BCIS exam 2
17) bandwidth
The amount of data that can be transferred from one point to another in one second
34)____ is a pure-play company.
amazon
Social networking sites
are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
8) black hat
are hackers who specialize in unauthorized penetration of information systems.
12) Denial of service (DOS)
attack floods a network or server with service requests to prevent legitimate users' access to the system.
intentional threat
both targeted and untargeted attacks from a variety of sources.
47) In _____ data transmission, multiple pieces of data are sent simultaneously.
broadband
15) Name a physical security measure
cable shielding, corner bolts, etc.
19) LANs are used most often to
connect computer workstations and servers.
4) trojan program
contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program.
37. Another term that is used interchangeably with e-commerce is ____.
e-buisness
39. ____ is a site that facilitates C2C e-commerce.
ebay
5) web based email
enables you to access your e-mail account from any computer and, in some cases, store your e-mails on a Web server.
biometric security measureS
facial recognition, fingerprints, ect.
The ____ topology is costly and difficult to maintain and expand.
mesh
A routing table lists _______.
nodes on a network and the path to each node, along with alternate routes and the speed of existing routes
16) disaster recovery
plan lists the tasks that must be performed to restore damaged data and equipment.
41)Which term describes one user viewing one ad?
pop-up
43) With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.
push
1 Social Networking
refers to a broad class of Web sites and services that allows users to connect with friends, family, and colleagues online as well as meet people with similar interest or hobbies.
20) A network topology
represents a network's physical layout.
49) The process of deciding which path the data takes on a network is called ____.
routing
30) Google.com, Bing.com, and Ask.com are examples of ____.
search engines
44) A Web page displayed when the user first visits the site is called _____.
splash screen
13) Social engineering attacks
take advantage of the human element of security systems.
25) The Internet started in ______.
1969
32. The Internet2 (I2) project started in ____.
1987
Disadvantages of e-commerce
Bandwidth capacity, security problems, accessibility, acceptance
29) ____ is also called a corporate portal.
Intranets
36. ____ introduced the value chain concept.
Michael Porter
40)____ is a popular on-line payment system used on many on-line auction sites.
Paypal
21) In a bus topology, _________ are used at each end of the cable to absorb the signal.
TERMINATOR
The ______ denotes the type of organization or country the address specifies.
TLD
26) A______ is the address of a document or site on the Internet.
URL
18) coaxial
______ cables are thick cables that can be used for both data and voice transmissions.
38) Crisis response is an example of a ____ e-government application.
government to government
23. _______ scaling refers to adding more workstations (clients).
horzontal
11) A logic bomb
is a type of trojan program used to release a virus, worm, or other destructive code.
7) A script kiddie
is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.
E-commerce
is buying and selling goods and services over the Internet
3 modem
is short for modulator-demodulator.
35. ____ is a major player in B2B e-commerce.
walmart
28) Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.
web browsers
travels from computer to computer in a network, but it does not usually erase data.
worm