Despite efforts, the risk of prosecution, and the risk of accidentally downloading spyware, a computer virus, or a corrupted file when downloading a file from another person's PC, illegal file sharing continues.
The Fair and Accurate Credit Transactions Act enacted in Dec 2003 enables all Americans to get one credit report per year for a small fee.
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
Many networks use a network server to manage the data flowing through the network devices and the resources on a network
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Application service providers (ASPs) supply the information that is available through the Internet.
A firewall is a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
Online shopping and online investing are examples of:
A. online merchandising
B. online marketing
__are businesses or other organizations that provide Internet access to others, typically for a fee.
A. application service providers
B. conferencing service providers
C. telephone service providers
D. Internet service providers
The term __ refers to the programs or instructions used to tell the computer hardware what to do.
__is a generic term that refers to any type of malicious software.
__is charged with such responsibilities as IP address allocation and domain name management.
A. National Center for Supercomputing Applications
B. web consortium (W3C)
C. ICANN (internet corporation for assigned names and numbers)
D. Internet society (ISOC)
__lines are high-speed (about 1.5 Mbps) dedicated lines that schools and large businesses often lease from the telephone company or an Internet service provider to provide a fast, direct connection to the Internet for the PCs on their networks.
A personal computer or __ is a small computer system designed to be used by one person at a time.
d. small processor
__is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his internet connection.
c. phishing software
computer crime is sometimes referred to as __
when data is processed into a meaningful form, it becomes
c. a program
d. a database
__is the most widely used type of home broadband connection, with over 60% of the home broadband market.
a. DSL Internet access
b. fixed wireless internet access
c. mobile wireless internet access
d. cable internet access
the most common input devices today are the keyboard and __
today the standard term for placing telephone calls over any type of data network (including the internet, as well as a lan, wan, or other type of data network) is__
a booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as__
c. dot frauds
d. dot cons
the main communications media used as the __ are typically owned by telecommunications companies, such as telephone and cable companies.
a. main internet
b. world net
c. internet backbone
d. super net
__are acts of malicious destruction to a computer or computer resource.
b. blocking attacks
c. computer sabotage
a growing number of college campuses have wireles___ on campus that allow students to use their PCs to connect wirelessly...
c. com spots
d. com points
__refers to the act of breaking into another computer system.
to contact people using the Internet, you most often use their__
a. domain names
b. e-mail addresses