Deck 9: The Challenges of the Digital Age: Society and Information Technology Today

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is NOT among the errors and accidents that may afflict computer systems?

A) human errors
B) electromechanical problems
C) procedural problems
D) computer crimes
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following terms describes old,obsolete electronic gadgetry?

A) dirty data
B) e-dump
C) e-waste
D) zombies
سؤال
The six categories of errors,accidents,and hazards that may affect computer systems are human errors,procedural errors,natural hazards,software errors,theft of hardware,and electromechanical problems.
سؤال
In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records.This crime is called ________.

A) theft of time and services
B) dirty-data entry
C) theft of software
D) theft of information
سؤال
In the area of threats to computer systems,electromechanical problems are examples of ________.

A) errors and accidents
B) crimes against computers
C) dirty data
D) theft of time and services
سؤال
Humans often are not good at assessing their own information needs.
سؤال
Which of these is NOT an example of a computer crime?

A) theft of time and services
B) entering incorrect data
C) pirating software
D) online service fraud
سؤال
Perception may be affected by information overload and cause people to make errors.
سؤال
Sending emails that appear to come from a trusted source,which direct you to a website where you're asked to reveal personal information is called _________.

A) theft of time and services
B) Evil Twin attack
C) phishing
D) pharming
سؤال
_______ is a system of safeguards for protecting information technology against disasters,system failures,and unauthorized access.

A) WAP
B) File sharing
C) Security
D) DDoS
سؤال
A computer crime is defined as ________.

A) an illegal act perpetuated against computers or telecommunications
B) the use of computers or telecommunications to accomplish an illegal act
C) both an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act
D) neither an illegal act perpetuated against computers or telecommunications nor the use of computers or telecommunications to accomplish an illegal act
سؤال
A variant on conventional phishing,in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals the data that you enter into a website,is known as ________.

A) Evil Twin attack
B) pharming
C) pirating
D) botnetting
سؤال
A blocking program for protecting children from online objectionable adult material is ________.

A) Cybersitter
B) Cyber Patrol
C) Net Nanny
D) all of these
سؤال
Which of the following is NOT a function of the U.S.Computer Emergency Response Team (CERT)?

A) Counseling the party under attack.
B) Helping to thwart the intruder.
C) Evaluating the system afterward against future break-ins.
D) Prosecuting those caught.
سؤال
Which of the following is NOT a method in which a security system tries to authenticate a user's identity?

A) What you have-cards,keys,signatures,badges
B) What you need-the kind of information you are asking for
C) Who you are-physical traits,or biometrics
D) What you know-PINs,passwords,and digital signatures
سؤال
The Nigerian letter scam is an example of ________.

A) errors and accidents
B) theft of time and services
C) worms and viruses
D) Internet-related fraud
سؤال
Incomplete,outdated,or otherwise inaccurate data is known as ________ data.

A) bad
B) dirty
C) threatening
D) hazardous
سؤال
A power failure that disrupts a computer system is an example of a(n)________.

A) electromechanical problem
B) human error
C) procedural error
D) software error
سؤال
Which of the following is NOT a tool for fighting unauthorized online use?

A) electronic surveillance
B) Internet filtering software
C) disaster-recovery plan
D) rule-based detection software
سؤال
Dirty data is ________.

A) virus-infected data
B) worm-infected data
C) inaccurate,incomplete data
D) stolen data
سؤال
Internet users purchasing products on the Internet should enter private information only on sites that show a padlock icon at the top or bottom of the page,which indicates that encryption technology is being used.
سؤال
Predictive-statistical-model software allows companies to rate orders via credit cards or calls via calling cards according to a scale of risk; the software is used to prevent fraud.
سؤال
In 1999 the $125 million Mars Climate Orbiter was fed data expressed in pounds,the English unit of force,instead of newtons,the metric unit (about 22% of a pound).As a result,the spacecraft flew too close to the surface of Mars and broke apart.This is an example of a human software error.
سؤال
Biochemistry is the science of measuring individual body characteristics.
سؤال
A software bug is an error in a program that causes it not to work properly.
سؤال
Software obtained illegally is called open-source software.
سؤال
A disaster-recovery plan is a method of restoring information-processing operations that have been halted by destruction or accident.
سؤال
Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee Internet management (EIM)software.
سؤال
In the United States,the Foreign Intelligence Surveillance Act court makes decisions about government surveillance,including the National Security Agency's (NSA)right to search the phone records of residents.
سؤال
You can always claim ownership of the data that is collected about you.
سؤال
In an Evil Twin attack,a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the computer controlling that network.
سؤال
In the Nigerian letter scam,also called an advance-fee fraud,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
سؤال
Many networks have audit controls for tracking which programs and servers were used,which files were opened.
سؤال
A computer crime can be an illegal act perpetrated against computers / telecommunications,or it can be the use of computers / telecommunications to accomplish an illegal act.
سؤال
There is no explicit right to privacy in the U.S.Constitution.
سؤال
An unmanned aerial vehicle (UAV)is also called an audit trailer.
سؤال
It is illegal for employers to use computer-based systems to monitor their employees' activities.
سؤال
An audit trail is a record of how a transaction was handled from input through processing and output.
سؤال
There are three main ways to authenticate you as a legitimate computer user and grant you Internet access: what you have,what you know,what your physical attributes are.
سؤال
When people at work play online games or do online shopping on their employer's time,this is called theft of information.
سؤال
In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.
سؤال
A software bug is a(n)________ in a program that causes it to malfunction.
سؤال
The Internet is increasingly coming under commercial control.
سؤال
Currently,technology does not produce widely shared economic gains but instead widens the gap between those who have the right skills and those who don't.
سؤال
Intentionally crashing an entire computer system is a crime of _________.
سؤال
Algorithms have been devised to detect changes in uncompressed photo files.
سؤال
Medical school researchers have showed that areas of the brain responsible for generating feelings of addiction and reward are activated during video game play.
سؤال
In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
سؤال
Errors and accidents in computer systems may be classified as human errors,procedural errors,software errors,"dirty data" problems,________ problems,and natural hazards.
سؤال
Nondelivery of merchandise ordered online,Internet auction misrepresentations,and unauthorized credit / debit card use for online purchases all represent ________.
سؤال
The contribution of technological advances to social progress is steady and positive.
سؤال
A computer _______ can be an illegal act perpetrated against computers or telecommunications systems or the use of computers or telecommunications systems to commit illegal acts.
سؤال
"Dirty data" problems are usually caused by ________ workers.
سؤال
Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.
سؤال
When malicious software is implanted in your computer that redirects your computer to an impostor web page,it is called ________.
سؤال
An error in a software program that causes it to not work properly is known as a ________.
سؤال
Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.
سؤال
Improvements in technology are beneficial to all in the short run.
سؤال
A system of safeguards for protecting informational technology against disasters,systems failure,and unauthorized access that can result in damage or loss is known as ________.
سؤال
Information technology is basically a clean industry creating few toxic byproducts.
سؤال
The process of altering readable data into unreadable form to prevent unauthorized access is known as ________.
سؤال
_________ is the use of a smartphone or other mobile device to send sexually explicit photos or videos,or sexually charged messages.
سؤال
A(n)________ is a record of how a transaction was handled from input through processing and output.
سؤال
Using a system called _________,employers send information supplied by job applicants to be matched against databases in the U.S.Social Security Administration or the Department of Homeland Security.
سؤال
PIN is short for ________.
سؤال
Rule-based-detection software,predictive-statistical-model software,employee Internet management (EIM)software,Internet filtering software,and electronic surveillance are all examples of tools for fighting Internet ________.
سؤال
_________ is the visual pollution represented by endless wireless towers,roof antennas,satellite dishes,cellphone towers,and so on that we see every day.
سؤال
The text lists fourteen suggestions for keeping your electronic hardware almost theft-proof; describe six of them.
سؤال
__________ is warfare involving computers and the Internet in which one nation attacks another's information systems.
سؤال
________ software,a tool for fighting online fraud,examines tons of data from previous transactions to create mathematical descriptions of what a typical fraudulent transaction is like.
سؤال
Children in the 9-18 age range who use information technologies and the Internet to unleash taunting,nasty rumors,and other put-downs of fellow adolescents are known as ________.
سؤال
Humans often make errors.In computer systems,as in life,they can be of several types.The text describes three types of common human error.Explain them
سؤال
________ software,a tool for fighting online fraud,allows merchants to creates a "negative file" that states the criteria each online transaction must meet; these criteria include not only not being on a list of stolen credit card numbers but also price limits,matches of the cardholders' billing address and shipping address,and warning if a large quantity of a single item is ordered.
سؤال
The U.S.Defense Department created ________,which provides round-the-clock international information and security-related support services to users of the Internet.
سؤال
A well-known software program used to alter (morph)photographs,for good or for ill,is ________.
سؤال
Many networks have ________ controls for tracking which programs and servers were used and which files were opened.
سؤال
The process by which one picture is slowly altered or transformed into another image is called ________.
سؤال
A _________ plan is a method of restoring information processing operations that have been halted by destruction or accident.
سؤال
A ________ is a special word required to access a computer system.
سؤال
Increasingly intelligent machinery and automation have caused a _________ in several types of jobs.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: The Challenges of the Digital Age: Society and Information Technology Today
1
Which of the following is NOT among the errors and accidents that may afflict computer systems?

A) human errors
B) electromechanical problems
C) procedural problems
D) computer crimes
D
2
Which of the following terms describes old,obsolete electronic gadgetry?

A) dirty data
B) e-dump
C) e-waste
D) zombies
C
3
The six categories of errors,accidents,and hazards that may affect computer systems are human errors,procedural errors,natural hazards,software errors,theft of hardware,and electromechanical problems.
False
4
In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records.This crime is called ________.

A) theft of time and services
B) dirty-data entry
C) theft of software
D) theft of information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
5
In the area of threats to computer systems,electromechanical problems are examples of ________.

A) errors and accidents
B) crimes against computers
C) dirty data
D) theft of time and services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
6
Humans often are not good at assessing their own information needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of these is NOT an example of a computer crime?

A) theft of time and services
B) entering incorrect data
C) pirating software
D) online service fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
8
Perception may be affected by information overload and cause people to make errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
9
Sending emails that appear to come from a trusted source,which direct you to a website where you're asked to reveal personal information is called _________.

A) theft of time and services
B) Evil Twin attack
C) phishing
D) pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
10
_______ is a system of safeguards for protecting information technology against disasters,system failures,and unauthorized access.

A) WAP
B) File sharing
C) Security
D) DDoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
11
A computer crime is defined as ________.

A) an illegal act perpetuated against computers or telecommunications
B) the use of computers or telecommunications to accomplish an illegal act
C) both an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act
D) neither an illegal act perpetuated against computers or telecommunications nor the use of computers or telecommunications to accomplish an illegal act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
12
A variant on conventional phishing,in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals the data that you enter into a website,is known as ________.

A) Evil Twin attack
B) pharming
C) pirating
D) botnetting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
13
A blocking program for protecting children from online objectionable adult material is ________.

A) Cybersitter
B) Cyber Patrol
C) Net Nanny
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is NOT a function of the U.S.Computer Emergency Response Team (CERT)?

A) Counseling the party under attack.
B) Helping to thwart the intruder.
C) Evaluating the system afterward against future break-ins.
D) Prosecuting those caught.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT a method in which a security system tries to authenticate a user's identity?

A) What you have-cards,keys,signatures,badges
B) What you need-the kind of information you are asking for
C) Who you are-physical traits,or biometrics
D) What you know-PINs,passwords,and digital signatures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
16
The Nigerian letter scam is an example of ________.

A) errors and accidents
B) theft of time and services
C) worms and viruses
D) Internet-related fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
17
Incomplete,outdated,or otherwise inaccurate data is known as ________ data.

A) bad
B) dirty
C) threatening
D) hazardous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
18
A power failure that disrupts a computer system is an example of a(n)________.

A) electromechanical problem
B) human error
C) procedural error
D) software error
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is NOT a tool for fighting unauthorized online use?

A) electronic surveillance
B) Internet filtering software
C) disaster-recovery plan
D) rule-based detection software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
20
Dirty data is ________.

A) virus-infected data
B) worm-infected data
C) inaccurate,incomplete data
D) stolen data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
21
Internet users purchasing products on the Internet should enter private information only on sites that show a padlock icon at the top or bottom of the page,which indicates that encryption technology is being used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
22
Predictive-statistical-model software allows companies to rate orders via credit cards or calls via calling cards according to a scale of risk; the software is used to prevent fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
23
In 1999 the $125 million Mars Climate Orbiter was fed data expressed in pounds,the English unit of force,instead of newtons,the metric unit (about 22% of a pound).As a result,the spacecraft flew too close to the surface of Mars and broke apart.This is an example of a human software error.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
24
Biochemistry is the science of measuring individual body characteristics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
25
A software bug is an error in a program that causes it not to work properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
26
Software obtained illegally is called open-source software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
27
A disaster-recovery plan is a method of restoring information-processing operations that have been halted by destruction or accident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
28
Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee Internet management (EIM)software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the United States,the Foreign Intelligence Surveillance Act court makes decisions about government surveillance,including the National Security Agency's (NSA)right to search the phone records of residents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
30
You can always claim ownership of the data that is collected about you.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
31
In an Evil Twin attack,a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the computer controlling that network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
32
In the Nigerian letter scam,also called an advance-fee fraud,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
33
Many networks have audit controls for tracking which programs and servers were used,which files were opened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
34
A computer crime can be an illegal act perpetrated against computers / telecommunications,or it can be the use of computers / telecommunications to accomplish an illegal act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
35
There is no explicit right to privacy in the U.S.Constitution.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
36
An unmanned aerial vehicle (UAV)is also called an audit trailer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
37
It is illegal for employers to use computer-based systems to monitor their employees' activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
38
An audit trail is a record of how a transaction was handled from input through processing and output.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
39
There are three main ways to authenticate you as a legitimate computer user and grant you Internet access: what you have,what you know,what your physical attributes are.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
40
When people at work play online games or do online shopping on their employer's time,this is called theft of information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
41
In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
42
A software bug is a(n)________ in a program that causes it to malfunction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
43
The Internet is increasingly coming under commercial control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
44
Currently,technology does not produce widely shared economic gains but instead widens the gap between those who have the right skills and those who don't.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
45
Intentionally crashing an entire computer system is a crime of _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
46
Algorithms have been devised to detect changes in uncompressed photo files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
47
Medical school researchers have showed that areas of the brain responsible for generating feelings of addiction and reward are activated during video game play.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
48
In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
49
Errors and accidents in computer systems may be classified as human errors,procedural errors,software errors,"dirty data" problems,________ problems,and natural hazards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
50
Nondelivery of merchandise ordered online,Internet auction misrepresentations,and unauthorized credit / debit card use for online purchases all represent ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
51
The contribution of technological advances to social progress is steady and positive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
52
A computer _______ can be an illegal act perpetrated against computers or telecommunications systems or the use of computers or telecommunications systems to commit illegal acts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
53
"Dirty data" problems are usually caused by ________ workers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
54
Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
55
When malicious software is implanted in your computer that redirects your computer to an impostor web page,it is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
56
An error in a software program that causes it to not work properly is known as a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
57
Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
58
Improvements in technology are beneficial to all in the short run.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
59
A system of safeguards for protecting informational technology against disasters,systems failure,and unauthorized access that can result in damage or loss is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
60
Information technology is basically a clean industry creating few toxic byproducts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
61
The process of altering readable data into unreadable form to prevent unauthorized access is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
62
_________ is the use of a smartphone or other mobile device to send sexually explicit photos or videos,or sexually charged messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
63
A(n)________ is a record of how a transaction was handled from input through processing and output.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
64
Using a system called _________,employers send information supplied by job applicants to be matched against databases in the U.S.Social Security Administration or the Department of Homeland Security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
65
PIN is short for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
66
Rule-based-detection software,predictive-statistical-model software,employee Internet management (EIM)software,Internet filtering software,and electronic surveillance are all examples of tools for fighting Internet ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
67
_________ is the visual pollution represented by endless wireless towers,roof antennas,satellite dishes,cellphone towers,and so on that we see every day.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
68
The text lists fourteen suggestions for keeping your electronic hardware almost theft-proof; describe six of them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
69
__________ is warfare involving computers and the Internet in which one nation attacks another's information systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
70
________ software,a tool for fighting online fraud,examines tons of data from previous transactions to create mathematical descriptions of what a typical fraudulent transaction is like.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
71
Children in the 9-18 age range who use information technologies and the Internet to unleash taunting,nasty rumors,and other put-downs of fellow adolescents are known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
72
Humans often make errors.In computer systems,as in life,they can be of several types.The text describes three types of common human error.Explain them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
73
________ software,a tool for fighting online fraud,allows merchants to creates a "negative file" that states the criteria each online transaction must meet; these criteria include not only not being on a list of stolen credit card numbers but also price limits,matches of the cardholders' billing address and shipping address,and warning if a large quantity of a single item is ordered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
74
The U.S.Defense Department created ________,which provides round-the-clock international information and security-related support services to users of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
75
A well-known software program used to alter (morph)photographs,for good or for ill,is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
76
Many networks have ________ controls for tracking which programs and servers were used and which files were opened.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
77
The process by which one picture is slowly altered or transformed into another image is called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
78
A _________ plan is a method of restoring information processing operations that have been halted by destruction or accident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
79
A ________ is a special word required to access a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
80
Increasingly intelligent machinery and automation have caused a _________ in several types of jobs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 86 في هذه المجموعة.