NAME

Question types


Start with


Question limit

of 74 available terms

Advertisement
Print test

5 Written questions

5 Matching questions

  1. Virus
  2. Cyberterrorism
  3. Encryption
  4. Intellectual property
  5. Data Analysis
  1. a program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload
  2. b a form of terrorism that uses attacks over the Internet to intimidate and harm a population
  3. c security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient
  4. d product of the mind or intellect over which the owner holds legal entitlement
  5. e process that involves evaluating data to identify problems with the content of a database

5 Multiple choice questions

  1. sharing copyright material is bad and against the law
  2. the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly
  3. deals with what is generally considered right or wrong in regards to computer use
  4. acts as a free agent, replicating itself numerous times in an effort to overwhelm systems
  5. an outline of the logical and physical structure of the data and relationships among the data in the database

5 True/False questions

  1. Biometricscommonly accepted guidelines or procedures that usually find a good solution, but not necessarily the optimal solution—are often used in the decision-making process

          

  2. Relational Databasedatabase in which the actual data may be spread across several databases at different locations, connected via telecommunications devices

          

  3. Database Administrator (DBA)consists of a group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs

          

  4. Five steps of new information systems developmentsystems investigation, systems analysis, systems design, systems implementation, systems maintenance and review

          

  5. Software patchescorrections to the software bugs that cause security holes