Which term refers to the unauthorized stealing of personal information from a computer system?

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (25)

True or False

Hardware consists of programs that tell a computer how to function.

False

True or False

The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information is called data warehousing.

False

True or False

System software tells the computer's hardware how to interact with the software, what resources to use, and how to use them.

True

True or False

Through data mining, a manager can access demographic information on customers, for example, in order to decide which advertising media may be best to use.

True

Who has access to intranets generally?

A) employees
B) suppliers
C) customers
D) shareholders
E) dealers

A) employees

What is a computer-based system that allows people to communicate simultaneously from different locations via telephone, e-mail, or video?

A) groupware
B) a data communication network
C) a management information system
D) electronic conferencing
E) hypertext

D) electronic conferencing

What feature allows people in remote locations to work simultaneously on one document?

A) videoconferencing
B) voice mail
C) dataconferencing
D) digital information service
E) text messaging

C) data conferencing

What type of network links computers and workstations, usually within one building?

A) satellite communication
B) global positioning
C) personal digital
D) wide area
E) local area

E) local area

What feature does a firewall provide?

A) Internet access
B) protection from electrical surges
C) connectivity between stations in a LAN
D) privacy protection
E) links to computers in a WAN

D) privacy protection

Which type of communication technology is attractive to businesses because it eliminates travel expenses?

A) VSAT satellite communications
B) extranets
C) intranets
D) electronic conferencing
E) client-server networks

D) electronic conferencing

Who is the person in charge of operating the systems used for gathering, organizing, and distributing information?

A) production manager
B) operations manager
C) information systems manager
D) research and development manager
E) communications manager

C) information system manager

What is the term used for searching, sifting, and reorganizing pools of data to uncover useful information?

A) data warehousing
B) data access
C) data tapping
D) data cleaning
E) data mining

E) data mining

Which cybercriminal activity refers to the act of luring Internet users to bogus websites?

A) computer virus distribution
B) spamming
C) phishing
D) Trojan horse distribution
E) piracy

C) phishing

Which term refers to the unauthorized stealing of personal information from a computer system?

A) espionage
B) leverage
C) denial of service
D) identity theft
E) network flooding

D) identity theft

What is "spam"?

A) a form of firewall
B) intellectual property
C) junk e-mail
D) a form of hacking
E) wireless mooching

C) junk e-mail

What is the name of software and hardware that prevent hackers from accessing a company's internal network?

A) partition
B) firewall
C) extranet
D) index
E) security

B) firewall

What are keyboards, monitors, and printers examples of?

A) control
B) hardware
C) software
D) databases
E) servers

B) hardware

Which of the following BEST describes information?

A) the useful interpretation of facts and figures
B) a list of company names provided by the local Chamber of Commerce
C) the collection of raw facts and figures
D) controlled flow of words for a useful purpose
E) databases and flowcharts

A) the useful interpretation of facts and figures

Which of the following supports an organization's managers by providing daily reports, schedules, plans, and budgets?

A) management application systems
B) management operations systems
C) management information systems
D) management expert systems
E) management enterprise systems

C) management information systems

What is a management information system?

A) a system that supports managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions
B) an easy-access application of an information system designed for instant access by upper-level managers
C) an information processing application for use in business activities involving well-defined processing steps
D) an interactive system that locates and presents information needed to support the decision-making process
E) a repository of information resources related to the collection of data

A) a system that supports managers by providing daily reports, schedules, plans, and budgets that can be used for making decisions

A small parochial school uses handwritten timecards and attendance sheets to calculate biweekly payroll and vacation time. Which statement, if true, would BEST support the idea by managers to convert to computer software to maintain employee records?

A) The school has multiple types of employees, with different work schedules and different contracts, whose hours are calculated by hand.
B) Part-time staffing has been allocated for payroll and human resource function.
C) Employees often submit their timecards incorrectly.
D) Employees often forget to submit their vacation request forms.
E) The existing management is eager to switch to the new system for human resources.

A) The school has multiple types of employees, with different work schedules and different contracts, whose hours are calculated by hand.

The increase of technology in the workplace has resulted in more employees working at home and telecommuting. Telecommuting employees rely heavily on e-mail communication to complete work tasks. Which statement, if true, BEST supports those who claim that e-mail communication fosters increased misunderstandings?

A) The high volume of e-mail discourages employees from interacting with coworkers face to face, thus leading to more misunderstandings.
B) Most e-mail communication among workers is polite and to the point.
C) People who e-mail frequently don't know how to communicate verbally with others.
D) E-mail fosters more nonverbal communications between workers in a company.
E) Workers communicate more frequently about work when e-mailing.

A) The high volume of e-mail discourages employees from interacting with coworkers face to face, thus leading to more misunderstandings

Which type of IT threat can spread without a computer user needing to open any software?

A) worms
B) Trojan horses
C) spam
D) spyware
E) computer viruses

A) worms

Which of the following BEST describes a firewall?

A) a software and hardware system that prevents outsiders from accessing a company's internal network
B) a tool that searches Web pages containing the user's search terms and then displays pages that match
C) a private network of internal websites and other sources of information available to a company's employees
D) an Internet connection allowing outsiders limited access to a firm's internal information system
E) an extranet site that gives customers access to different product lines

A) a software and hardware system that prevents outsiders from accessing a company's internal network

Why might businesses want to analyze data that reveal what consumers do in the marketplace?

A) to be able to send them tailor-made advertisements
B) to be able to close the customer service department
C) to be able to reduce production costs
D) to be able to stabilize employee turnover
E) to be able to manage long-term costs

A) to be able to send them tailor-made advertisements

Sets with similar terms

ldxt.x.f

30 terms

dimentio14253

Chapter 12 - Enterprise Computing

63 terms

shugo89149PLUS

Chapter 12 - Enterprise Computing

63 terms

Caricia_Heredia

Chapter 14 Business

30 terms

haileyjamess

Sets found in the same folder

ECO 254-1

50 terms

maineallycat

Intro to Bus 7-12

78 terms

megharris44

Business Chapter 10 Part 2

26 terms

hannah_gellepes

Ch23

35 terms

ghost1550

Other sets by this creator

MKT233 Final Exam

68 terms

kfindlay2

MKT231 Final Exam Review

90 terms

kfindlay2

MQM220 Final (Chapters 6, 10, 11, 14, 15)

121 terms

kfindlay2

ACC131 Chapter 10 Multiple Choice

21 terms

kfindlay2

Verified questions

ENGINEERING

The aircraft carrier is moving at a constant speed and launches a jet plane with a mass of 3 Mg in a distance of 75 m along the deck by means of a steam-driven catapult. If the plane leaves the deck with a velocity of 240 km/h relative to the carrier and if the jet thrust is constant at 22 kN during takeoff, compute the constant force P exerted by the catapult on the airplane during the 75-m travel of the launch carriage.

Verified answer

ENGINEERING

The following mineral analysis was reported for Michigan State University well water (Michigan Department Environmental Quality, 1979). Determine the total, carbonate, and noncarbonate hardness (in $\mathrm{mg} \cdot \mathrm{L}^{-1}$ as $CaCO_3$). (Note: All units are $m g \cdot L^{-1}$ as the ion unless otherwise stated.) $$ \begin{matrix} \text{Mineral} & \text{Concentration} & \text{Mineral} & \text{Concentration}\\ \text{Fluoride} & \text{1.1} & \ {\text{Silica } (SiO_2)} & \text{13.4}\\ \text{Chloride} & \text{4.0} & \text{Bicarbonate} & \text{318.0}\\ \text{Nitrate} & \text{0.0} & \text{Sulfate} & \text{52.0}\\ \text{Sodium} & \text{14.0} & \text{Iron} & \text{0.5}\\ \text{Potassium} & \text{1.6} & \text{Manganese} & \text{0.07}\\ \text{Calcium} & \text{96.8} & \text{Zinc} & \text{0.27}\\ \text{Magnesium} & \text{30.4} & \text{Barium} & \text{0.2}\\ \end{matrix} $$

Verified answer

ENGINEERING

A 5-mm-diameter spherical ball at $50^\circ C$ is covered by a 1-mm-thick plastic insulation $(k = 0.13 W/m \cdot K).$ The ball is exposed to a medium at $15^\circ C,$ with a combined convection and radiation heat transfer coefficient of $20 W/m^2 \cdot K.$ Determine if the plastic insulation on the ball will help or hurt heat transfer from the ball.

Verified answer

ENGINEERING

Given that $E_g = 0.67\text{ eV}$ for germanium, find the wavelength of peak solar response for the material. Do the photons at this wavelength have a lower or higher energy level?

Verified answer

Other Quizlet sets

Stats 07: Hypothesis Testing with z Tests

11 terms

JasonHeardUPLUS

Chapter 16 MGT 352

75 terms

lambrandon96PLUS

ch. 1 socio review

41 terms

kayla_catuiza

Ccna 2 7-9

62 terms

aubcpress94

Related questions

QUESTION

How do we monitor fluency and what are the general wpm goals?

7 answers

QUESTION

What program(s) would you use to create and modify images, designs, and photographs?

15 answers

QUESTION

Which Integrated Maintenance Database System-Central Database (IMDS-CDB) subsystem allows users to track maintenance actions and has both maintenance and supply data?

15 answers

QUESTION

pineal gland (produces what? to do what?)

7 answers

Which term refers to the unauthorized use of personal information from a computer system?

Hacking is a term used to describe unauthorized access to systems, networks, and data (hereafter target). Hacking may be perpetrated solely to gain access to a target or to gain and/or maintain such access beyond authorization.

Which of the following is a cybercriminal who gains unauthorized access to a computer or network?

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.

What is the term used for searching sifting and reorganizing pools of data to uncover useful information?

The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information is called data warehousing.

What is a computer based system that allows people to communicate simultaneously from different locations via telephone e mail or video Group of answer choices?

Teleconferencing means meeting through a telecommunications medium. It is a generic term for linking people between two or more locations by electronics. There are at least six types of teleconferencing: audio, audiographic, computer, video, business television (BTV), and distance education.