer
Term

                       If a court determines that a patent infringement is intentional, it can award up to ____ to the patent holder.

 

Definition

c.

three times the amount of damages claimed by the patent holder

 

Term

The practice of disguising illegally gained funds so that they seem legal is called  ____.

Definition
D.) Money laundering
Term

                    A(n) ____ is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.

 

Definition
B) Key
Term

                        A useful guideline to protect corporate computers from criminal hackers is to ____.

 

Definition

a.

Install antivirus software on all computers

 

Term

Legislation that requires businesses to prove that they are securing their data ____.

Definition

a.

HIPPA

c.

USA Patriot Act

b.

Sarbanes-Oxley

d.

all of the above

D) ALL OF THE ABOVE

 

 

 

 

 

 

Term

Proper use of antivirus software requires that it is ____.

Definition

c.

used to scan all removable storage media before copying or running programs from them

 

Term

The European Union has a data protection directive that requires firms transporting data  ____ to have certain privacy procedures in place.

 

Definition
C) across national boundaries
Term

Roughly ____ of U.S. employers monitor their employees Web surfing activities

Definition
D) 75%
Term

____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire.

Definition
B) Platform for Privacy Preferences
Term

____ involves publishing an intentionally false written statement that is damaging to a person’s or an organization’s reputation.

Definition
b) libel
Term

The Privacy Act of 1974 ____.

 

   

 

Definition

a.

applies only to certain federal agencies

Term

The ____ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause.

Definition

a.

Electronic Communications Privacy Act

 

Term

The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.

Definition

b.

USA Patriot Act

 

Term

The ____ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data.

Definition

 

c.

Gramm-Leach-Bliley Act

 

Term

A job that requires sitting at a desk and using a computer all day can lead to ____.

Definition

a.

the formation of blood clots in the legs or lungs

b.

an undesirable weight gain

c.

greater risk of type 2 diabetes

d.

all of the above

D) ALL OF THE ABOVE

 

Term

____ is an aggravation of the pathway for the nerves that travel through the wrist.

Definition
C) carpel tunnel syndrome
Term

Computer users who work at their machines for several hours a day, should ____.

Definition
D) consider the use of artificial tears
Term

Spam messages often carry attached files with embedded ____________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files

Definition
viruses
Term

____________________ spam is a new tactic spammers use to circumvent spam-filtering software.

Definition
Image Based
Term

                  Most organizations implement internal ____________________ to measure actual results against established goals, such as percentage of end-user reports produced on time.

 

Definition
audits
Term

Often computer criminals talk a critical password out of a person, a practice called _______________.

Definition
social engineering
Term

A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching a computer-based attacks.

Definition
cyberterrorist
Term

____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.

Definition
Identity Theft
Term

              With ____________________ tools, law enforcement agencies can analyze crime data relative to other factors, including the locations of common crime scenes and certain demographic data.

 

Definition
GIS
Term

A(n) ____________________ is a modified version of a virus.

 

 

 

Definition
Variant
Term

Software is considered intellectual property and may be protected by copyright or ____________________ law.

Definition
patent
Term

____________________ is involved in what represents the largest copyright infringement case in history.

Definition
Google
Term

____________________ is the operation of a fake Web site by someone trying to gain access to customer’s private information.

Definition
Phishing
Term

The ____________________ card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.

Definition
Spoof
Term

Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use.

Definition
Encryption
Term

             A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.

 

Definition
Intrusion Detection
Term

         Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organizations’ security defenses.

 

Definition
security dashboard
Term

Managed ____________________ providers monitor, manage, and maintain network security for their customers.

Definition
security service
Term

               A(n)  ____________________ is a person paid by a company about how much they’ve earned and how easy the get-rich-quick plan was to operate.

 

Definition
shill
Term

                    A libeled party can file what is known as a ____________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster.

 

Definition
"John Doe"
Term

Organizations implement ____________________ software to prevent employees from visiting Web sites not related to work.

 

Definition
filtering
Term

The hazardous activities associated with unfavorable working conditions are collectively referred to as ____________________.      

Definition
work stressors
Term

                   The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.

 

Definition
ergonomics
Term

When working at a workstation, the ____________________ of the monitor should be at or just below eye level.

Definition
top
Term

Just because an act is defined as legal does not mean that it is ____________________.

Definition
ethical
Term

____________________ issues deal with what is generally considered right or wrong.

Definition
ethical
Term

The ____________________ is the oldest computing society and boasts more than 80,000 members in more than 100 countries.

 

Definition

Association for Computing Machinery

Supporting users have an ad free experience!