Combo with "BCIS Ch.5 Morley" and 1 other

Our networked society has raised a number of ____ concerns.
privacy
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
1,000 feet
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
system failure
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
security slot
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
Cable locks
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
FDE
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.
encrypted
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
recovery
____ devices are designed to withstand much more physical abuse than conventional devices.
ruggedized
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
pads
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
ruggedized
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
UPS
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
patches
To supplement backup procedures, businesses and other organizations should have a(n) ____.
disaster recovery plan
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
backup
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.
hot site
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
7-10 years
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
information privacy
____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
Marketing databases
A marketing activity that can be considered a privacy risk is ____.
electronic profiling
Collecting in-depth information about an individual is known as ____.
electronic profiling
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
privacy policy
When spam is sent via IM it is called ____.
spim
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
throw-away email address
One common way to deal with spam that makes it to your computer is to use a(n) ____.
email filter
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
opting out
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.
opt. in
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.
Computer monitoring software
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
video surveillance
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
Video surveillance
____ refers to companies recording or observing the actions of employees while on the job.
Employee monitoring
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
video cards
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
Presence technology
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
Antispyware software
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
CAN-SPAM act
Both manufacturers and online retailers—often called _____ —can sell directly to customers via their Web sites.
e-tailers (or e-retailers)
Banner ad _____ facilitate displaying banner ads for your site on other Web sites, in return for you displaying other banner ads on your site.
exchanges
Many _____ are available to gather prices, shipping, and delivery information from multiple sites for a particular product and summarize the results to help locate the best buys from potential vendors.
shopping bots (used by comparison shopping Web sites)
A(n) _____ exchange site is designed to help match organizations with goods or services to sell with potential buyers who desire those resources.
market
_____ is the process of making changes to Web pages, as needed, to increase their visibility in search site results.
Search engine optimization
An important promotional strategy is regularly _____ your site with new content.
updating
Each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and transfers it to the _____.
merchant account
Widely-used _____ services that an e-commerce Web site might include are online order tracking, online versions of product instruction manuals, and customer service via e-mail or live chat. These are used to support customers and increase their satisfaction and loyalty.
eCRM (electronic customer relationship management)
Dynamic multimedia ads are also called _____ ads.
rich media
A market exchange site is sometimes referred to as a(n) _____.
e-marketplace
Instead of selling an actual physical or electronic product to customers, _____ sites sell access to online services.
subscription
The _____ model includes any type of e-commerce transaction taking place between two businesses.
B2B (business-to-business)
_____ credit cards are credit cards that are preloaded with a specific amount of money, which becomes the total liability of the card.
Prepaid
Many businesses have both brick-and-mortar stores and an online store. These businesses are sometimes referred to as _____ stores.
click-and-mortar (or bricks-and-clicks)
_____ sites facilitate the exchange of financial items (such as stocks, bonds, futures, and options) between buyers and sellers.
Financial brokerage
Secure Web sites use _____ to safely transfer sensitive data over the Internet.
encryption
Explain the consumer-to-consumer (C2C) e-commerce business model.
The consumer-to-consumer (C2C)—sometimes referred to as the person-to-person (P2P)—model involves individuals selling directly to other individuals. Typically, C2C transactions are carried out via intermediary Web sites set up to facilitate this, such as online auction sites like eBay and online classified ad sites like Craigslist. In fact, with millions of products up for auction at any time, eBay is one of the largest C2C e-commerce sites today.
What are electronic gift certificates, gift cards, and coupons?
Digital gift certificates and gift cards are convenient methods of allowing a gift recipient to select the items he or she wantstobuyatanonlinestore.Theyworksimilarlytoconventionalgiftcertificatesandgiftcardsbuta serial number or other identifying number is entered during the checkout process to verify the certificate or card. Some gift certificates and gift cards that are redeemed electronically are purchased in physical form; others are entirely electronic. Digital coupons consist of codes—typically called coupon codes—that are entered into the appropriate box on a checkout page in order to deduct the coupon amount from a purchase total.Manysitesspecializein gatheringandsummarizingcouponcodesforavarietyofonlinemerchants.Ifan invalidcouponcodeisenteredor ifacouponcodehasexpired,thecoupondiscountwillnotbeapplied.
What is storefront software?
Storefront software is a type of software that can be used to create an online store. Storefront software varies widely in capabilities and some programs have multiple versions available in order to create different types of e- commerce businesses. For instance, some programs are most appropriate for a small business owner who wants to begin selling a limited number of products online; others are designed for large businesses that require real-time inventory capabilities, multiple pricing structures, the ability for salespeople to place orders from the field, and other more complex features. Virtually all storefront software programs support credit card sales and secure checkout pages; some have wizards and other tools to help create the storefront quickly and easily.
Discuss click fraud.
Click fraud occurs when sponsored links-such as on a search site results page-are clicked when there is no interest in the product or service associated with the sponsored link. The links can be clicked by a person or by an automated clicking program (sometimes referred to as a clickbot and often performed by botnets). The motive for click fraud is usually financial. For instance, although viewed as unethical in the business world, a company might click on a competitor’s sponsored links in order to deplete that company’s advertising budget. In addition,some companiesorindividualscreateWebpagesconsistingprimarilyofsponsoredlinks(usually sponsoredlinksfrom Google,Yahoo!,orothersearchsitesthatareplacedonothersitesviaadnetworks)for the purpose of click fraud. Web sites hosting a sponsored link get a fee each time the link on that page is clicked,sothesecompaniesor individualsmanuallyorautomatically(viasoftwareorbotnets)clicktheadson their sites to fraudulently generate revenue. In fact, the independent click fraud monitoring and reporting service Click Forensics estimates that more than 60% of all ad traffic coming from these types of sites is fraudulent.
Discuss how costs are reduced for businesses using e-commerce.
Many of the cost reductions result from the need for smaller facilities and fewer staff. In particular, stores with only an online (not a physical) presence experience lower costs because they do not have the expenses associated with maintaining a physical storefront, like conventional brick-and-mortar stores do. Even though a dot-com store may need a company headquarters and possibly one or more inventory warehouses, these types of facilities are much less expensive to operate than a retail store that may need to have a physical presence in multiple prime locations in order to reach potential customers. Other potential areas of cost reductions associated with e- commerce include the ability to sell directly to customers (and, therefore, save the cost associated with using retailersorother middlemen),usingelectronicmarketingresources(suchase-mailpromotionsandWebsite ads) instead of printed materials to save on marketing and advertising costs, and increased accuracy in order processing and pricing.
Web sites such Amazon.com, Walmart.com, Overstock.com, and BestBuy.com are examples of _____ sites. a. B2B b. B2C
c. B2G d. C2C
b (B2C)
In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) _____.
a. Internet merchant account b. Net merchant account c. Internet business account d. Web card account
a (Internet merchant account)
The collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) _____.
a. Net-commerce system b. Internet B-platform
c. e-commerce system d. EB-platform
c (e-commerce system)
The C2C model is also known as the _____ model. a. B2B b. P2P
c. B2G d. B2C
b (P2P)
_____ bring buyers and sellers together to facilitate transactions between the two parties. a. M-Brokers b. E-tailers
c. Shop carts d. Brokerage sites
d (brokerage sites)
With the _____, businesses sell goods or services to individual consumers.
a. business-to-consumer (B2C) model b. business-to-government (B2G) model c. business-to-business (B2B) model d. consumer-to-consumer (C2C) model
a (B2C)
_____ seals are issued by the Certificate Authority issuing the site’s SSL or EV SSL certificate and are designed to remind shoppers that the site is protected by that certificate.
a. Privacy b. Protection
c. Warranty d. Security
d (security)
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) _____.
a. order-fulfillment company b. electronic storefront
c. brick-and-mortar store d. smart card
a (order-fulfillment company)
_____ is an online payment service that allows individuals to transfer money easily from their online payment account to someone else’s.
a. SimpleTech b. PayPal
c. Wal-Mart d. eBay
b (PayPal)
The goal of _____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business.
a. VOD b. SEO
c. OTP d. URLP
b (SEO)
Although B2C was initially expected to be the most prominent type of e-commerce business model, revenues from the _____ model are now expected to far surpass the B2C marketplace.
a. C2C b. B2G
c. B2B d. B2E
c (B2B)
_____ businesses sell products and services to local, state, and federal government buyers. a. B2B b. C2C
c. B2C d. B2G
d (B2G)
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. He recently received a contract to print T-shirts for the US Department of Justice. This is an example of a
_____ transaction. a. B2C b. B2B c. B2G d. C2C
c (B2G)
_____ store checkout information in the customer’s account for use with purchases on that site only. a. Site-specific smart cards b. Site-specific electronic check accounts
c. Site-specific online payment accounts d. Site-specific digital wallets
d (site-specific digital wallets)
Companies that follow the _____ do not sell goods or services directly to others, but instead bring buyers and sellers together within a specific industry or business process.
a. business-to-government (B2G) model b. person-to-person (P2P) model
c. business-to-business (B2B) model d. intermediary hub model
d (intermediary hub model)
To reassure customers, all e-commerce sites should develop and display a _____ policy stating how collected customer information will be used.
a. business model b. customer
c. privacy d. database
c (privacy)
Comparison shopping Web sites are sometimes called _____. a. shopping bots b. shopping bags
c. shopping carts d. e-shopping
a (shopping bots)
Perhaps the biggest disadvantage of e-commerce from a customer standpoint is the _____. a. inability to return items b. difficulty of using credit cards
c. risk of fraud d. inability to see merchandise
c (risk of fraud)
Many e-commerce sites require shoppers to enter the _____ printed on the back of the credit card to prove they have possession of the card.
a. Virtual Credit card number b. Card Verification Code (CVC)
c. OTP code d. eWallet code
b (CVC)
For businesses that already have an existing Web site and just need to add ordering capabilities and checkout procedures to that site, _____ can be used.
a. e-order software b. shopping robot software
c. shopping cart software d. online order software
c (shopping cart software)
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a _____ to authenticate the validity of any contracts she signs electronically.
a. digital certificate b. banner ad
c. digital wallet d. permission-based ad
a (digital certificate)
_____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site.
a. Web site planning b. Web site design
c. Web site deployment d. Web site development
d (web site development)
Common _____ activities include providing online order status information, links for tracking delivery
shipments, a. C2C
c. eCMS
downloadable product manuals, and online technical support, such as via e-mail or live chat. b. eCRM
d. CBT
b (eCRM)
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing. Some of John’s customers want to buy Christmas presents for their friends, but are unsure of what to select. John should encourage these customers to purchase _____ that the recipients can redeem at a later date.
a. digital wallets b. digital gift certificates c. smart cards d. electronic storefronts
b (digital gift certificates)
One of the most recognized privacy seals is the _____ trustmark. a. PayPal b. TRUSTe
c. SimpleTech d. Peer Impact
b (TRUSTe)
Instead of selling an actual physical or electronic product to customers, _____ sell access to online services. a. subscription sites b. video-on-disk sites
c. online auction sites d. B2G sites
a (subscription sites)
____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database.
a. Page b. Search c. Site d. Meta
d (Meta)
Because of the low overhead costs associated with _____, new e-commerce businesses can enter the marketplace relatively inexpensively.
a. shopping carts b. online stores
c. shopping bags d. storebots
b (online stores)
Instead of a formal auction with a specific ending time and an automatic winner, dynamic pricing sites— such as _____ —allow buyers to bid on items or services listed for sale, and then the seller decides whether or not to accept each offer on an individual basis.
a. PriceGrabber.com b. eBay
c. Priceline.com d. PayPal
c (Priceline.com)
If you own the trademark to your business name, the _____ Consumer Protection Act protects your trademark in cyberspace.
a. Anticybersquatting b. Online
c. Cyberbusiness d. Trademark
a (Anticybersquating)
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet. Sharon has a different password for each Web site that she uses. However, she is afraid of forgetting some of these passwords and being unable to access her records. The best solution is for her to use _____.
a. shopping cart software b. storefront software c. banner ads d. a digital wallet
d (digital wallet)
When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called _____ hubs.
a. vertical b. horizontal c. centered d. subscription
a (vertical)
_____ is the term used to describe conducting business transactions—generally financial transactions—via communications technology.
a. Internet-transaction b. E-commerce
c. Net-commerce d. Net-business
b (e-commerce)
Banner ads can be _____ —that is, ads that are targeted to individuals based on their preferences, buying habits, or interests.
a. behavioral targets b. behavioral ads c. preference ads d. ad mining
b (behavioral ads)
Law enforcement agencies contend that _____ systems and public video surveillance are no different than the many private video surveillance systems in place today.
face recognition
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer _____ software.
tracking
_____ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.
Opting out
A(n) _____ app can lock and unlock your computer automatically as your iPhone moves in and out of range.
proximity
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge _____ with a computer whenever it is plugged into a power outlet.
suppressor
By _____ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
educating
_____ procedures, such as making copies of important documents and storing them in a safe location, also apply to important non-electronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
Backup
A growing illegal use of computer monitoring software is for a hacker to use a(n) _____ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
keystroke logging
_____, the unauthorized copying of a computer program, is illegal in the United States and many other—but not all—countries.
Software piracy
The U.S. _____ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
SAFE WEB
One antipiracy tool is requiring a unique _____ code.
Activation (or registration)
_____ occurs when hardware is stolen from an individual or from a business, school, or other organization.
Hardware theft
Heat, dust, static and _____ fluctuations can all damage computer hardware
power
_____ labels change their appearance if someone (such as a thief) tries to remove them.
Tamper evident
Discuss the proper disposal of hardware containing sensitive information.
CDs, DVDs, and other media containing sensitive data should be shredded, and the hard drives of computers to be disposed of should be wiped—overwritten several times using special disk-wiping or disk-erasing software— before they are sold or recycled. Unlike the data on a drive that has merely been erased or even reformatted (which can still be recovered), data on a properly wiped drive is very difficult or impossible to recover. Wiping is typically viewed as an acceptable precaution for deleting sensitive data (such as Web site passwords and tax returns) from hard drives and other storage media belonging to individuals, as well as for storage media to be reusedwithinan organization.However,beforedisposingofstoragemediacontainingsensitivedata,businesses shouldconsider physicallydestroyingthemedia,suchasbyshreddingormeltingthehardware.Tohelpwith this process, data destruction services can be used. To ensure that all hardware containing business data is properlydisposedof,itis importantforallbusinessestodaytodevelopandimplementapolicy(oftencalleda mediasanitizationordata destructionpolicy)fordestroyingdatathatisnolongerneeded.
Describe e-mail filters.
Custom e-mail filters are used to route messages automatically to particular folders based on stated criteria. For example, you can specify that e-mail messages with keywords frequently used in spam subject lines (such as free, porn,opportunity,lastchance,weight,pharmacy,andsimilarterms)beroutedintoafoldernamedPossible
Spam, and you can specify that all e-mail messages from your boss’s e-mail address be routed into an Urgent folder. Filtering can help you find important messages in your Inbox by preventing it from becoming cluttered with spam. However, you need to be sure to check your Possible Spam or Junk E-mail folder periodically to locate any e-mail messages mistakenly filed there—especially before you permanently delete those messages.
Discuss the features and benefits of continuous data protection.
For an even higher level of security than a scheduled backup, continuous data protection (CDP) can be used. A CDP backup system backs up data in real time as it changes so that data can be recovered from any point in time (even just a few minutes ago) with no data loss, and recovery can be as fast as five minutes after a failure. Although expensive when used with large quantities of data, it is one of the best ways to ensure that company data is protected. In addition to business data, CDP is beginning to be used by individuals to safeguard their data. For extra protection against data loss due to a natural disaster or other geographic-specific risk, businesses should use cloud providers that are in a physical location that is different from the company’s location.
Why should you be concerned about computer security?
Today, there are a number of security concerns surrounding computers and related technology that all individuals should be concerned about, including having your computer stolen, losing a term paper because the storage medium your paper was stored on becomes unreadable, losing your mobile phone containing your entire contact listand calendar,orrunningtheriskofbuyingpiratedordigitallycounterfeitedproducts.
What do surge suppressors do?
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge suppressor; the surge suppressor should be used to connect a computer and other hardware whenever they are plugged into a power outlet. When electrical power spikes occur, the surge suppressor prevents them from harming your devices. For the best protection, surge suppressors should be used with all the powered components that have a wired connection to the computer (such as a monitor or printer). There are small surge suppressors designed for use while on the go, and others designed for business and industrial use.
_____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
a. Computer monitoring b. Computer surveillance
c. Multimedia surveillance d. Video surveillance
d (video surveillance)
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews fromotherbuyersbeforebuyingaproduct.However,Samuelisalsoconcernedaboutprotectinghis personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site’s _____.
a. protection history b. consumer policy c. privacy record d. privacy policy
d (privacy policy)
_____ are small programs that take care of software-specific problems, or bugs, such as security holes. a. Backups b. Applets
c. Scripts d. Patches
d (patches)
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____.
a. junkie e-mail address b. throw-away e-mail address
c. one-use e-mail address d. second-hand e-mail address
b (throw-away email address)
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its _____.
a. recycle b. recovery c. repair d. running
b (recovery)
Creating a _____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
a. mirror b. hotspot
c. hot file d. backup
d (backup)
Although many of us may prefer not to think about it, _____ —the complete malfunction of a computer system—and other types of computer-related disasters do happen.
a. software piracy b. interrupted power c. spikes d. system failure
d (system failure)
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach _____ to these devices.
a. kill switches b. surge suppressors
c. asset tags d. keyloggers
c (asset tags)
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly _____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
a. 50 feet b. 1,000 feet
c. 100 feet d. 2 miles
b (1,000)
One common way to deal with spam that makes it to your computer is to use a(n) _____. a. e-mail filter b. spam e-mail address
c. encryption scheme d. hot site
a (email filter)
Most businesses and Web sites that collect personal information have a(n) _____ that discloses how the personal information you provide will be used.
a. piracy policy b. security policy
c. identity policy d. privacy policy
d (privacy policy)
_____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
a. Antivirus software b. Antispyware software
c. Antispoof software d. Antiphish software
b (antispyware software)
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case?
a. kill switch hard drives b. surge suppressors c. DataDots d. keylogging software
a (kill switch hard drive)
When spam is sent via IM it is called _____. a. spoof b. phish
c. spim d. junk
c (spim)
_____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
a. Surge suppressors b. Password locks
c. Spike suppressors d. Cable locks
d (cable lock)
_____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
a. USB b. RFID
c. IDC d. FDE
d (FDE)
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of _____.
a. proximity cards b. presence technology
c. face recognition d. video cards
a (proximity cards)
The _____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
a. Sarbanes-Oxley Act b. USA Patriot Act
c. CAN-SPAM act d. Junk Fax Prevention Act
c (CAN-SPAM act)
By _____, you instruct companies you do business with that they cannot share your personal data with third parties.
a. signing piracy agreements b. opting out
c. contracting legal help d. e-mailing them
b (opting out)
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used.
a. information privacy b. information security
c. information piracy d. digital Counterfeiting
a (information privacy)
_____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
a. Government databases b. Marketing databases
c. Educational databases d. Research databases
b (Marketing databases)
_____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.
a. Surveillance software b. Video software c. Computer monitoring software d. Audio software
c (computer monitoring software)
A marketing activity that can be considered a privacy risk is _____. a. security threads b. watermarking
c. electronic profiling d. microprinting
c (electronic profiling)
To supplement backup procedures, businesses and other organizations should have a(n) _____. a. insurance plan b. continuation rule
c. disaster recovery plan d. survival guide
c (disaster recovery plan)
A(n) _____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.
a. buddy site b. alternate pad
c. hot site d. white room
c (hot site)
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) _____.
a. UPS b. surge suppressor c. voltage controller d. voltage meter
a (UPS)
_____ devices are designed to withstand much more physical abuse than conventional devices. a. Secured b. Ruggedized
c. Malleable d. Flexible
b (ruggedized)
_____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
a. Presence technology b. Computer monitoring
c. Digital surveillance d. Detection technology
a (presence)
DeQuervain’s _____ is a condition in which the tendons on the thumb side of the wrists are swollen and irritated.
tendonitis
A student copying and pasting information from various online documents to create her research paper without crediting the original authors is considered to be committing _____.
plagiarism
The 1976 _____ extended copyright protection to nonpublished works, so, immediately after creating a work in some type of material form, the creator automatically owns the copyright of that work.
Copyright Act
If the current _____ holder has a legitimate reason for using that name and does not appear to be a cybersquatter, WIPO may allow the holder to continue to use that domain name.
domain name
Some _____ centers will accept computer equipment, but many charge a fee for this service.
recycling
The term _____ refers to standards of moral conduct.
ethics
A(n) _____ is a policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
code of ethics
A trademark used to identify a service is also called a(n) _____.
service mark
Carpal Tunnel Syndrome is an example of a(n) _____ injury.
repetitive stress (RSI)
_____ are written with the purpose of being circulated to as many people as possible.
hoaxes (e-mail hoaxes)
_____ are the standards of conduct that guide a business’s policies, decisions, and actions.
Business ethics
Sometimes a different lens prescription or special computer _____ can be used to reduce eyestrain while working on a PC.
glasses
View your _____ as a temporary location only; after reading an e-mail message, immediately delete it, flag it, or file it in an e-mail folder.
e-mail Inbox
The practice of providing false information in an attempt to look more qualified for a job, sometimes referred to as _____, is both dishonest and unethical.
resume padding
A(n) _____ is designed primarily to elevate the display screen of a notebook or tablet computer to the proper height.
notebook stand (or docking station)
_____ are the legal rights to which the creators of intellectual property—original creative works—are entitled.
Intellectual property rights
To help identify and prosecute a “cammer,” most movie studios now embed invisible _____ in each print released to a theater.
digital watermarks
It now appears that the so-called _____ office that many visionaries predicted would arrive is largely a myth. Instead, research indicates that global paper use has grown more than six-fold since 1950, and one-fifth of all wood harvested in the world today ends up as paper.
paperless
The _____ makes it illegal to circumvent antipiracy measures built into digital media and devices.
Digital Millennium Copyright Act (DMCA)
What is a computer hoax?
A computer hoax is an inaccurate statement or story—such as the “fact” that flesh-eating bacteria have been found in banana shipments or that Applebee’s will send you a gift certificate for forwarding on an e-mail—spread through the use of computers. These hoaxes are sometimes published on Web pages, but they are more commonly spread via e-mail. Common computer hoax subjects include nonexistent computer viruses, serious health risks, impending terrorist attacks, chain letters, and free prizes or giveaways. Inaccurate information posted on a Web site or wiki just to be misleading can also be considered a computer hoax. E-mail hoaxes are written with the purpose of being circulated to as many people as possible.
Give some examples of ethically questionable business practices that have been in the news.
One ethical issue a business may run into is whether or not to implement a business process or decision that is ethically questionable. For example, Google and Microsoft are in an ongoing battle about Microsoft’s decision to offer its own YouTube app (which Google blocked shortly after its release because the app violated Google’s terms of service), and Microsoft is facing a possible $7 billion fine for its decision not to display a screen that would enable European Union Windows users to choose between Internet Explorer and other browsers. Other ethically questionable business decisions relate to customer privacy. For example, several plastic surgeons have been sued recently for posting pre-op and postop photos of patients on their Web sites; in one current case, the photos were posted even though the patient signed a statement that she did not give consent to use her photos for promotional purposes.
Explain how patents work.
Unlike copyrights (which protect artistic and literary works) and trademarks (which protect a company’s logo and brand names), a patent protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. A patented invention is typically a unique product, but it can also be a process or procedure that provides a new way of doing something or that offers a new technical solution to a problem. Like trademarks, U.S. patents are issued by the U.S. Patent and Trademark Office (USPTO).
What is ergonomics?
Ergonomics is the science of fitting a work environment to the people who work there. It typically focuses on making products and workspaces more comfortable and safe to use. With respect to computer use, it involves designinga safeandeffectiveworkspace,whichincludesproperlyadjustingfurnitureandhardwareandusing ergonomic hardware when needed. A proper work environment—used in conjunction with good user habits and procedures— can prevent many physical problems caused by computer use. A proper work environment is importantforanyone whoworksonacomputer,includingemployeesusingacomputeronthejob,individuals usingacomputerathome, andchildrendoingcomputeractivitiesathomeoratschool.
What is a trademark? How long do trademarks last?
trademark is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. A trademark used to identify a service is also called a service mark. Trademarks that are claimed but not registered with the U.S. Patent and Trademark Office (USPTO) can use the mark TM; nonregistered service marks can use the symbol SM. The symbol ® is reserved for registered trademarks and service marks. Trademarks for products usually appear on the product packaging with the appropriate trademark symbol; service marks are typically used in the advertising of a service because there is no product on which the mark can be printed. Trademarked words and phrases—such as iPod®, Chicken McNuggets®, Google DocsTM, and FedEx OfficeSM—are widely used today. Trademarked logos are also common. Trademarks last 10 years, but they can be renewed as many times as desired, as long as they are being used in commerce.
_____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.
a. WIPO b. DRM
c. OLPC d. USPTO
a (WIPO)
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. In order to prevent others from stealing her logo, Jill should get a _____.
a. patent b. trademark
c. copyright d. digital watermark
b (trademark)
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is _____.
a. copyright law b. religion
c. vaporware d. corporate missions
a (copyright law)
The term _____ refers to the gap between those who have access to information and communications technology and those who do not.
a. digital have not b. digital divide
c. Internet divide d. bit divide
b (digital divide)
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then _____ and resold.
a. reprogrammed b. refurbished
c. recharged d. recycled
c (recharged)
The goal of _____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self- expression.
a. OX b. Simputer
c. OLPC d. InternetWorld
c (OLPC)
A teacher sharing a poem with a class, leading the class to believe the poem was his original work constitutes _____.
a. bad manners b. plagiarism
c. trademark theft d. patent infringement
b (plagiarism)
To prevent sore or stiff neck, _____.
a. use a footrest, if needed, to keep your feet flat
b. cover windows or adjust lighting to eliminate glare
c. rest and gently stretch your fingers and arms every 15 minutes or so d. place the monitor directly in front of you
d (position the monitor)
_____ is an example of assistive output devices.
a. One-handed keyboard b. Head-pointing system with puff switch c. Voice input system d. Screen reader software
d (screen reader software)
A _____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years. a. trademark b. watermark
c. patent d. copyright
c (patent)
To catch people who are sharing movies illegally on the Internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and then identifies the responsible individual by using the _____ of the computer being used to share the movie.
a. IP address b. broadcast flag
c. RAM d. serial port
a (IP address)
A condition known as _____ has been linked to the repetitive finger movements made when using a keyboard. a. ergonomics b. carpal tunnel syndrome (CTS)
c. burnout d. computer hand syndrome (CHS)
b (carpal tunnel syndrome)
A _____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.
a. code of security b. code of conduct
c. privacy policy d. piracy policy
b (code of conduct)
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of _____.
a. DRM b. AACSB
c. patents d. RSI
a (DRM)
A(n) _____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
a. trademark b. copyright
c. patent d. intellectual ownership right
b (copyright)
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to _____ —a state of fatigue or frustration brought about by overwork.
a. burnout b. CTS c. CVS d. RSI
a (burnout)
n addition to being a copyright concern, _____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even create false or misleading photographs.
a. digital counterfeiting b. identity theft
c. plagiarism d. digital manipulation
d (digital manipulation)
To combat his backache, Jack’s doctor advised him to _____. a. use a footrest
b. use a lower screen resolution
c. turn down the volume when using headphones d. use a light touch on the keyboard
a (footrest)
Acquiring a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as _____.
a. cyberinvasion b. cyberintrusion
c. digital invasion d. cybersquatting
d (cybersquatting)
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require _____ to personally vouch for the truth and fairness of their company’s disclosures.
a. CEOs and CIOs b. CEOs and CFOs c. SOAs and DRMs d. CCVs and DRMs
b (CEOs and CFOs)
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the _____ (ADA).
a. American Data Act b. Assistive Data Act
c. American Democracy Act d. Americans with Disabilities Act
d (Americans with Disabilities Act)
One controversial patent granted to Google in 2013 is for “_____” advertising—a business model for charging advertisers according to the number of views an ad receives via a “head mounted gaze tracking device” (speculated to be Google Glass).
a. pay-to-look b. pay-for-play
c. pay-for-gaze d. pay-to-view
c (pay-for-gaze)
Copyrights apply to both published and unpublished works and remain in effect until _____. a. 10 years after the creation of the work
b. 70 years after the creation of the work
c. 10 years after the creator’s death
d. 70 years after the creator’s death
d (70 years after creator’s death)
In 1992, the U.S. Environmental Protection Agency (EPA) introduced _____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.
a. ENERGY STAR b. Eco-Label
c. VeriChip d. the Green Power Initiative
a (Energy Star)
A _____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.
a. digital patent b. digital trademark
c. digital watermark d. digital copyright
c (digital watermark)
ill plans to publish a book based on her experiences in order to help young entrepreneurs. To help protect her publishing rights, she should register a _____.
a. patent b. trademark
c. copyright d. digital watermark
c (copyright)
With more than 78% of its population online, _____ is the leading world region in Internet users. a. Middle East b. Europe
c. Africa d. North America
d (North America)
In addition to being annoying and a waste of time, _____ bog(s) down e-mail systems and clog users’ Inboxes. a. computer worms b. Trojan horses
c. e-mail hoaxes d. digital manipulation
c (e-mail hoaxes)
e-portfolio
A(n) ____ is a collection of an individual’s work accessible through a Web site.
keyword search
The ____ is the most commonly used Internet search type.
RSS
Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about
her team is delivered to her as it becomes available.
What is RSS?
RSS (Rich Site Summary) is a format for delivering regularly changing web content. Many news-related sites, weblogs and other online publishers syndicate their content as an RSS Feed to whoever wants it.
search engine
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web
pages to help visitors find Web pages that contain the information they are seeking.
Field searches
limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.
Address bar
To navigate to a new Web page for which you know the URL, type that URL in the browser’s ____ and press
Enter.
search sites
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the
Internet.
XHTML
Sarah has hired a programmer to create a Web page for her business. What type of programming language will the
programmer use?
Snopes
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors
and stories
Netiquette
____ refers to guidelines for online behavior
Ultrabooks
Ultraportables conforming to Intel’s standards can be marketed as ____.
computer network
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware,
software, and data, as well as electronically communicate with each other
smart appliances
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or
communications technology.
software
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
two and a half years
Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task in ____,
instead of the decade it usually took to process the data by hand
mouse
Common input devices include the keyboard and ____.
Input
____ occurs when data is entered into the computer
modems
Two of the most common types of communications hardware are ____ and network adapters.
Internet addresses
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as
computers, Web pages, and people
mobile device
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.
convertible tablets
Hybrid notebook-tablet computers are also called ____.
Shouting
____ refers to typing your entire e-mail message or discussion group post using only capital letters
midrange server
A(n) ____ is a medium-sized computer used to host programs and data for a small network
microcomputer
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time
third-generation computers
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny
silicon chip, allowed computers to be even smaller and more reliable than earlier computers.
uniform resource locator (URL)
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely
identifies a Web page
information
When data is processed into a meaningful form, it becomes ____.
wikis
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be
modified by others.
VOD
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to
download video for a small fee.
Cable Internet access
____ is the most widely used type of home broadband connection, with over half of the home broadband market.
Privacy
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by
whom
Online portfolio
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you
specify.
VOIP
Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as
a LAN, WAN, or other type of data network) is ____.
blog
Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in
chronological order.
Reference
____ sites allow you to generate map and driving directions and provide access to specific types of useful
information
e-commerce
Online shopping and online investing are examples of ____.
BoF
____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the
way to the building.
RSS
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content
regularly published to a Web site.
Web-based training (WBT)
____ refers to any instruction delivered via the Web
cookies
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the
one associated with the Web page being viewed—to identify return visitors and their preferences.
Internet service providers (ISPs)
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
Application service providers (ASPs)
____ are companies that manage and distribute Web-based software services to customers over the Internet.
message boards
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written
discussions between people on specific subjects
author
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.
ICANN (Internet Corporation for Assigned Names and Numbers)
____ is charged with such responsibilities as IP address allocation and domain name management
Third-party
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page
that you are viewing—typically a Web advertising company
ARPANET
One objective of the ____ project was to create a computer network that would allow researchers located in
different places to communicate with each other.
security
One advantage of a dial-up connection is ____.
Internet Options
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
56 Kbps
Conventional dial-up connects to the Internet at a maximum of ____.
broadband
Direct Internet connections are typically ____ connections
Internet backbone
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as
telephone and cable companies
typosquatting
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly
different from legitimate sites
USA Patriot Act
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers,
such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
computer worm
Like a computer virus, a ____ is a malicious program designed to cause damage.
Data-leakage prevention
software can control which devices can be connected to an employee’s computer
dot cons
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to
as ____
bot
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
cyberstalking
Repeated threats or other harassment carried out online between adults is referred to as ____.
common sense
The best protection against many dot cons is ____.
worm
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
war driving
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others
to use them.
Wi-Fi piggybacking
The term ____ refers to accessing someone else’s unsecured WiFi
network from the hacker’s current location
(such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
public
When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the
digital signature.
IPS
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the
network to detect possible attacks as they are occurring and block them.
virtual private network
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is
most often used to provide remote employees with secure access to a company network
Malware
____ is a generic term that refers to any type of malicious software.
Pharming
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent
activities.
threat definitions
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a
regular basis.
EV
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL
certificate.
virus
The technician tells Fernando that his computer has a ____, which might have gotten into Fernando’s computer
when he downloaded a free computer game from the Internet.
HushMail
Some Webbased
encrypted email
systems—such as the popular free ____ service—require both the sender and
recipient to have accounts through that system
Passwords
____, the most commonly used type of possessed knowledge, are secret words or character combinations
associated with an individual
codes of conduct
To explain acceptable computer use to their employees, students, or other users, many organizations and educational
institutions publish guidelines for behavior, often called ____.
Trojan horse
A ____ is a malicious program that masquerades as something else—usually as some type of application program
Identity theft
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for
a variety of activities—usually to buy products or services in that person’s name
Remote
One emerging type of Trojan horse is called a ____-Access Trojan.
virus
A computer ____ is a software program that is installed without the permission or knowledge of the computer user,
that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has
access to.
Computer sabotage
____ includes any acts of malicious destruction to a computer or computer resource
firewall
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order
to protect against unauthorized access.
Private key encryption
____ uses a single secret key to both encrypt and decrypt the file or message.
Biometric access systems
____ identify users by a particular unique biological characteristic
firewall
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only
allows authorized traffic to pass through
Homeland Security Act of 2002
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers
for revealing private information to law enforcement agencies
Possessed object
____ access systems use physical objects for identification purposes and they are frequently used to control access
to facilities and computer systems
Hacking
____ refers to the act of breaking into a computer or network.
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
HushMail
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
virtual private network
____ are acts of malicious destruction to a computer or computer resource.
Computer sabotage
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
bot
____ is a generic term that refers to any type of malicious software.
Malware
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
virus
Like a computer virus, a ____ is a malicious program designed to cause damage.
computer worm
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
Trojan horse
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
worm
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.
Identity theft
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
Identity theft
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
typosquatting
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
Farming
The best protection against many dot cons is ____.
common sense
Repeated threats or other harassment carried out online between adults is referred to as ____.
cyberstalking
Computer crime is sometimes referred to as ____.
cybercrime
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
Unauthorized access
____ refers to the act of breaking into a computer or network.
Hacking
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
war driving
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
Wi-Fi piggybacking
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Passwords
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
Possessed object
____ identify users by a particular unique biological characteristic.
Biometric access systems
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
firewall
____ uses a single secret key to both encrypt and decrypt the file or message.
Private key encryption
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
Patches
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
backup
To supplement backup procedures, businesses and other organizations should have a(n) ____.
disaster recovery plan
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.
hot site
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
information privacy
____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
Marketing databases
A marketing activity that can be considered a privacy risk is ____.
electronic profiling
Collecting in-depth information about an individual is known as ____.
electronic profiling
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
privacy policy
When spam is sent via IM it is called ____.
spim
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
throw-away e-mail address
One common way to deal with spam that makes it to your computer is to use a(n) ____.
e-mail filter
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
opting out
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.
Computer monitoring software
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
Video surveillance
____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
Video Surveillance
____ refers to companies recording or observing the actions of employees while on the job.
Employee monitoring
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
proximity cards
Our networked society has raised a number of ____ concerns.
privacy
Hardware loss, as well as other security issues, can result from hardware damage (both intentional and accidental) and ____.
system failure
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
system failure
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
security slot
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
Cable locks
One recent development in new technology is ____ that can remove contaminants from water sources.
nonparticles
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
optical
While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.
opto-electronic
One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ conferencing.
telepresence
Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.
electrical
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____.
the number of solid objects between the access point and PC (walls, doors);
interference from devices using radio frequencies (baby monitors, microwave ovens);
the hardware being used
____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
Artificial intelligence
____ provide help or assistance for a particular application program. Some can detect when the user might be having trouble with the program and automatically offer appropriate advice.
Application assistants
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents.
Semantic
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations-for example, the systems that check products for defects at manufacturing plants.
vision
When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.
expert
____ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled individuals.
BCI
Privacy-rights advocates worry that the ____ could someday be used by the government to track citizens.
VeriChip
____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty.
DARPA
An emerging military robotic application is the ____ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection.
exoskeleton
Telesurgery is typically ____ than normal surgery.
less invasive and more precise
Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.
silicon
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.
external
To record data, holographic storage systems split the light from a blue laser beam into two beams-a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.
reference
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM) which translates the data’s 0s and 1s into a hologram.
spatial
Which of the following is an invention of the industrial age?
Telegraph
Which of the following is an invention of the information age?
Transistor
___ uses computers to test product designs before the physical prototype is built.
Computer aided engineering (CAE)
A ___ system lets manufacturers purchase and receive components just before they are needed on the assembly line
Just-in-time manufacturing
Which of the following is NOT a component of an MRP system?
Financial Analysis
Libraries use the ___ bar code to identify items
CODABAR
A bar code represents data that identifies the ___
manufacturer and item number
A ___ records purchases, process credit or debit cards, and updates inventory
Point-of-sale system (POS system)
Database marketing allows companies to ___
Mine customer databases and create marketing lists
___ is technology that allows users connected to a network to transfer money from one back account to another.
EFT
An ATM initially connects to a ___ through a network.
Host processor
A ___ stores data on a thin microprocessor embedded in the card.
Smart Card
Which of the following was NOT used to gather data for the 2000 census?
Optical Character Recognition System
The IRS allows you to do all of the following at its site except
Have online chats with reps
Which of the following FBI databases contains DNA profiles?
CODIS
The ___ was established to help gun dealers perform background checks
NICS
Which type of criminal database is often made available to the public?
Sexually violent offenders
Computers in red-light systems perform all of the functions except
Sending an electronic message to the violator
A Lo-jack device is a wireless
Radio frequency transciever
Foreign students with visas to attend US schools must provide personal info to the ___ system
SEVIS
A ___ system helps track and manage events during a crisis
Web-based collaboration system
The US VISIT database currently stores all of the following types of biometric identifiers except
DNA information
All of the following military tech uses GPS except
Computer simulations
Computer based patient records are entered, stored, and maintained with the help of an ___ system.
Electronic medical record (EMR)
A ___ is a test that records the electrical activity of the heart
Electrocardiogram (EKG)
MRI take images inside the body by
Using a powerful magnet & transmitting radio waves through the body
DXplain is an example of a ___ system
decision support
Which medical website provides a database of reference and abstracts from the National Library of Medicine
MEDLINEplus
Which medical website would be most helpful in providing travelers health information on specific destinations
Centers for Disease Control and Prevention
What does a GlucoWatch G2 biographer monitor?
Blood Sugar Level
Which of the following is NOT used in computer surgery?
Haptic feedback
___ is the use of advanced computer tech to help health care professionals consult with each other and work together on cases regardless of where the patients, medical professional and relevant clinical data are located.
Telemedicine
Which of the following technologies does NOT use satellite links to transmit data?
Radioscondes
Humans have approximately 30,000 ___ that identifies their physical makeup
Genes
What is the purpose of the six/four software program?
It gives user in countries that monitor Internet access permission to connect to the Internet through a secure network
US courts are not yet settled in regards to the fair use of copyright material for ___
format-shifting
Which of the following is not a tenet of the digital millennium copyright act?
Limiting liability of nonprofit information of faculty and graduate students
Which of the following protections does the Copyright Term Extension Act provide?
Extends fair use to include ISPs
What is the primary objection of the courts towards legislation that limits the distribution of objectionable content?
The government has no right to limit free
Which of the following statements is true of cyber stalking?
Cyber stalkers typically locate their victims in chat rooms, bulletin boards or newspaper
Which of the following ethical viewpoints state they, if any action is not right for everyone to take, then it is not right for anyone to take?
Universal Law
How do news firms counter the ethical concerns over the mixing of advertising links with news stories in a user’s search results?
The results pages clearly distinguish the sponsored listings from the other search results
_____ magazine altered an image of OJ Simpson in 1994 to
Time
Who receives the largest percentages of the profiles … from downloading music files?
Record Label
What service does the web site www.TurnItIn.com provide?
Appraisal of the originality of a student’s report
Computer process data as ___ that represent on and off states.
Bits
A(n)___creates sound from digital instructions input by the user, either via a standard computer keyboard or devices resembling.
synthesizer
Which of the following is NOT a MIDI component?
Sequencer
In recent years, __ file sharing networks exploded in popularity as a means for people to share music, video, and other files stores on their personal computers.
P2P
File ___ involves uploading a music file to a file-sharing network with distortion, silence, or copyright law warnings
Spoofing
Dancers rely on a technology called ____to record and analyze their dance movement?
Motion Capture
Which of the following theatre departments does not use CAD software?
Box Office
Sculptor use ___ to digitally recreate an existing physical object.
3D Scanning
After you have created a model for you sculpture. You can use _____ to shape your desired medium.
CNC milling machines
Computer – generated fractals use ____ to create art.
Mathematical formulas
A home or business photographer must likely use the _____ type of digital camera?
Point-and-Shoot
Smart cars maintain a safe driving interval between your car and other vehicles through a(n) ___system.
Adaptive cruise control
Which of the following is NOT true of today’s smart ties?
Adjust tire pressure dynamically, depending on where you are driving
OnStar is an example of a (n) ___ system?
Cell center telematics
An electronic toll-collection system uses a ___ to store basic account information.
Transponder
A light curtain and treadles are used in an electronic toll collection system to ensure that ____.
All cars are counted and billed correctly.
Modern airplanes rely on ____ technology to control landing gear, spoilers and other airplane components?
Fly-by-Wire
Which of the following is still performed by human drivers on a civic bus?
Braking
The____ oversees all air traffic control in the United States.
ATSCC
The U.S. airspace is divided into ____centers.
21
Sabre was the first ___ system to be widely distributed.
GDS
CAPPS II is a passenger screening system that stores your ticket information in a ___.
Passenger name Record
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
Backup
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used.
Information Privacy
Collecting in-depth information about an individual is known as_____.
Electronic Profiling
Many web site have a(an)____that discloses how the personal information you provide while visiting that web site or while completing a product registration will be used.
Privacy Policy
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____.
Throw-away e-mail address
By______, you instruct companies you do business with that they cannot share your personal data with third parties.
Opting Out
___ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work – related or crime – prevention purpose.
Video Surveillence
____ refers to companies recording of observing the action of employees while on the job.
Employee monitoring
____ programs can be used to determine if your activities are being monitored by a hacker or other unauthorized individual.
Anti-spyware Software
The ____ Act of 2003 implemented regulations for unsolicited e-mail mess and laid the groundwork for a federal Do Not Email Registry.
CAN-SPAN
____ displays are transparent and can emit light toward the top and bottom of the display surface; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen.
TOLED
With holographic storage systems, the signal bean passes through a device called a _____ light modulator (SLM) which translates the data’s 0s and 1s into a hologram
Spatial
One recent development in new technology is ____ that can remove contaminants from water sources.
Nanoparticles
A(n) _____ computer uses light, such as from laser beams or infrared beams, to perform digital computations
Optical
Power over Ethernet (POE) allow both____ power and data to be sent over standard Ethernet cables
Electrical
Developed in the late 1990s, Wi-Fi is a family of wireless networking standards that use the ____IEEE standard.
802.11
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____________.
All of the Above
_____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
Artificial intelligence
_____ provide help or assistance for a particles application program some can detect when the user might be having trouble with the program and automatically offer appropriate advice
Application assistant
The _____ web is a predicted evolution of the current web in which all web content is stored in formats that are more easily read by software applications and intelligent agents
Semantic
When using a(an) _______system. It’s important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users
Expert
89. Computer crime is something referred to us_________.
Cybercrime
____occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
Unauthorized access
_____ refers to the act of breaking into another computer system.
Hacking
______ the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Passwords
_____are flash memory drivers that are inserted into a computer to grant access to a network, supply Web site user names and passwords and provides other security features.
USB security token
______ identifies users by a particular unique biological characteristic.
Biometric access system
______ uses a single secret key to both encrypt and decrypt the file or message.
Private Key encryption
______ refers to acts of malicious destruction to a computer or computer resource.
Computer sabotage
A computer that is controlled by a hacker or other computer criminal is referred to as a ____
Bot
_____ is a generic term that refers to any type of malicious software
Malware
A_____ is a malicious program that masquerades as something else _usually as some type of application program.
Trojan Horse
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
codes of conduct
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.
the United States