Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link

ملء الشاشة (f)
exit full mode
سؤال
A network links computer resources using either a wired or wireless connection.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The GUI allows users to enter commands by clicking on icons on the computer screen or by tapping or swiping them on devices with a touch screen.
سؤال
Application software is the software that helps users perform desired tasks.
سؤال
Utility programs are applications software packages, such as word processor and spreadsheet programs, that help users perform a desired task.
سؤال
Businesses develop intranets so valued customers have access to internal information that is not available to the general public.
سؤال
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
سؤال
The World Wide Web is simply another name for the Internet.
سؤال
Utility programs are supplemental operating system software, such as firewalls, spam blockers, and other security software.
سؤال
The fundamental form of system software is the operating system, which controls the way the computer functions at its most basic level.
سؤال
GUI stands for Graphical Unit Interchange.
سؤال
The physical components used to collect, store, organize, and process data and to distribute information are referred to as software.
سؤال
Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet. Only institutions participating in a consortium of dues-paying members have access to Internet2.
سؤال
Beginning 1996, several leading research universities, corporations, and other organizations formed a coalition to create a new generation of Internet technology based on fibre-optic cable.
سؤال
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks, operating under a common set of rules so each can communicate with the others.
سؤال
The World Wide Web is the part of the Internet that consists of documents written in HTML. This is the part of the Internet that receives the most attention from the general public.
سؤال
Horizontal market software consists of highly specialized applications used in a particular industry such as medicine, law, or accounting.
سؤال
Igor loves to download music and video over the Internet. But he is finding that even with his high-speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Igor.
سؤال
Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.
سؤال
Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.
سؤال
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a Web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
سؤال
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.
سؤال
Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.
سؤال
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
سؤال
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
سؤال
Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.
سؤال
A query is a request for the database management software to search for data that matches specific criteria.
سؤال
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
سؤال
One of the main advantages of expert systems is that they are easy and inexpensive to develop.
سؤال
Cloud computing is another term used for surfing the Internet.
سؤال
Data mining is most effective at locating relationships among data stored on small, highly specialized databases, such as the database for a single department or division within a company.
سؤال
Maisie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Maisie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Maisie could enter a query into the database.
سؤال
TurboTax™ is a software program that takes the customer through a series of tax-related questions. Based on the customer's responses, the system will select the next question. In the end, it provides all the information the customer needs to file a return to Canada Revenue Agency, including the amount of taxes owed or the amount of a refund to expect. TurboTaxTM is an example of an expert system.
سؤال
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
سؤال
The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.
سؤال
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
سؤال
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.
سؤال
A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.
سؤال
A data warehouse is a large, organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.
سؤال
Businesses develop decision support systems (DSS) to give managers access to large quantities of data and the processing power to convert the data into high-quality information.
سؤال
Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.
سؤال
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
سؤال
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
سؤال
Spyware is a type of malware.
سؤال
Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.
سؤال
Radio frequency identification (RFID) is the use of microchips to transmit information about a device, product, or person to a RFID reader that is within range.
سؤال
Pharming is a scam that seeks to steal identities by routing Internet traffic to fake websites.
سؤال
Once you install antivirus software on your computer, you are secured against viruses for life.
سؤال
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
سؤال
E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.
سؤال
eMarketplaces provide a platform for businesses in specific B2B markets to interact.
سؤال
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
سؤال
Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail. Many banks offer this service.
سؤال
Intellectual property is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software.
سؤال
To protect your computer from spyware and viruses remove the hard drive before accessing the Internet.
سؤال
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
سؤال
Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller's products.
سؤال
B2C e-commerce refers to online business trades between companies.
سؤال
Margot Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain. Margot wants to find a technology that will uniquely identify items to simplify the tracking process. She is likely to be interested in considering RFID chips to solve this problem.
سؤال
Software that is created and distributed with malicious intent is called malware.
سؤال
A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.
سؤال
Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.
سؤال
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
سؤال
So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.
سؤال
Spam is unsolicited e-mail usually sent to very large numbers of recipients, many of whom may not have interest in the message.
سؤال
Viruses can erase or modify data on your hard drive, prevent computer start-up, or find and send personal information stored on your hard drive to unauthorized people. Viruses are often hidden in e-mails, instant messages, or files downloaded from the Internet.
سؤال
What are hard drives, keyboards, monitors, and printers examples of?

A) hardware
B) RFID technology
C) software
D) operating systems
سؤال
Intellectual property refers to products that result from creative and intellectual effort, such as books, musical works, inventions, and computer software.
سؤال
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
سؤال
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
سؤال
Piracy of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from-or providing compensation to-the owner of the copyrighted material.
سؤال
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
سؤال
Which of the following refers to the physical components used to collect, store, organize, and process data and to distribute information?

A) hardware
B) intranet
C) extranet
D) software
سؤال
Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.
سؤال
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.
سؤال
Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
سؤال
The basic difference between computer viruses on the one hand and spyware on the other is that a virus has the ability to spread automatically to other computers.
سؤال
Unfortunately, there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses, hackers, and spyware.
سؤال
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
سؤال
Intellectual property that is protected by copyright law includes corporate logos.
سؤال
Phishing is a scam where official-looking e-mails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/163
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link
1
A network links computer resources using either a wired or wireless connection.
True
2
The GUI allows users to enter commands by clicking on icons on the computer screen or by tapping or swiping them on devices with a touch screen.
True
3
Application software is the software that helps users perform desired tasks.
True
4
Utility programs are applications software packages, such as word processor and spreadsheet programs, that help users perform a desired task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
5
Businesses develop intranets so valued customers have access to internal information that is not available to the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
6
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
7
The World Wide Web is simply another name for the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
8
Utility programs are supplemental operating system software, such as firewalls, spam blockers, and other security software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
9
The fundamental form of system software is the operating system, which controls the way the computer functions at its most basic level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
10
GUI stands for Graphical Unit Interchange.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
11
The physical components used to collect, store, organize, and process data and to distribute information are referred to as software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
12
Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet. Only institutions participating in a consortium of dues-paying members have access to Internet2.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
13
Beginning 1996, several leading research universities, corporations, and other organizations formed a coalition to create a new generation of Internet technology based on fibre-optic cable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
14
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks, operating under a common set of rules so each can communicate with the others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
15
The World Wide Web is the part of the Internet that consists of documents written in HTML. This is the part of the Internet that receives the most attention from the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
16
Horizontal market software consists of highly specialized applications used in a particular industry such as medicine, law, or accounting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
17
Igor loves to download music and video over the Internet. But he is finding that even with his high-speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Igor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
18
Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
19
Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
20
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a Web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
21
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
22
Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
23
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
24
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
25
Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
26
A query is a request for the database management software to search for data that matches specific criteria.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
27
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
28
One of the main advantages of expert systems is that they are easy and inexpensive to develop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
29
Cloud computing is another term used for surfing the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
30
Data mining is most effective at locating relationships among data stored on small, highly specialized databases, such as the database for a single department or division within a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
31
Maisie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Maisie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Maisie could enter a query into the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
32
TurboTax™ is a software program that takes the customer through a series of tax-related questions. Based on the customer's responses, the system will select the next question. In the end, it provides all the information the customer needs to file a return to Canada Revenue Agency, including the amount of taxes owed or the amount of a refund to expect. TurboTaxTM is an example of an expert system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
33
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
34
The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
35
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
36
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
37
A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
38
A data warehouse is a large, organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
39
Businesses develop decision support systems (DSS) to give managers access to large quantities of data and the processing power to convert the data into high-quality information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
40
Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
41
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
42
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
43
Spyware is a type of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
44
Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
45
Radio frequency identification (RFID) is the use of microchips to transmit information about a device, product, or person to a RFID reader that is within range.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
46
Pharming is a scam that seeks to steal identities by routing Internet traffic to fake websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
47
Once you install antivirus software on your computer, you are secured against viruses for life.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
48
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
49
E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
50
eMarketplaces provide a platform for businesses in specific B2B markets to interact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
51
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
52
Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail. Many banks offer this service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
53
Intellectual property is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
54
To protect your computer from spyware and viruses remove the hard drive before accessing the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
55
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
56
Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller's products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
57
B2C e-commerce refers to online business trades between companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
58
Margot Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain. Margot wants to find a technology that will uniquely identify items to simplify the tracking process. She is likely to be interested in considering RFID chips to solve this problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
59
Software that is created and distributed with malicious intent is called malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
60
A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
61
Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
62
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
63
So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
64
Spam is unsolicited e-mail usually sent to very large numbers of recipients, many of whom may not have interest in the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
65
Viruses can erase or modify data on your hard drive, prevent computer start-up, or find and send personal information stored on your hard drive to unauthorized people. Viruses are often hidden in e-mails, instant messages, or files downloaded from the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
66
What are hard drives, keyboards, monitors, and printers examples of?

A) hardware
B) RFID technology
C) software
D) operating systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
67
Intellectual property refers to products that result from creative and intellectual effort, such as books, musical works, inventions, and computer software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
68
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
69
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
70
Piracy of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from-or providing compensation to-the owner of the copyrighted material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
71
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following refers to the physical components used to collect, store, organize, and process data and to distribute information?

A) hardware
B) intranet
C) extranet
D) software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
73
Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
74
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
75
Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
76
The basic difference between computer viruses on the one hand and spyware on the other is that a virus has the ability to spread automatically to other computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
77
Unfortunately, there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses, hackers, and spyware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
78
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
79
Intellectual property that is protected by copyright law includes corporate logos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
80
Phishing is a scam where official-looking e-mails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 163 في هذه المجموعة.