BCIS exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

17) bandwidth

The amount of data that can be transferred from one point to another in one second

34)____ is a pure-play company.

amazon

Social networking sites

are Web sites that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.

8) black hat

are hackers who specialize in unauthorized penetration of information systems.

12) Denial of service (DOS)

attack floods a network or server with service requests to prevent legitimate users' access to the system.

intentional threat

both targeted and untargeted attacks from a variety of sources.

47) In _____ data transmission, multiple pieces of data are sent simultaneously.

broadband

15) Name a physical security measure

cable shielding, corner bolts, etc.

19) LANs are used most often to

connect computer workstations and servers.

4) trojan program

contains code intended to disrupt a computer, network, or Web site, and it is usually hidden inside a popular program.

37. Another term that is used interchangeably with e-commerce is ____.

e-buisness

39. ____ is a site that facilitates C2C e-commerce.

ebay

5) web based email

enables you to access your e-mail account from any computer and, in some cases, store your e-mails on a Web server.

biometric security measureS

facial recognition, fingerprints, ect.

The ____ topology is costly and difficult to maintain and expand.

mesh

A routing table lists _______.

nodes on a network and the path to each node, along with alternate routes and the speed of existing routes

16) disaster recovery

plan lists the tasks that must be performed to restore damaged data and equipment.

41)Which term describes one user viewing one ad?

pop-up

43) With ____ technology, information is sent to users based on their previous inquiries, interests, or specifications.

push

1 Social Networking

refers to a broad class of Web sites and services that allows users to connect with friends, family, and colleagues online as well as meet people with similar interest or hobbies.

20) A network topology

represents a network's physical layout.

49) The process of deciding which path the data takes on a network is called ____.

routing

30) Google.com, Bing.com, and Ask.com are examples of ____.

search engines

44) A Web page displayed when the user first visits the site is called _____.

splash screen

13) Social engineering attacks

take advantage of the human element of security systems.

25) The Internet started in ______.

1969

32. The Internet2 (I2) project started in ____.

1987

Disadvantages of e-commerce

Bandwidth capacity, security problems, accessibility, acceptance

29) ____ is also called a corporate portal.

Intranets

36. ____ introduced the value chain concept.

Michael Porter

40)____ is a popular on-line payment system used on many on-line auction sites.

Paypal

21) In a bus topology, _________ are used at each end of the cable to absorb the signal.

TERMINATOR

The ______ denotes the type of organization or country the address specifies.

TLD

26) A______ is the address of a document or site on the Internet.

URL

18) coaxial

______ cables are thick cables that can be used for both data and voice transmissions.

38) Crisis response is an example of a ____ e-government application.

government to government

23. _______ scaling refers to adding more workstations (clients).

horzontal

11) A logic bomb

is a type of trojan program used to release a virus, worm, or other destructive code.

7) A script kiddie

is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.

E-commerce

is buying and selling goods and services over the Internet

3 modem

is short for modulator-demodulator.

35. ____ is a major player in B2B e-commerce.

walmart

28) Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of ____.

web browsers

travels from computer to computer in a network, but it does not usually erase data.

worm


Set pelajaran terkait

Chapter 10 - System Architecture

View Set

Chapter 20 Multiple Choice Question Bank- Exam 2

View Set

PEDS Exam 1 Course Point Practice Questions

View Set

Chapter 3: Creating Anglo-America

View Set

CM507 B Theories of Counseling and Psychotherapy

View Set