Chapter 5 Smartbook

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

Child

What was passed to protect minors from accessing inappropriate material on the Internet?

Child Online Protection Act

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

__________ is the assurance that messages and information remain available only to those authorized to view them.

Confidentiality

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

Copyright

__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Copyright

Damaged reputation

Customers, suppliers, banks, business partners

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

Drive-by hacking

What are the two fundamental blocks on which organizations base their businesses?

Ethics and security

What is software that is manufactured to look like the real thing and sold as such?

counterfeit

_________ software is software that is manufactured to look like the real thing and sold as such.

counterfeit

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?

Information ethics

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance

Information __________ is a method or system of government for information management or control.

governance

_______ are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.

hackers

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

A(n) ________ is software written with malicious intent to cause annoyance or damage.

virus

What spreads itself not only from file to file but also from computer to computer?

worm

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

Bug bounty program

_________ is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

Adware

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Digital

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital rights management

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Ediscovery

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Ediscovery Electronic discovery

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

What is the act of conforming, acquiescing, or yielding information?

Information compliance

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?

Information management

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?

Information property

What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

Revenue

Lost future revenue, billing losses, investment losses, lost productivity

What is software that is intended to damage or disable computers and computer systems?

Malware

___________ is software that is intended to damage or disable computers and computer systems.

Malware

_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Pirated

___________ is a form of malicious software that infects your computer and asks for money.

Ransomware

Financial performance

Revenue recognition, cash flow, credit rating, stock price

What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?

Scareware

Other expenses

Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

patent

Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

management

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

privacy

Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

property

Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

property

_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

spyware


Set pelajaran terkait

Psychology Cognitive Development & Language

View Set

16th- Century Northern Renaissance

View Set

Chapter 8, Sentence Correction, Idioms and Usage

View Set

5: Market Efficiency and Market Distortions: Practice Quiz

View Set