Exam 9: The Challenges of the Digital Age: Society and Information Technology Today

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Software obtained illegally is called open-source software.

Free
(True/False)
4.7/5
(33)
Correct Answer:
Verified

False

"Dirty data" problems are usually caused by ________ workers.

Free
(Short Answer)
4.9/5
(42)
Correct Answer:
Verified

data-entry or data entry

The process by which one picture is slowly altered or transformed into another image is called ________.

Free
(Short Answer)
4.9/5
(29)
Correct Answer:
Verified

morphing

Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.

(Short Answer)
4.9/5
(29)

Information technology is basically a clean industry creating few toxic byproducts.

(True/False)
4.7/5
(43)

Which of these is NOT an example of a computer crime?

(Multiple Choice)
4.9/5
(30)

Many networks have ________ controls for tracking which programs and servers were used and which files were opened.

(Short Answer)
4.8/5
(42)

PIN is short for ________.

(Short Answer)
4.8/5
(32)

In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.

(Short Answer)
4.8/5
(39)

In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.

(True/False)
4.8/5
(38)

Which of the following terms describes old,obsolete electronic gadgetry?

(Multiple Choice)
4.7/5
(40)

What is included in a disaster recovery plan?

(Essay)
4.8/5
(31)

Increasingly intelligent machinery and automation have caused a _________ in several types of jobs.

(Short Answer)
4.8/5
(37)

Describe some effects of Information overload.

(Essay)
4.8/5
(39)

A well-known software program used to alter (morph)photographs,for good or for ill,is ________.

(Short Answer)
4.8/5
(34)

The Nigerian letter scam is an example of ________.

(Multiple Choice)
4.8/5
(37)

Sending emails that appear to come from a trusted source,which direct you to a website where you're asked to reveal personal information is called _________.

(Multiple Choice)
4.8/5
(31)

A(n)________ is a record of how a transaction was handled from input through processing and output.

(Short Answer)
4.7/5
(38)

How do "people controls" provide security for software and data?

(Essay)
4.8/5
(38)

Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.

(True/False)
4.7/5
(33)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)