Deck 9: The Challenges of the Digital Age: Society and Information Technology Today
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 9: The Challenges of the Digital Age: Society and Information Technology Today
1
Which of the following is NOT among the errors and accidents that may afflict computer systems?
A) human errors
B) electromechanical problems
C) procedural problems
D) computer crimes
A) human errors
B) electromechanical problems
C) procedural problems
D) computer crimes
D
2
Which of the following terms describes old,obsolete electronic gadgetry?
A) dirty data
B) e-dump
C) e-waste
D) zombies
A) dirty data
B) e-dump
C) e-waste
D) zombies
C
3
The six categories of errors,accidents,and hazards that may affect computer systems are human errors,procedural errors,natural hazards,software errors,theft of hardware,and electromechanical problems.
False
4
In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records.This crime is called ________.
A) theft of time and services
B) dirty-data entry
C) theft of software
D) theft of information
A) theft of time and services
B) dirty-data entry
C) theft of software
D) theft of information
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
In the area of threats to computer systems,electromechanical problems are examples of ________.
A) errors and accidents
B) crimes against computers
C) dirty data
D) theft of time and services
A) errors and accidents
B) crimes against computers
C) dirty data
D) theft of time and services
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
Humans often are not good at assessing their own information needs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Which of these is NOT an example of a computer crime?
A) theft of time and services
B) entering incorrect data
C) pirating software
D) online service fraud
A) theft of time and services
B) entering incorrect data
C) pirating software
D) online service fraud
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Perception may be affected by information overload and cause people to make errors.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
Sending emails that appear to come from a trusted source,which direct you to a website where you're asked to reveal personal information is called _________.
A) theft of time and services
B) Evil Twin attack
C) phishing
D) pharming
A) theft of time and services
B) Evil Twin attack
C) phishing
D) pharming
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
_______ is a system of safeguards for protecting information technology against disasters,system failures,and unauthorized access.
A) WAP
B) File sharing
C) Security
D) DDoS
A) WAP
B) File sharing
C) Security
D) DDoS
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
A computer crime is defined as ________.
A) an illegal act perpetuated against computers or telecommunications
B) the use of computers or telecommunications to accomplish an illegal act
C) both an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act
D) neither an illegal act perpetuated against computers or telecommunications nor the use of computers or telecommunications to accomplish an illegal act
A) an illegal act perpetuated against computers or telecommunications
B) the use of computers or telecommunications to accomplish an illegal act
C) both an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act
D) neither an illegal act perpetuated against computers or telecommunications nor the use of computers or telecommunications to accomplish an illegal act
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
A variant on conventional phishing,in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals the data that you enter into a website,is known as ________.
A) Evil Twin attack
B) pharming
C) pirating
D) botnetting
A) Evil Twin attack
B) pharming
C) pirating
D) botnetting
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
A blocking program for protecting children from online objectionable adult material is ________.
A) Cybersitter
B) Cyber Patrol
C) Net Nanny
D) all of these
A) Cybersitter
B) Cyber Patrol
C) Net Nanny
D) all of these
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT a function of the U.S.Computer Emergency Response Team (CERT)?
A) Counseling the party under attack.
B) Helping to thwart the intruder.
C) Evaluating the system afterward against future break-ins.
D) Prosecuting those caught.
A) Counseling the party under attack.
B) Helping to thwart the intruder.
C) Evaluating the system afterward against future break-ins.
D) Prosecuting those caught.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT a method in which a security system tries to authenticate a user's identity?
A) What you have-cards,keys,signatures,badges
B) What you need-the kind of information you are asking for
C) Who you are-physical traits,or biometrics
D) What you know-PINs,passwords,and digital signatures
A) What you have-cards,keys,signatures,badges
B) What you need-the kind of information you are asking for
C) Who you are-physical traits,or biometrics
D) What you know-PINs,passwords,and digital signatures
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
The Nigerian letter scam is an example of ________.
A) errors and accidents
B) theft of time and services
C) worms and viruses
D) Internet-related fraud
A) errors and accidents
B) theft of time and services
C) worms and viruses
D) Internet-related fraud
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
Incomplete,outdated,or otherwise inaccurate data is known as ________ data.
A) bad
B) dirty
C) threatening
D) hazardous
A) bad
B) dirty
C) threatening
D) hazardous
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
A power failure that disrupts a computer system is an example of a(n)________.
A) electromechanical problem
B) human error
C) procedural error
D) software error
A) electromechanical problem
B) human error
C) procedural error
D) software error
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a tool for fighting unauthorized online use?
A) electronic surveillance
B) Internet filtering software
C) disaster-recovery plan
D) rule-based detection software
A) electronic surveillance
B) Internet filtering software
C) disaster-recovery plan
D) rule-based detection software
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
Dirty data is ________.
A) virus-infected data
B) worm-infected data
C) inaccurate,incomplete data
D) stolen data
A) virus-infected data
B) worm-infected data
C) inaccurate,incomplete data
D) stolen data
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
Internet users purchasing products on the Internet should enter private information only on sites that show a padlock icon at the top or bottom of the page,which indicates that encryption technology is being used.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
Predictive-statistical-model software allows companies to rate orders via credit cards or calls via calling cards according to a scale of risk; the software is used to prevent fraud.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
In 1999 the $125 million Mars Climate Orbiter was fed data expressed in pounds,the English unit of force,instead of newtons,the metric unit (about 22% of a pound).As a result,the spacecraft flew too close to the surface of Mars and broke apart.This is an example of a human software error.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
Biochemistry is the science of measuring individual body characteristics.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
A software bug is an error in a program that causes it not to work properly.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Software obtained illegally is called open-source software.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
A disaster-recovery plan is a method of restoring information-processing operations that have been halted by destruction or accident.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee Internet management (EIM)software.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
In the United States,the Foreign Intelligence Surveillance Act court makes decisions about government surveillance,including the National Security Agency's (NSA)right to search the phone records of residents.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
You can always claim ownership of the data that is collected about you.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
In an Evil Twin attack,a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the computer controlling that network.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
In the Nigerian letter scam,also called an advance-fee fraud,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
Many networks have audit controls for tracking which programs and servers were used,which files were opened.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
A computer crime can be an illegal act perpetrated against computers / telecommunications,or it can be the use of computers / telecommunications to accomplish an illegal act.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
There is no explicit right to privacy in the U.S.Constitution.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
An unmanned aerial vehicle (UAV)is also called an audit trailer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
It is illegal for employers to use computer-based systems to monitor their employees' activities.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
An audit trail is a record of how a transaction was handled from input through processing and output.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
There are three main ways to authenticate you as a legitimate computer user and grant you Internet access: what you have,what you know,what your physical attributes are.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
When people at work play online games or do online shopping on their employer's time,this is called theft of information.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
In morphing,a film or video image is displayed on a computer screen and altered pixel by pixel.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
A software bug is a(n)________ in a program that causes it to malfunction.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
The Internet is increasingly coming under commercial control.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
Currently,technology does not produce widely shared economic gains but instead widens the gap between those who have the right skills and those who don't.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
Intentionally crashing an entire computer system is a crime of _________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Algorithms have been devised to detect changes in uncompressed photo files.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Medical school researchers have showed that areas of the brain responsible for generating feelings of addiction and reward are activated during video game play.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
In the ________ scam,victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
Errors and accidents in computer systems may be classified as human errors,procedural errors,software errors,"dirty data" problems,________ problems,and natural hazards.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Nondelivery of merchandise ordered online,Internet auction misrepresentations,and unauthorized credit / debit card use for online purchases all represent ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
The contribution of technological advances to social progress is steady and positive.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
A computer _______ can be an illegal act perpetrated against computers or telecommunications systems or the use of computers or telecommunications systems to commit illegal acts.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
"Dirty data" problems are usually caused by ________ workers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Hurricane Katrina is an example of a ________ that can be harmful to computers and communications systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
When malicious software is implanted in your computer that redirects your computer to an impostor web page,it is called ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
An error in a software program that causes it to not work properly is known as a ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Misuse of technology,fussing with computers,and information overload are three workplace impediments to productivity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Improvements in technology are beneficial to all in the short run.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
A system of safeguards for protecting informational technology against disasters,systems failure,and unauthorized access that can result in damage or loss is known as ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Information technology is basically a clean industry creating few toxic byproducts.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
The process of altering readable data into unreadable form to prevent unauthorized access is known as ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
_________ is the use of a smartphone or other mobile device to send sexually explicit photos or videos,or sexually charged messages.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)________ is a record of how a transaction was handled from input through processing and output.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
Using a system called _________,employers send information supplied by job applicants to be matched against databases in the U.S.Social Security Administration or the Department of Homeland Security.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
PIN is short for ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Rule-based-detection software,predictive-statistical-model software,employee Internet management (EIM)software,Internet filtering software,and electronic surveillance are all examples of tools for fighting Internet ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
_________ is the visual pollution represented by endless wireless towers,roof antennas,satellite dishes,cellphone towers,and so on that we see every day.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
The text lists fourteen suggestions for keeping your electronic hardware almost theft-proof; describe six of them.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
__________ is warfare involving computers and the Internet in which one nation attacks another's information systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
________ software,a tool for fighting online fraud,examines tons of data from previous transactions to create mathematical descriptions of what a typical fraudulent transaction is like.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
Children in the 9-18 age range who use information technologies and the Internet to unleash taunting,nasty rumors,and other put-downs of fellow adolescents are known as ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
Humans often make errors.In computer systems,as in life,they can be of several types.The text describes three types of common human error.Explain them
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
________ software,a tool for fighting online fraud,allows merchants to creates a "negative file" that states the criteria each online transaction must meet; these criteria include not only not being on a list of stolen credit card numbers but also price limits,matches of the cardholders' billing address and shipping address,and warning if a large quantity of a single item is ordered.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
The U.S.Defense Department created ________,which provides round-the-clock international information and security-related support services to users of the Internet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
A well-known software program used to alter (morph)photographs,for good or for ill,is ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
Many networks have ________ controls for tracking which programs and servers were used and which files were opened.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
The process by which one picture is slowly altered or transformed into another image is called ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
A _________ plan is a method of restoring information processing operations that have been halted by destruction or accident.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
A ________ is a special word required to access a computer system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
Increasingly intelligent machinery and automation have caused a _________ in several types of jobs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck