Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link

Full screen (f)
exit full mode
Question
A network links computer resources using either a wired or wireless connection.
Use Space or
up arrow
down arrow
to flip the card.
Question
The GUI allows users to enter commands by clicking on icons on the computer screen or by tapping or swiping them on devices with a touch screen.
Question
Application software is the software that helps users perform desired tasks.
Question
Utility programs are applications software packages, such as word processor and spreadsheet programs, that help users perform a desired task.
Question
Businesses develop intranets so valued customers have access to internal information that is not available to the general public.
Question
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
Question
The World Wide Web is simply another name for the Internet.
Question
Utility programs are supplemental operating system software, such as firewalls, spam blockers, and other security software.
Question
The fundamental form of system software is the operating system, which controls the way the computer functions at its most basic level.
Question
GUI stands for Graphical Unit Interchange.
Question
The physical components used to collect, store, organize, and process data and to distribute information are referred to as software.
Question
Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet. Only institutions participating in a consortium of dues-paying members have access to Internet2.
Question
Beginning 1996, several leading research universities, corporations, and other organizations formed a coalition to create a new generation of Internet technology based on fibre-optic cable.
Question
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks, operating under a common set of rules so each can communicate with the others.
Question
The World Wide Web is the part of the Internet that consists of documents written in HTML. This is the part of the Internet that receives the most attention from the general public.
Question
Horizontal market software consists of highly specialized applications used in a particular industry such as medicine, law, or accounting.
Question
Igor loves to download music and video over the Internet. But he is finding that even with his high-speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Igor.
Question
Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.
Question
Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.
Question
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a Web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
Question
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.
Question
Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.
Question
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
Question
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
Question
Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.
Question
A query is a request for the database management software to search for data that matches specific criteria.
Question
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
Question
One of the main advantages of expert systems is that they are easy and inexpensive to develop.
Question
Cloud computing is another term used for surfing the Internet.
Question
Data mining is most effective at locating relationships among data stored on small, highly specialized databases, such as the database for a single department or division within a company.
Question
Maisie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Maisie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Maisie could enter a query into the database.
Question
TurboTax™ is a software program that takes the customer through a series of tax-related questions. Based on the customer's responses, the system will select the next question. In the end, it provides all the information the customer needs to file a return to Canada Revenue Agency, including the amount of taxes owed or the amount of a refund to expect. TurboTaxTM is an example of an expert system.
Question
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Question
The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.
Question
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
Question
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.
Question
A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.
Question
A data warehouse is a large, organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.
Question
Businesses develop decision support systems (DSS) to give managers access to large quantities of data and the processing power to convert the data into high-quality information.
Question
Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.
Question
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
Question
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
Question
Spyware is a type of malware.
Question
Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.
Question
Radio frequency identification (RFID) is the use of microchips to transmit information about a device, product, or person to a RFID reader that is within range.
Question
Pharming is a scam that seeks to steal identities by routing Internet traffic to fake websites.
Question
Once you install antivirus software on your computer, you are secured against viruses for life.
Question
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
Question
E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.
Question
eMarketplaces provide a platform for businesses in specific B2B markets to interact.
Question
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
Question
Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail. Many banks offer this service.
Question
Intellectual property is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software.
Question
To protect your computer from spyware and viruses remove the hard drive before accessing the Internet.
Question
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
Question
Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller's products.
Question
B2C e-commerce refers to online business trades between companies.
Question
Margot Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain. Margot wants to find a technology that will uniquely identify items to simplify the tracking process. She is likely to be interested in considering RFID chips to solve this problem.
Question
Software that is created and distributed with malicious intent is called malware.
Question
A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.
Question
Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.
Question
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
Question
So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.
Question
Spam is unsolicited e-mail usually sent to very large numbers of recipients, many of whom may not have interest in the message.
Question
Viruses can erase or modify data on your hard drive, prevent computer start-up, or find and send personal information stored on your hard drive to unauthorized people. Viruses are often hidden in e-mails, instant messages, or files downloaded from the Internet.
Question
What are hard drives, keyboards, monitors, and printers examples of?

A) hardware
B) RFID technology
C) software
D) operating systems
Question
Intellectual property refers to products that result from creative and intellectual effort, such as books, musical works, inventions, and computer software.
Question
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
Question
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
Question
Piracy of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from-or providing compensation to-the owner of the copyrighted material.
Question
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
Question
Which of the following refers to the physical components used to collect, store, organize, and process data and to distribute information?

A) hardware
B) intranet
C) extranet
D) software
Question
Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.
Question
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.
Question
Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
Question
The basic difference between computer viruses on the one hand and spyware on the other is that a virus has the ability to spread automatically to other computers.
Question
Unfortunately, there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses, hackers, and spyware.
Question
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
Question
Intellectual property that is protected by copyright law includes corporate logos.
Question
Phishing is a scam where official-looking e-mails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/163
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link
1
A network links computer resources using either a wired or wireless connection.
True
2
The GUI allows users to enter commands by clicking on icons on the computer screen or by tapping or swiping them on devices with a touch screen.
True
3
Application software is the software that helps users perform desired tasks.
True
4
Utility programs are applications software packages, such as word processor and spreadsheet programs, that help users perform a desired task.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
5
Businesses develop intranets so valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
6
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
7
The World Wide Web is simply another name for the Internet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
8
Utility programs are supplemental operating system software, such as firewalls, spam blockers, and other security software.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
9
The fundamental form of system software is the operating system, which controls the way the computer functions at its most basic level.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
10
GUI stands for Graphical Unit Interchange.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
11
The physical components used to collect, store, organize, and process data and to distribute information are referred to as software.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
12
Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet. Only institutions participating in a consortium of dues-paying members have access to Internet2.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
13
Beginning 1996, several leading research universities, corporations, and other organizations formed a coalition to create a new generation of Internet technology based on fibre-optic cable.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
14
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks, operating under a common set of rules so each can communicate with the others.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
15
The World Wide Web is the part of the Internet that consists of documents written in HTML. This is the part of the Internet that receives the most attention from the general public.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
16
Horizontal market software consists of highly specialized applications used in a particular industry such as medicine, law, or accounting.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
17
Igor loves to download music and video over the Internet. But he is finding that even with his high-speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Igor.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
18
Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
19
Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
20
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a Web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
21
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
22
Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
23
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
24
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
25
Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
26
A query is a request for the database management software to search for data that matches specific criteria.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
27
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
28
One of the main advantages of expert systems is that they are easy and inexpensive to develop.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
29
Cloud computing is another term used for surfing the Internet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
30
Data mining is most effective at locating relationships among data stored on small, highly specialized databases, such as the database for a single department or division within a company.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
31
Maisie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Maisie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Maisie could enter a query into the database.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
32
TurboTax™ is a software program that takes the customer through a series of tax-related questions. Based on the customer's responses, the system will select the next question. In the end, it provides all the information the customer needs to file a return to Canada Revenue Agency, including the amount of taxes owed or the amount of a refund to expect. TurboTaxTM is an example of an expert system.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
33
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
34
The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
35
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
36
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
37
A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
38
A data warehouse is a large, organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
39
Businesses develop decision support systems (DSS) to give managers access to large quantities of data and the processing power to convert the data into high-quality information.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
40
Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
41
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
42
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
43
Spyware is a type of malware.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
44
Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
45
Radio frequency identification (RFID) is the use of microchips to transmit information about a device, product, or person to a RFID reader that is within range.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
46
Pharming is a scam that seeks to steal identities by routing Internet traffic to fake websites.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
47
Once you install antivirus software on your computer, you are secured against viruses for life.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
48
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
49
E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
50
eMarketplaces provide a platform for businesses in specific B2B markets to interact.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
51
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
52
Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail. Many banks offer this service.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
53
Intellectual property is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
54
To protect your computer from spyware and viruses remove the hard drive before accessing the Internet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
55
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
56
Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller's products.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
57
B2C e-commerce refers to online business trades between companies.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
58
Margot Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain. Margot wants to find a technology that will uniquely identify items to simplify the tracking process. She is likely to be interested in considering RFID chips to solve this problem.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
59
Software that is created and distributed with malicious intent is called malware.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
60
A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
61
Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
62
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
63
So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
64
Spam is unsolicited e-mail usually sent to very large numbers of recipients, many of whom may not have interest in the message.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
65
Viruses can erase or modify data on your hard drive, prevent computer start-up, or find and send personal information stored on your hard drive to unauthorized people. Viruses are often hidden in e-mails, instant messages, or files downloaded from the Internet.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
66
What are hard drives, keyboards, monitors, and printers examples of?

A) hardware
B) RFID technology
C) software
D) operating systems
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
67
Intellectual property refers to products that result from creative and intellectual effort, such as books, musical works, inventions, and computer software.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
68
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
69
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
70
Piracy of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from-or providing compensation to-the owner of the copyrighted material.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
71
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following refers to the physical components used to collect, store, organize, and process data and to distribute information?

A) hardware
B) intranet
C) extranet
D) software
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
73
Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
74
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
75
Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
76
The basic difference between computer viruses on the one hand and spyware on the other is that a virus has the ability to spread automatically to other computers.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
77
Unfortunately, there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses, hackers, and spyware.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
78
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
79
Intellectual property that is protected by copyright law includes corporate logos.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
80
Phishing is a scam where official-looking e-mails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
Unlock Deck
Unlock for access to all 163 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 163 flashcards in this deck.