Create an account
Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a user's knowledge and deliberately alter the computer's operations.
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer
Digital forensics is used by ____.
all of the above. used by law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector.
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the
company network server.
virtual private network (VPN)
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts
A(n) ____ suppressor uses special
electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Computer ____ are the moral guidelines that govern the use of computers and information systems.
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Employee ____ involves the use of
computers to observe, record, and review an employee's use of a computer, including communications such as e-mail
messages, keyboarding activity, and Web sites visited.
Many Web sites, like that in the
accompanying figure, require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together