13

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Loss of annual sales due to software piracy by software companies was estimated to be:

$63.5 billion.

According to The International Federation of the Phonographic Industry (IFPI), worldwide sales of music fell by how much in 2009?

10 percent.

The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:

12 million

In a survey of 583 U.S. companies, how many were breached at least once by hackers over the past year?

90 percent

According to Bill Joy, Sun Microsystems' chief scientist, the 21st century technologies:

Are so powerful they can spawn whole new classes of accidents and abuses.

In 2011 this region contained the highest commercial value of unlicensed (pirated) software:

Asia Pacific.

In a study of CIOs from around the world, McKinsey & Company found that most CIOs reported to their:

Chief executive officer.

A CIO is the company's:

Chief information officer.

Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:

China.

The Motion Picture Association of America claimed that 44 percent of the industry's domestic losses came from illegal downloading of movies by:

College students and recent graduates.

The corporate nemesis responsible for creating and spreading computer attacks is called a:

Computer hacker.

In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:

Dartmouth.

This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:

Data Privacy Day

The practice of downloading copyrighted songs was challenged because it:

Denied legitimate compensation to the recording artists.

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:

Digital Millennium Copyright Act.

The "Perfect Citizen" program, monitored by the National Security Agency, is designed to protect against cyber assaults focused on?

Electricity grids and nuclear power plants

According to the Center for Responsible Nanotechnology how many separate and severe risks are associated with nanotechnology.

Eleven.

In the United Kingdom offenders of software piracy and those who breach intellectual property rights face:

Fines of up to ≤50,000 (nearly $80,000) and/or a prison sentence of up to 10 years.

These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:

Hacktivists

Over time the role of the CIO:

Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.

In 2008 the F.D.A. declared that food from cloned animals and their offspring was safe to eat, but:

Imposed a voluntary ban on the sale of cloned animals.

This term describes sensors and actuators that are embedded in physical objects - from roadways to pacemakers - and are linked through wired and wireless networks.

Internet of Things.

The application of engineering to create materials on a molecular or atomic scale is:

Nanotechnology.

In 2005, the United Nations approved a declaration that:

Prohibited all forms of human cloning "in as much as cloning is incompatible with human dignity and the protection of human life."

In some economically developed countries and most developing countries around the world genetically modified food was:

Welcomed as a way to increase crop yields.

A hijacked computer that can be remote-controlled by the attacker to respond to the attacker's commands is called a:

Zombie


संबंधित स्टडी सेट्स

Ricci → Ch. 1: Perspectives on Maternal and Child Health Care PrepU

View Set

Enfermedad inflamatoria intestinal

View Set

TExES Core Subjects EC-6: Economic Principles

View Set