How can we help?

You can also find more resources in our Help Center.

24 terms

MISY 160 Questions

STUDY
PLAY
UPS
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Transport Layer Security (TLS)
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
Privacy
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Distributed
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
Web bug
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
U (Use the heel of the hand as a pivot point while typing or using the mouse)
To prevent repetitive strain injury, take all of the following precautions except ____.
Failure
A system ____ is the prolonged malfunction of a computer.
Cyberterrorist
A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
Cookies
____ is/are not considered spyware because a user knows it/they exist(s).
Noise
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Piracy
Software ____ is the unauthorized and illegal duplication of copyrighted software.
Distributed
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
Spyware
A(n) ____ program secretly collects information about a user.
Malware
Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a user's knowledge and deliberately alter the computer's operations.
Ethical
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ____.
UPS
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Power Source
A UPS connects between a computer and a ____.
Selective Backup
With a(n) ____, users choose which folders and files to include in a backup.
Ergonomics
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Joule
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.
Digital
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
Spike
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
Session Cookie
Web sites use a ____ to keep track of items in a user's shopping cart.
CVS
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.