A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
____ use is the use of a computer or its data for unapproved or possibly illegal activities.
Digital forensics is used by ____.
all of the above
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
To ____ a file means to make a copy of it.
With a three-generation backup policy, the parent is the ____.
Second oldest copy of the file
Computer ____ occurs when a computer consumes someone’s entire social life.
____ rights are the rights to which creators are entitled for their work.
____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information.
Content ____ is the process of restricting access to certain material on the Web.
A(n) ____ is someone who uses e-mail as a vehicle for extortion.
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
____ occurs when someone steals personal or confidential information.
With a three-generation backup policy, the child is the ____.
Most recent copy of the file
To prevent repetitive strain injury, take all of the following precautions except ____.
use the heel of the hand as a pivot point while typing or using the mouse
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
A(n) ____ is a numeric password either assigned by a company or selected by a user.
To read encrypted data, the recipient must ____, or decipher, it into a readable form.
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.
Virtual Private Network(VPN)
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
Web sites use a ____ to keep track of items in a user’s shopping cart.
A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Software ____ is the unauthorized and illegal duplication of copyrighted software.
In the case of system failure or the discovery of corrupted files, users ____ the files by copying the backed up files to their original location on a computer.
Computer ____ are the moral guidelines that govern the use of computers and information systems.
A(n) ____ program secretly collects information about a user.
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
With a(n) ____, users choose which folders and files to include in a backup.
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
Many businesses use ____ to limit employees’ Web access.
One of the more common causes of ____ is an electrical power variation.
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.
____ means in a location separate from the computer site.
A(n) IT code of conduct is a written guideline that helps determine whether a specific computer action is ____.
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
Symptoms of a user with computer addiction include all of the following except ____.
irritable when at the computer
A(n) ____ gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
With a three-generation backup policy, the grandparent is the ____.
oldest copy of the file
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
Digital ____ is the discovery, collection, and analysis of evidence found on computers and networks.
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Computer Fraud and Abuse Act
A(n) ____ system is a collection of hardware, software, data, people, and procedures that work together to produce quality information.
For each system development project, a company usually forms a project ____ to work on the project from beginning to end.
Project ____ is the process of planning, scheduling, and then controlling the activities during the system development cycle.
____ measures how well a proposed system will work.
The ____ contains all the documentation and deliverables of a project.
Companies can develop software in-house using their own IT personnel or ____ it, which means having an outside source develop it for them.
A(n) ____ is a working model of a proposed system.
A systems test ____.
verifies that all programs in an application work together properly
With a ____, each location converts to a new system at a separate time.
A computer ____ plan summarizes in writing all the safeguards that are in place to protect a company’s information assets.
In sequence, most system development life cycles contain five phases: ____.
planning, analysis, design, implementation, support
System development should follow all of these general guidelines except ____.
repeat tasks intermittently
Project leaders should have good change ____ skills so they can recognize when a change in the project has occurred, take actions to react to the change, and plan for opportunities because of the change.
____ is a measure of how suitable the development of a system will be to a company.
Application software developed by the user or at the user’s request is called ____ software.
A unit test ____.
verifies that each individual program works by itself
____ involves showing users exactly how they will use the new hardware and software in a system.
The purpose of the ____ is to provide ongoing assistance for an information system and its users after the system is implemented.
operation, support, and security phase
One member of the project team is the project ____, who manages and controls the budget and schedule of the project.
Systems analysts discuss various aspects of a development project with the ____ committee, which is a decision-making body in a company.
____ is the collection and summarization of data and information.
A project ____ contains all documentation for a single project.
A(n) ____ test measures the performance of hardware or software.
An integration test ____.
verifies that an application works with other applications
With a ____, only one location in the company uses a new system — so it can be tested.
Converting existing manual and computer files so the new system can use them is known as ____.
A(n) ____ is a set of components that interact to achieve a common goal.
Scope ____ occurs when one activity in a project has led to another that was not originally planned; thus, the scope of the project has grown.
The advantage of a prototype is that ____.
users can work with the system before it is completed — to make sure it meets their needs
With ____, a user stops using the old system and begins using the new system on a certain date.
____ include anyone for whom an information system is being built.
The first activity in the preliminary investigation is to ____.
interview the user who submitted the project request
An acceptance test ____.
is performed by end-users and verifies that the new system works with actual data
____ consists of running the old system alongside the new system for a specified time.
The advantage of custom software is that it ____.
matches a company’s requirements exactly
A systems ____ is responsible for designing and developing an information system.
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
Like a decision table, a decision ____ shows conditions and actions in a process, but it shows them graphically.
____ refer to the core activities of a business, and involve the creation, selling, and support of the products and services that a company produces.
____ are employees who are responsible for coordinating and controlling an organization’s resources.
A(n) ____ system is a set of hardware, software, data, people, and procedures that works together to produce information.
A(n) ____ identifies data outside of a normal condition.
A(n) ____ is an information system that helps users analyze data and make decisions.
____ software tracks leads and inquiries from customers, stores a history of all correspondence and sales to a customer, and allows for tracking of outstanding issues with customers.
____ computing provides computing needs to computer users via the Internet.
With ____, users invest in stocks, options, bonds, treasuries, certificates of deposit, money markets, annuities, mutual funds, and so on — without using a broker.
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
In a disaster recovery plan, the recovery plan specifies ____.
the actions to be taken to restore full information processing operations
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company’s overall goals and objectives.
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
A(n) ____ is a system that manage one or more human resources functions.
____ is the application of human intelligence to computers.
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
When a mobile user, remote office, vendor, or customer connects to a company’s network using the Internet, a(n) ____ provides them with a secure connection to the company network server, as if they had a private line.
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee’s account such as the electric company or telephone company.
A high-availability system may include ____ components, such as extra power supplies, that allow for a functioning component to take over automatically the tasks of a similar component that fails.
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
Controlling is an activity performed by managers that involves ____.
measuring performance and, if necessary, taking corrective action
A(n) ____ usually lists just transactions.
____ occurs when retailers use the Web to sell their products or services.
Uptime is a measure of ____.
Planning is an activity performed by managers that involves ____.
establishing goals and objectives
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
The term ____, commonly describes a business or venture of any size.
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
instructing and authorizing others to perform the necessary work
A(n) ____ system is a system that automates and manages much of the communications between employees and a business.
A(n) ____ system is an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making.
____ is a measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.
In a disaster recovery plan, the backup plan specifies ____.
how a company uses backup files and equipment to resume information processing
____ computing combines many servers and/or personal computers on a network to act as one large computer.
In a disaster recovery plan, the emergency plan specifies ____.
the steps to be taken immediately after a disaster strikes
Organizing is an activity performed by managers that includes ____.
identifying and combining resources so that a company can reach its goals and objectives
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
An alternative to maintaining an alternate computer facility is to enter into a(n) ____ backup relationship with another firm, where one firm provides space and sometimes equipment to the other in case of a disaster.
Employees in a(n) ____ department are responsible for keeping all the computer operations and networks in business and government running smoothly.
Database ____, which is a job title in the system development and programming area of an IT department, uses data modeling techniques and tools to analyze, tune, and specify data usage within an application area.
____ scientist, which is a job title in the system development and programming area of an IT department, researches, invents, and develops innovative solutions to complex software requirements or problems.
____, which is a job title in the technical services area of an IT department, creates visual impressions or products and advertisements in the fields of graphics, theater, and fashion.
____ specialist, which is a job title in the technical services area of an IT department, reviews programs and documentation to ensure they meet an organization’s standards.
The computer ____ field consists of manufacturers and distributors of computers and computer-related hardware.
____ is a process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area.
Computing professionals typically obtain a certification by ____.
passing an examination
When choosing a certification, computer users should do all of the following EXCEPT ____.
rely on the advice of people in unrelated fields
People who may be interested in ____ include information security officers, law enforcement officials, military intelligence officers, network administrators, network security specialists, and security administrators.
digital forensics certification
Job titles in the management area of an IT department include all of the following EXCEPT ____.
E-commerce ____, which is a job title in the management area of an IT department, supervises the development and execution of Internet or e-commerce systems.
____, which is a job title in the technical services area of an IT department, produces documents such as newsletters, brochures, and books by combining text and graphics.
____ specialist, which is a job in the training area of an IT department, answers hardware, software, and networking questions in person, over the telephone, and/or in a chat room.
____ analyst, which is a job title in the system development and programming area of an IT department, works closely with users to analyze their requirements, designs and develops new information systems, and incorporates new technologies.
The computer ____ field consists of companies that develop, manufacture, and support a wide range of computer software.
IT certification can do all of the following EXCEPT ____.
guarantee job security
If a certification exam is not passed, the test-taker must ____.
pay the fee again to retake the test
Job titles in the system development and programming area of an IT department include all of the following EXCEPT ____.
____ specialist, which is a job title in the security area of an IT department, configures routers and firewalls and specifies Web protocols and enterprise technologies.
People who may be interested in ____ include Internet and intranet managers, Internet service provider staff, network administrators, Webmasters, Web developers, and Web programmers.
The machine language version that results from compiling a 3GL is called the ____.
object code or object program
____ is an object-oriented programming language that is an extension of the C programming language
____ is a markup language that enables Web sites to be displayed more easily on microbrowsers in smart phones and other mobile devices.
A(n) ____ form collects data from visitors to a Web site, who fill in blank fields and then click a button that sends the information.
In sequence, the program development life cycle consists of six steps: ____.
analyze requirements, design solution, validate design, implement design, test solution, and document solution
In object-oriented (OO) design, the concept of packaging data and procedures into a single object is called ____.
A ____ shows one or more actions following each other in order.
sequence control structure
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
Syntax errors will be caused by all of the following except ____.
using the wrong control structure
One purpose of using test data is to try to cause a ____, which is an error that occurs while a program is running.
A computer ____ writes and modifies computer programs.
____ is an object-oriented language based on C++ and has been accepted as a standard for Web applications and XML-based Web services.
An application ____ is a program that creates source code or machine code from specifications of the required functionality.
The program ____ life cycle is a series of steps programmers use to build computer programs.
A programming language’s ____ is the set of grammar and rules that specifies how to write instructions for a solution algorithm.
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
Want to see the other 164 Flashcards in Final Questions?JOIN TODAY FOR FREE!