MIS Exam #3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

92) Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) phishing B) SQL injection C) DDoS D) ransomware E) DoS

DDoS

2) ________ support making decisions that are unique, rapidly changing, and not easily specified in advance. A) ESS B) TPS C) KWM D) MIS E) DSS

DSS

29) Which of the following systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance? A) KMS B) CRM C) TPS D) MIS E) DSS

DSS

106) Currently, the protocols used for secure information transfer over the Internet are: A) HTTP, TLS, and TCP/IP. B) TCP/IP, SSL and CA. C) TLS, S-HTTP, and TCP/IP D) S-HTTP, TCP/IP, and CA. E) SSL, TLS, and S-HTTP.

SSL, TLS, and S-HTTP

117) Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A) MSSP B) NSP C) UTM D) SSL E) DPI

UTM

78) ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A) Intranets B) Wireless networks C) Virtual private networks D) Telnet E) Unified communications

Unified communications

87) The process of employing techniques to help a website achieve a higher ranking with the major search engines is called: A) SEM. B) IAB. C) SEO. D) VPN. E) LED.

SEO

81) To use the analog telephone system for sending digital data, you must also use: A) coaxial cable. B) a router. C) twisted wire. D) DSL. E) a modem.

a modem

97) A salesperson clicks repeatedly on the online ads of a competitorʹs in order to drive the competitorʹs advertising costs up. This is an example of: A) click fraud. B) sniffing. C) phishing. D) spoofing. E) pharming

click fraud.

108) Computer forensics tasks include all of the following except: A) finding significant information in a large volume of electronic data. B) collecting physical evidence on the computer. C) presenting collected evidence in a court of law. D) recovering data from computers while preserving evidential integrity.

collecting physical evidence on the computer

9) Which of the following is not a service typically provided by an information systems department? A) Project management services B) Human resources services C) Data management services

human resources services

114) According to the 2015 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2014? A) $1.6 million B) $16 billion C) $160 million D) $1.6 billion E) $16 million

$16 billion

115) Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure? A) $1,500 B) $3,000 C) $1,000 D) $2,000 E) $750

$750

67) In the domain name ʺhttp://myspace.blogging.comʺ, what are the root, top-level, second-level, and third-level domains, respectively? A) myspace, blogging, .com B) .com, blogging, myspace C) ʺhttp://ʺ, myspace, blogging, .com D) ʺhttp://ʺ, blogging, .com

.com, blogging, myspace

82) The WiMax standard can transmit up to a distance of approximately: A) 500 meters. B) 1 mile. C) 30 meters. D) 30 miles. E) 5 miles.

30 miles.

85) What is the primary difference between 3G and 4G cellular systems? A) 4G systems have greater transmission speeds. B) 3G systems have poor security. C) 3G systems are not compatible with text messaging. D) 3G systems are unable to handle web browsing.

4G systems have greater transmission speeds.

77) Approximately what percentage of U.S. households has high-speed broadband connections? A) 25 percent B) 10 percent C) 99 percent D) 50 percent E) 75 percent

75 percent

55) Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012? A) A hacking attack B) A failure of Amazonʹs cloud computing service C) A blackout at Netflixʹs primary data center D) A bug in Netflixʹs credit card processing system E) A failure of Netflixʹs recommendation engine software

A failure of Amazonʹs cloud computing service

111) Which of the following defines acceptable uses of a firmʹs information resources and computing equipment? A) A CA policy B) A UTM system C) An information systems audit policy D) An AUP E) A MSSP

An AUP

23) You work for a highly successful advertiser that is about to expand nationally. Of utmost importance will be finding a way to store and disseminate its clientsʹ frequently updated branding and style guides throughout the organization. The guides include multiple image files and text documents. What system will best serve these needs? A) A TPS with KMS capabilities B) An extranet with KMS capabilities C) A telepresence system D) A wiki

An extranet with KMS capabilities

74) The most common web server today, controlling 65 percent of the market, is: A) Netscape Server. B) IBM NetServer. C) WebSTAR. D) Apache HTTP Server. E) Microsoft IIS.

Apache HTTP Server.

49) Which of the following were involved in what has been called the patent trial of the century? A) Microsoft and Symantec B) Apple and Microsoft C) Microsoft and Facebook D) Apple and Samsung E) Apple and Hewlett-Packard

Apple and Samsung

89) The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) 802.11n. C) Bluetooth. D) 802.11b. E) WiFi.

Bluetooth

30) Which of the following would be primarily responsible for enterprise-wide governance and usage of information to maximize the value of an organizationʹs data? A) CDO B) end users C) CKO D) CPO

CDO

16) A ________ is a senior manager who oversees the use of IT in the firm. A) CIO B) CPO C) CEO D) CIT

CIO

13) Which of the following is most likely to have direct responsibility for ensuring that his or her company complies with existing data privacy laws? A) CPO B) CSO C) CIO

CPO

10) Which of the following statements is not true about collaboration in a business setting? A) Collaboration may be a short-lived activity, lasting just a few minutes. B) Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity. C) Special types of information systems are available to support collaboration.

Collaboration is a many-to-many activity as opposed to a one-to-one or one-to-many activity

50) Which of the following protects the authors of a book from having their work copied by others? A) Due process B) Trade secrets C) Patent protection D) Fair Use Doctrine E) Copyright law

Copyright law

94) Which of the following statements about passwords is NOT true? A) Password systems that are too rigorous may hinder employee productivity. B) Passwords are often disregarded by employees. C) Passwords can be sniffed when being transmitted over a network. D) Authentication cannot be established by the use of a password.

D) Authentication cannot be established by the use of a password.

7) Which of the following refers to the purchase or sale of goods and services over the Internet? A) E-business B) E-commerce C) MIS

E-commerce

5) What is the most important benefit of an enterprise application? A) Enabling a company to work collaboratively with customers and suppliers B) Enabling speed of communicating C) Enabling managers to make better decisions D) Enabling cost-effective, e-business processes E) Enabling business functions and departments to share information

Enabling business functions and departments to share information

56) Which of the following statements about Flash cookies is not true? A) Flash cookies are sometimes called super cookies. B) Flash cookies can be installed whenever a person clicks a Flash video. C) Flash cookies are stored on the userʹs computer. D) Flash cookies are installed only at the userʹs request. E) Flash cookies cannot be easily detected or deleted.

Flash cookies are installed only at the userʹs request.

12) Which of the following Google tools allows people to engage in group video chat? A) Google Docs B) Google Apps for Business C) Google Circles D) Google Drive E) Google Hangouts

Google Hangouts

90) Web browser software requests web pages from the Internet using which protocol? A) DNS B) FTP C) HTTP D) URL E) HTML

HTTP

6) Policies that determine which information technology will be used, when, and how, are provided by: A) IT educational services. B) data management services. C) IT management services. D) IT standards services.

IT standards services

102) ________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Spoofing B) Social engineering C) Cybervandalism D) Identity theft E) Evil twins

Identity theft

35) Which of the five moral dimensions of the information age do the central business activities of DoubleClick raise? A) Information rights and obligations B) Accountability and control C) Quality of life D) Property rights and obligations E) System quality

Information rights and obligations

101) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Application proxy filtering technologies C) Intrusion detection systems D) Packet filtering technologies E) Firewalls

Intrusion detection systems

45) Which of the following is a primary drawback of the ʺdo anything anywhereʺ computing environment? A) It blurs the traditional boundaries between work and family time. B) It leads to employees being paid less. C) It makes work environments less pleasant. D) It creates a digital divide. E) It centralizes power at corporate headquarters.

It blurs the traditional boundaries between work and family time.

25) A relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of a/an: A) CRM system B) ESS. C) KMS. D) TPS. E) MIS.

MIS

4) Which of the following statements about Plan Internationalʹs new human resources system, as described in the chapter case, is NOT true? A) The new system helps manage grants and donations received by Plan International. B) It took six months to implement a working system at Plan Internationalʹs international headquarters. C) The new system enables employees to update their own personal information.

It took six months to implement a working system at Plan Internationalʹs international headquarters.

86) Which of the following is not one of the four layers of the TCP/IP communications model? A) Application layer B) Network Interface layer C) Transport layer D) Local area layer E) Internet layer

Local area layer

98) All of the following countries are popular sources of malware attacks except: A) the United Kingdom. B) the Netherlands. C) the United States. D) Germany. E) Mexico.

Mexico.

40) The NAI is an industry association formed to help with which of the following? A) Copyright protection B) Trademark protection C) Online privacy issues D) Trade secret protection

Online privacy issues

44) TRUSTe is an example of which of the following? A) Spyware B) Online seal program C) Web beacon D) Opt-out program E) Behavioral targeting program

Online seal program

88) Which of the following is not a characteristic of packet switching? A) Packet switching makes efficient use of a networkʹs communications capacity. B) Packet switching requires point-to-point circuits. C) Packets include data for checking transmission errors. D) Packets travel independently of each other. E) Packets are routed through many different paths

Packet switching requires point-to-point circuits.

42) Which of the following is not a file-sharing service? A) Megaupload B) Grokster C) Pandora D) The Pirate Bay

Pandora

65) Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space whose primary need is to share documents? A) Peer-to-peer network B) WAN C) Domain-based LAN D) PAN

Peer-to-peer network

36) Which of the following restricts the information the U.S. federal government can collect and regulates what it can do with the information? A) Fair Information Practices Act of 1973 B) Gramm-Leach-Bliley Act of 1999 C) Freedom of Information Act D) Privacy Act of 1974

Privacy Act of 1974

66) Which of the following statements about RFID is not true? A) RFIDs can track individual units within a shipment. B) RFIDs transmit only over a short range. C) RFIDs use an antenna to transmit data. D) Microchips embedded in RFIDs are used to store data. E) RFIDs require line-of-sight contact to be read.

RFIDs require line-of-sight contact to be read

34) ________ can be induced by tens of thousands of repetitions under low-impact loads. A) Cognitive decline B) CVS C) RSI D) Bias

RSI

113) CryptoLocker is an example of which of the following? A) Evil twin B) Trojan Horse C) SQL injection attack D) Ransomware E) Sniffer

Ransomware

41) ________ are not held liable for the messages they transmit. A) Elected officials B) Private individuals C) Organizations and businesses D) Regulated common carriers E) European ISPs

Regulated common carriers

69) Which of the following is considered by many to be the defining Web 2.0 application? A) Widgets B) Instant messaging C) Email D) Social networking E) Blogging

Social networking

39) Which of the following statements about spam is NOT true? A) Spamming is less regulated in Europe than in the United States. B) Spam costs for business are very high. C) Spamming has mushroomed because it is so inexpensive and can reach so many people.

Spamming is less regulated in Europe than in the United States.

105) Which of the following provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver? A) Application proxy filtering B) Stateful inspection C) Packet filtering D) NAT E) Deep packet inspection

Stateful Inspection

80) Which of the following is a challenge posed by Wi-Fi networks? A) High cost of infrastructure technology B) Connectivity issues with wired LANs C) Susceptibility to interference from nearby wireless systems D) Lack of broadband support

Susceptibility to interference from nearby wireless systems

73) Which protocol is the Internet based on? A) Packet-switching B) Telnet C) FTP D) HTTP E) TCP/IP

TCP/IP

63) Which of the following services enables logging on to one computer system and working on another? A) World Wide Web B) Telnet C) T1 lines D) FTP E) LISTSERV

Telnet

95) Which of the following sued BJʹs Wholesale Club for allowing hackers to access its systems and steal credit and debit card data for fraudulent purchases? A) The Federal Bureau of Investigation B) The U.S. Federal Trade Commission C) The U.S. Food and Drug Administration D) The U.S. Justice Department E) The U.S. Securities and Exchange Commission

The U.S. Federal Trade Commission

18) Which of the following is not a true statement with respect to business processes? A) Every business can be seen as a collection of business processes. B) A business process may involve a unique way in which work, information, and knowledge are coordinated within an organization. C) The efficiency of a business firm is not related to its business processes.

The efficiency of a business firm is not related to its business processes

22) Which of the following can typically access a companyʹs intranet? A) The firmʹs customers B) The firmʹs suppliers C) The firmʹs outside contractors D) The general public E) The firmʹs employees

The firmʹs employees

46) Which of the following is not true about the changes to EU data protection rules proposed in 2012? A) The new rules would require Internet companies to obtain explicit consent from consumers for the use of their personal data. B) The new rules would reject the right to be forgotten. C) The new rules would apply only to all companies providing services in Europe. D) The new rules would require Internet companies to retain information only as long as absolutely necessary.

The new rules would reject the right to be forgotten

71) Which of the following statements is not true about search engines? A) They are arguably the Internetʹs ʺkiller app.ʺ B) They have solved the problem of how users instantly find information on the Internet. C) They emerged in the early 1990s as simple software programs. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

20) What analytical framework discussed in the chapter helps understand and evaluate the benefits and uses of collaboration tools? A) Time/cost matrix B) Space/cost matrix C) Task/time matrix D) Time/space matrix

Time/space matrix

118) Which of the following statements about Internet security is not true? A) A corporate network without access to the Internet is more secure than one that provides access. B) Instant messaging can provide hackers access to an otherwise secure network. C) The use of P2P networks can expose a corporate computer to outsiders. D) Most VoIP traffic is not encrypted. E) VoIP is more secure than the switched voice network.

VoIP is more secure than the switched voice network.

72) Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are known as: A) MANs. B) WANs. C) PANs. D) WSNs. E) LANs.

WSNs

68) The 802.11 set of standards is known as: A) WiMax. B) WSN. C) Wi-Fi. D) WLAN. E) Bluetooth.

Wi-Fi

59) According to a Wall Street Journal study, all of the following websites installed tracking files on visitor computers except: A) Comcast B) Google C) Dictionary.com D) MSN E) Wikipedia

Wikipedia

51) NORA is: A) a data analysis technology that finds hidden connections between data in disparate sources. B) a sentencing guideline adopted in 1987 mandating stiff sentences on business executives. C) an ethical principle. D) a profiling technology used by the EU.

a data analysis technology that finds hidden connections between data in disparate sources.

33) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the utilitarian principle to evaluate this situation, you might argue that stealing the food is: A) wrong, because the man would not want the grocer to steal from him. B) acceptable, because the higher value is the survival of the family. C) wrong, because society could not survive if everyone did this. D) wrong, because if everyone were to do this, the concept of personal property is defeated. E) acceptable, because the grocer suffers the least harm.

acceptable, because the higher value is the survival of the family

76) A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) wireless sensor B) server C) wireless router D) hot spot E) access point

access point

26) In a business environment, the focus of collaboration is to: A) prevent miscommunication. B) accomplish the task at hand. C) foster better communication. D) provide a sense of community.

accomplish the task at hand

48) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: A) the courts of appeal. B) due process. C) responsibility. D) accountability. E) the judicial system.

accountability

103) All of the following are types of information systems general controls except: A) implementation controls. B) application controls. C) physical hardware controls. D) data security controls.

application controls

64) T lines: A) are used in connection with satellite Internet access. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) operate over existing telephone lines to carry voice, data, and video. E) have up to twenty-four 64-Kbps channels.

are high-speed, leased data lines providing guaranteed service levels

70) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) baud. B) bps. C) gigaflops. D) ROM. E) Hertz.

bps

11) DSS and MIS are also referred to as ________ systems. A) business intelligence B) expert C) business information D) business model

business intelligence

107) A foreign country attempting to access government networks in order to disable a national power grid would be an example of: A) cyberwarfare. B) phishing. C) injection attack. D) denial-of-service attacks. E) ransomware.

cyberwarfare

19) Employees that assist with paperwork at all levels of the firm are called: A) data workers. B) senior managers. C) service workers.

data workers

93) In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) application proxy filtering B) deep packet inspection C) fault-tolerant computing D) high availability computing E) stateful inspection

deep-packet inspection

38) The term ʺ________ʺ refers to large disparities in access to computers and the Internet among different social groups and different locations. A) technostress B) CTS C) CVS D) RSI E) digital divide

digital divide

37) The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called: A) liability. B) responsibility. C) the courts of appeal. D) accountability. E) due process.

due process

17) The use of digital technology and the Internet to execute the major business processes in the enterprise is called: A) KWM. B) enterprise applications. C) MIS. D) e-commerce. E) e-business.

e-business

32) Digital media differs from a physical book in all of the following ways except: A) ease of transmission. B) ease of alteration. C) ease of establishing uniqueness. D) ease of replication. E) ease of global distribution.

ease of establishing uniqueness

109) A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the content of all incoming and outgoing email messages. C) check the accuracy of all transactions between its network and the Internet. D) authenticate users.

enforce a security policy on data between its network and the Internet

54) CVS refers to: A) eyestrain related to computer display screen use. B) carpal vision syndrome. C) complacency created by computers. D) cognitive decline induced by technology. E) wrist injuries brought about by incorrect hand position when using a keyboard.

eyestrain related to computer display screen use

104) For 100 percent availability, online transaction processing requires: A) a multi-tier server network. B) fault-tolerant computer systems. C) high-capacity storage. D) dedicated phone lines. E) deep packet inspection

fault-tolerant computer systems

96) The Sarbanes-Oxley Act: A) requires that companies retain electronic records for at least 10 years. B) outlines medical security and privacy rules. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) requires financial institutions to ensure the security of customer data.

imposes responsibility on companies and management to safeguard the accuracy of financial information

21) Supply chain management systems are considered to be a(n) ________ because they automate the flow of information across company boundaries. A) interorganizational system B) KMS C) enterprise system D) cross-functional system

interorganizational system

27) Suppliers, customers, employees, products and services, and ________ are the five basic components with which businesses must deal. A) sales and marketing B) manufacturing and production C) invoices and payments D) the environment E) technology

invoices and payments

84) A VPN: A) formats web pages with dynamic links to other documents. B) is an encrypted private network configured within a public network. C) is an Internet-based service for delivering voice communications. D) is more expensive than a dedicated network.

is an encrypted private network configured within a public network

61) Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Hybrid D) Digital E) Analog

laser

15) An ESS is an information system that supports the: A) decision-making and administrative activities of middle managers. B) long-range planning activities of senior management. C) knowledge and data workers in an organization.

long-range planning activities of senior management

3) The term management information systems refers to a specific category of information systems serving: A) transaction process reporting. B) knowledge workers. C) integrated data processing throughout the firm. D) senior management. E) middle management functions.

middle management functions

83) A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) server B) hotspot C) switch D) firewall E) network operating system/NOS

network operating system

58) When a cookie is created during a website visit, it is stored: A) on the website computer. B) in the cloud. C) in a web directory. D) on the ISPʹs computer. E) on the hard drive of the visitorʹs computer

on the hard drive of the visitorʹs computer

8) Ciscoʹs WebEx is an example of which of the following types of collaboration tools? A) Team room B) Group calendar C) Blog D) Online meeting E) Wiki

online meeting

91) The HIPAA Act of 1996: A) outlines medical security and privacy rules. B) specifies best practices in information systems security and control. C) requires that companies retain electronic records for at least 10 years. D) imposes responsibility on companies and management to safeguard the accuracy of financial information. E) requires financial institutions to ensure the security of customer data.

outlines medical security and privacy rules.

75) The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) software-defined networking. B) packet routing. C) multiplexing. D) ATM. E) packet switching.

packet switching

57) The use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals is called: A) phishing. B) profiling. C) spyware. D) targeting. E) spamming.

profiling

53) In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of: A) system quality. B) information rights and obligations. C) property rights and obligations. D) accountability and control. E) quality of life

property rights and obligations

47) The U.S. CAN-SPAM Act: A) requires commercial email senders to identify themselves. B) makes spamming illegal. C) does not override state anti-spamming laws. D) has not yet gone into effect.

requires commercial email senders to identify themselves

119) The Gramm-Leach-Bliley Act: A) specifies best practices in information systems security and control. B) requires that companies retain electronic records for at least 10 years. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) requires financial institutions to ensure the security of customer data. E) outlines medical security and privacy rules.

requires financial institutions to ensure the security of customer data.

52) Accepting the potential costs, duties, and obligations for the decisions you make is referred to as: A) liability. B) ethics. C) responsibility. D) due process. E) accountability.

responsibility

60) The U.S. Department of Commerce developed a(n) ________ framework in order to enable U.S. businesses to legally use personal data from EU countries. A) FIP B) COPPA C) safe harbor D) PGP E) P3P

safe harbor

1) Identifying potential customers for the businessesʹ products or services is an activity associated with the ________ function. A) technology B) finance and accounting C) sales and marketing D) manufacturing and production E) human resources

sales and marketing

100) Statements ranking information risks and identifying security goals are included in a(n): A) AUP. B) security policy. C) What-if analysis. D) business impact analysis. E) risk assessment.

security policy

112) An example of phishing is: A) malware that displays annoying pop-up messages. B) flooding a web server with thousands of requests for service. C) sending bulk email that asks for financial aid under a false pretext. D) a program that records the keystrokes on a computer. E) setting up a fake medical website that asks users for confidential information

setting up a fake medical Web site that asks users for confidential information

31) According to the ________ rule, if an action cannot be taken repeatedly, it is not right to take at all. A) utilitarian principle B) slippery-slope C) risk aversion D) Golden Rule E) categorical imperative

slippery-slope

120) Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) click fraud. C) social engineering. D) phishing. E) pharming.

social engineering

99) A keylogger is a type of: A) SQL injection attack. B) Trojan horse. C) worm. D) virus. E) spyware.

spyware

14) Each of the following is required for successful collaboration, except: A) strong hierarchy. B) open culture. C) decentralized structure. D) appropriate collaboration technology

strong hierarchy

28) Instant messaging, videoconferencing, and shared screens are all examples of ________ collaboration tools. A) synchronous B) spontaneous C) bimodal D) asynchronous

synchronous

24) The principal liaison between the information systems groups and the rest of the organization is a(n): A) systems analyst. B) CIO. C) CSO. D) information systems manager.

systems analyst

116) Specific security challenges that threaten the communications lines in a client/server environment include: A) unauthorized access, errors, and spyware. B) errors, vandalism, and malware. C) tapping, sniffing, message alteration, and radiation. D) theft, copying, alteration of data, and hardware or software failure. E) hacking, vandalism, and denial of service attacks.

tapping; sniffing; message alteration; radiation

43) ʺLook and feelʺ copyright infringement lawsuits are concerned with: A) the distinction between tangible and intangible ideas. B) violation of a monopoly on the ideas behind a product. C) the distinction between an idea and its expression. D) using the creative elements of another product.

the distinction between an idea and its expression

62) Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) IP address. B) root domain. C) uniform resource locator. D) third level domain. E) VPN.

uniform resource locator

79) A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) metropolitan area network. C) peer-to-peer network. D) intranet. E) wide area network

wide area network

110) An independent computer program that copies itself from one computer to another over a network is called a: A) worm. B) sniffer. C) Trojan horse. D) bug. E) pest.

worm


Ensembles d'études connexes

Environmental Science Unit 1 Challenge 1 Sophia

View Set

SFL 260 Exam #2 Practice Problems

View Set

Accessibility and Universal Design

View Set

ArtH 100 PSU Chang tang final exam (clicker questions)

View Set

US Government M4L2 - The Federal Bureaucracy

View Set

online question bank starting with chapter 25-17

View Set