IFSM201 Final Exam Review Chapters 9-16

Created by jaycee29 

Upgrade to
remove ads

unauthorized use

involves using a computer resource for unauthorized activities.

computer or cyber crime

includes any illegal act involving a computer.

identification

systems determine whether or not the person attempting access is actually who he or she claims to be.

password-based systems

one of the biggest disadvantages is that passwords can be forgotten.

war driving

advocates of __ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

tokens

increasingly, USB security keys, also called USB security ___-USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features - are being used.

biometric access

systems identify users by a particular unique bilogical characteristic.

pharming

is a type of scam that uses spoofed domain names to obtain personnel information for use in fraudulent.

cyberstalking

repeated threats or other harrassment carried out online between adults is refferred to as

password

melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ___, which appears as asterisks on the screen as it is being entered.

IPS

one of the first items that melissa installed was a(n) ___, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

intrusion prevention system (IPS)

melissa also decided to use an (n) ___, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occuring and block them.

unauthorized access

occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

encryption

is a way of temporarily converting data into a form, known as a cipher, that cannot easily be understood in order to protect that data from being viewed by unauthorized people.

multimedia

has the advantage of presenting material in multiple learning styles.

web site

after the objectives, intended audience, and basic content to be included in a ___ have been determined, the structure and layout of the site can be designed.

web-based

multimedia refers to web sites containing more than one type of media-typically sound, video, or animation, in addition to text and images.

TIF

the ___ format is commonly used with scanned images.

dial-up

although broadband internet use is becoming the norm, there are still individuals using __ internet connections.

three

users should be able to get to most pages on a web site within __ mouse clicks.

PNG

images are available in many formats, us as TIF, BMP, GIF, JPEG, and ___.

buffered

with a streaming audio file, only small portion of the audio file is initially downloaded and ___, and then the audio file can begin playing while the remainder of the file downloads simultaneously.

.wmv

is a video format developed by microsoft for use with window media player.

site maps

are table of contents pages that contain links to all main pages on the sites.

tags

when a markup language is used, markup ___ are inserted around the web page content to identify where elements are to be displayed and how they should look when displayed.

web site development

once a web site has been carefully designed, it is time to create it. this process is called ___.

adobe dreamweaver

some of the most popular web site authoring programs are microsoft expression web and ___.

JPEG

in the "about us" section of the web site, the doctor wants to include a photo of her office. she should save this image in the ___ format.

compression

once andrea has recorded her music in an audio file, she would need to use a ___ method to reduce the size of the file before making it available through her web site.

audience

one of the first steps in designing a multimedia application or web sit should be determining the primary objectives of the site and the intended ___.

link

for long web pages, you can include a(n) ___ at the top of the page that allows users to jump to a particular section of the document.

HTML5

The newest version of HTML under development is ___ and is designed to replace the current versions of HTML and XHTML.

credit card

although some people are hesitant to send their ___ over the internet, it is by far the most common payment method used for online purchases.

e-commerce

web sites can be designed and developed in-house; instead, businesses have to outsource these tasks to a professional web development company.

storefront software

is available in both installed and web-based versions.

m-commerce

performed via a mobile phone or other mobile device is referred to as ___.

promotion

of a site refers to advertising its existence, purpose, and URL.

e-commerce system

the collection of hardware, software, people, policies, and strategies used to perform and support e-commerce is referred to as a(n) ___.

online stores

because of the low overhead costs associated with ___, new e-commerce businesses can enter the marketplace relatively inexpensively.

B2G

business sell products and services to local, state, federal goverment buyers.

video-on-demand

some ___ (VOD) services (like Netflix) offer monthly subscriptions for ulimited movie rental downloads.

paypal

___ (owned by ebay) is an online payment service that allows individuals to transfer money easily from their online payment account to someone else's.

site-specific digital wallets

___ store checkout information in the customer's account for use with purchases on that site only.

privacy

to reassure customers, all e-commerce sites should develop and display a ___ policy stating how collected customer information will be used.

meta tags

___ are special HTML or XHTML codes that provide information about a Web page and that are inserted into a webpage's code at the time the page is created.

SSO

the goal of ___ is for our web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a web search using keywords related to your site or business.

coupon codes

digital coupon consist of codes-typically called ___ that are entered into the appropiate location on a checkout page to deduct the coupon amount from a purchase total.

merchant account

each time an online credit card transaction is made, the bank obtains the money from the issuing credit card company and tranfers it to the ___.

secure web server

secure web sites use ___ to safely transfer sensitive data over the internet.

MISs

are typically interactive and provide information on demand whenever a decision needs to be made.

ERP

large integrated system that ties together all of a business's activities.

expert systems

some ___ are designed to take the place of human experts, while others are designed to assist them.

data warehouse

A(n) ___ typically stores data for an entire enterprise.

geographic information system

A(n) ___ (GIS) is an information system that combines geographic information (such as maps and topology and terrain data) with other types of data in order to provide a better understanding of the relationships among the data.

system development

can take place in-house or it can be outsourced to external companies.

IT jobs

according to the bureau of labor statistics, two of the top five projected fastest growing careers in the united states through 2016 are __.

application programmers

A(n) ___ codes system software, fine-tunes operating system performance, and performs other systems software-related tasks.

information system

A(n) ___ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.

business intelligence

is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.

middle

managers are usually classified into three categories: executive, ___, and operational.

collaborative (workgroup) computing

the various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ___, and telecommuting.

warehouse

an inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ___ management system (WMS).

neural networks

artificial intelligence systems that attempt to imitate the way a human brain works are called ___.

preliminary investigation

when a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ___.

inter enterprise

systems that link and are used by multiple enterprises-such as a business and its suppliers and other business paartners- are often called ___ systems.

decision tree

when the data in a decision table is expressed in a tree format, it is called a (n)___.

class diagrams

describe the types of objects in a system and list the class name, as well as the attributes and methods used with that class.

language

if an application is going to need to interact with existing programs, it will likely be coded in the same ___ as those other programs.

declarative

the property that makes 4GLs easier to use is that they are ___, rather than th procedural third-generation languages.

procedural

in a(n) ___program, variables can be accessed and their value changed from any module in the program, as appropriate.

program coding

is the process of writing the actual program steps in the proper format for a particular programming language.

run time

errors are notice after all syntax errors are corrected an the program can be executed.

4GLs

although there is no precise definition of ___, they are even further from machine language than fourth-generation languages, and, therefore, are much easier to use.

declarative

much of the coding in a ___ programming language consists of mouse clicks to select instructions and issue commands to the program.

procedural

programming focuses on the step-by-step instructions that tell the computer what to do to solve a problem.

variables

in a computer program, ___ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.

control structure

a ___ is used to illustrate when, how, and in what order the statements in a computer program, module, or method are performed.

do until structure

with the ___, the instructions in the loop are repeated as long as a certain condition is false.

infinite loop

a(n) ___ occurs when a do while condition never becomes false or a do until condition never becomes true.

complier

a(n) ___ is designed for a specific programming language and translates programs written in that language in to machine language so it can be executed.

logic error

programmers often use temporary dummy print statements - print statement that are temporarily inserted into the code- to help locate a ___.

beta tests

programs created for mass distribution often have two stages of testing: an internal onsite test and one or more rounds of outside tests (called ___).

application lifecycle management

(ALM) is a broad term to describe creating and managing an application throughout its entire lifecycle-from design through testing.

C++

Java is currently on the most popular programming languages and has replaced ___ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.

unified modeling language

(UML) is a set of standard notations that is widely used for modeling object-oriented programs.

test

at the end of the preliminary debugging process, the original programmer-or, preferably, someone else-runs the program with extensive ___ data to try to find any additional errors remaining in the program.

COBOL

common business oriented language is a structured programming language designed for business transaction processing.

data integrity

in some systems, ___ is enforced on a per transaction basis.

data organization

arranging data for efficient retrieval is called___.

collision

hashing procedures usually result in two or more records being assigned the same storage address, an event known as a ___.

IBM's DB2 9

program contains a hybrid XML/relational database server.

n-tier

one advantage of the ___ architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.

centralized DBMS

in determining the location where specific data is to be stored in a(n) ___, factors such as communications cost, response time, storage cost, and security are key considerations.

OODBMS

objects stored in an ___ can be retrieved using queries, such as with a(n) object query language (OQL)-an object-oriented version of SQL,

column

a field is also called ___.

field

a ___ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

row

a record is also called a ___.

input mask

one of the properties that can be assigned to a field is a(n) ___ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

data privacy

___ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

direct organization

with ___, the computer uses each record's primary key field and a mathematical formula called hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

prime number

one of the simplest hashing algorithms involves dividing the primary key field by a particular ___.

front end

in a typical client-server database application, the client is called the ___.

migration

if a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system-a process called ___.

middleware

web-based database requests are received by the web server, which then converts the request into a database query and passes it on to the database server with the help of software called ___.

tables

a database typically consists of interrelated ___ consisting of fields and records.

primary key

a(n) ___ is a specific field in a database table that uniquely identifies the records in that table.

system failure

___ can occur because of a hardware problem, software problem, or a computer virus.

online records

in response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available ___.

opting-out

at the present time, ___ procedures are confusing and time consuming, and they do not always work well.

hackers

a growing illegal use of computer monitoring software is the use of a keystroke logging system by ___.

hardware theft

one the most obvious types of hardware is ___.

unsubscribe

to comply with truth-in-advertising laws, a(n) ___ e-mail address included in a unsolicited e-mail must be working address.

research databases

___ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

facebook

___ met with significant objection to its Beacon advertising service. Beacon introduced in late 2007, was designed to track members' web purchases and other web activities on more than 40 partner sites and share those purchases and activities with the user's friends.

electronic profiling

collecting in-depth information about an individual is known ___.

opting out

by ___, you instruct companies you do business with that they cannot share your personal data with third parties.

antispyware software

___ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

educating

by ___ businesses and consumers about the legal use of software and the possible negative consequences associate with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.

face recognition

law enforcement agencies contend that ___ systems and public video surveillance are no different than the many private video surveillance systems in place today.

surge suppressors

a device that protects a computer system from damage due to electrical failure.

privacy

our networked society has raised a number of ___ concerns.

video surveillance

___ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime prevention purposes.

backup

___ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.

MPAA

the ___ recently began pursuing civil litigation against movie pirates.

whistle blowers

employees who reveal wrong doing within an organization to the public or to authorities are referred to as ___.

scandals

the ___, such as the ones surronding executives at enron, tyco international, and worldcom, involved lies, fraud, deception, and other illegal and unethical behavior.

bootleg

in some countries, ___ copies of music, cds, and movie dvds are sold openly.

braille printers

___ print embossed output in braille format on paper.

typohunting

___ is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidently arrive at the site when trying to type the URL of the legitimate site.

digital copy

is new option for taking your legally purchased movies with you on your computer or portable digital media player.

document holders

people who refer to written documents while working on their PCs should use ___ to keep their documents close to their monitors.

copyright

a(n) is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.

WIPO

___ is a specialized agency of the united nations and attempts to resolve international commerical disputes about intellectual property between private parties.

patent

a ___ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.

IP address

to catch people who are sharing movies illegally on the internet, the MPAA uses special software that monitors file sharing networks to find copyrighted movies and the identifies the responsible individual by using ___ of the computer being used to share the movie.

e-mail hoaxes

in additon to being annoying and a waste of time, ___ bog(s) down e-mail systems and clog user's inboxes.

CTS

a conditiion known as carpal tunnel syndrome has been linked to the repetitive finger movements made when using a keyboard.

stiff neck

to prevent sore or ___, place the monitor directly in front of you.

screen reader software

___ is an example of assistive output devices.

eyestrain

to combat his ___, Jack's doctor advised him to use a lower screen resolution

trademark

in order to prevent other from stealing her logo, jill should get a ___.

digital

to help identify and prosecute a "cammer" most movie studios now embed invisible ___ in each print released to a theater.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set