Term
The CAN-SPAM Act allows the sending of most e-mail spam as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.
|
|
Definition
|
|
Term
Rejected e-mail automatically goes to the junk e-mail of your e-mail service. |
|
Definition
|
|
Term
When waste is identified, it usually points to one common cause: the improper management of information systems and resources |
|
Definition
|
|
Term
Over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic Web sites. |
|
Definition
|
|
Term
Because of the importance of maintaining accurate data and of people understanding their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system’s various modules. |
|
Definition
|
|
Term
According to the 2009 FBI Internet Crime Report, from 2008 to 2009, there was a decrease in the number of complaints of Internet crime filed with law enforcement officers and a decrease in the total dollar loss from these cases.
|
|
Definition
|
|
Term
The vast majority of computer-related crimes are reported to authorities.
|
|
Definition
|
|
Term
The National Infrastructure Protection Center serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism attacks against the country’s critical infrastructure.
|
|
Definition
|
|
Term
Cyberterrorists are believed to have invaded the U.S. power grid and planted software that could interrupt the system during a time of crises or war. |
|
Definition
|
|
Term
While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.
|
|
Definition
|
|
Term
Smartphones such as the iPhone and Google’s Android phone that can run applications are impervious to malware. |
|
Definition
|
|
Term
Deleting the contents of the Recycle Bin makes it impossible for individuals to view the deleted data.
|
|
Definition
|
|
Term
Copyright laws protect processes, machines, and compositions of matter. |
|
Definition
Copyright laws protect processes, machines, and compositions of matter. |
|
|
Term
It is estimated that the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales. |
|
Definition
|
|
Term
The patent review and granting process of the U.S. Patent Office is generally conceded to be one of the most smoothly functioning processes of the U.S. government. |
|
Definition
|
|
Term
Recent court cases and police reports involving computer crime show that lawmakers are not yet ready to introduce newer and tougher computer crime legislation.
|
|
Definition
|
|
Term
Role-based system access means that only people who fill or used to fill a certain role can access a specific system. |
|
Definition
|
|
Term
Role-based system access means that only people who fill or used to fill a certain role can access a specific system. |
|
Definition
|
|
Term
Unfortunately, many Intrusion Detection Systems frequently provide false alarms that result in wasted effort. |
|
Definition
|
|
Term
Few small and medium sized organizations are willing to outsource their network security operations.
|
|
Definition
|
|
Term
Tracking software for laptops is not yet available. |
|
Definition
|
|
Term
The Identity Theft and Assumption Deterrence Act of 1998 assigns responsibility to the Department of Homeland Security for helping identity theft victims to restore their credit and ease the impact of the imposter. |
|
Definition
|
|
Term
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages. |
|
Definition
|
|
Term
The use of e-mail among public officials might violate “transborder data flow” laws. |
|
Definition
|
|
Term
Federal law prohibits private employers from monitoring e-mail sent or received by their employees. |
|
Definition
|
|
Term
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster. |
|
Definition
|
|
Term
All U.S. companies are required to have privacy policies. |
|
Definition
|
|
Term
It has been clearly proven that increased use of cell phones can lead to an increased chance of brain cancer. |
|
Definition
|
|
Term
A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome. |
|
Definition
A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome. |
|
|
Term
Flexibility is a major component of ergonomics and an important feature in computer devices. |
|
Definition
|
|
Term
Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring ____. |
|
Definition
a.
|
a formal justification statement before computer equipment is purchased
|
b.
|
definition of standard computing platforms
|
c.
|
use of preferred vendors for all acquisitions
|
d.
|
all of the above
D) ALL OF THE ABOVE
|
|
|
|
Term
A good example of a useful policy to minimize waste and mistake is ____. |
|
Definition
c.
|
users should implement proper procedures to ensure correct input data
|
|
|
|
Term
The Leads Online Web-based service system is used by law enforcement to ____. |
|
Definition
C.) recover stolen property |
|
|
Term
Originally a(n) ____ was a person who enjoyed computer technology and spent time learning and using computer systems.
|
|
Definition
|
|
Term
____ have extra knowledge that make them especially dangerous - they know logon ids, passwords, and company procedures that help them evade detection. |
|
Definition
|
|
Term
____ is a type of malware that executes when specific conditions occur. |
|
Definition
|
|
Term
____ is a set of programs that enables its user to gain administrator level access to a computer or network. |
|
Definition
|
|
Term
A small program hidden in a network or computer system that records identification numbers and passwords is called a(n) ____. |
|
Definition
|
|
Term
If a court determines that a patent infringement is intentional, it can award up to ____ to the patent holder.
|
|
Definition
c.
|
three times the amount of damages claimed by the patent holder
|
|
|
|
Term
The practice of disguising illegally gained funds so that they seem legal is called ____. |
|
Definition
|
|
Term
A(n) ____ is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
|
|
Definition
|
|
Term
A useful guideline to protect corporate computers from criminal hackers is to ____.
|
|
Definition
a.
|
Install antivirus software on all computers
|
|
|
|
Term
Legislation that requires businesses to prove that they are securing their data ____. |
|
Definition
a.
|
HIPPA
|
c.
|
USA Patriot Act
|
b.
|
Sarbanes-Oxley
|
d.
|
all of the above
D) ALL OF THE ABOVE
|
|
|
|
Term
Proper use of antivirus software requires that it is ____. |
|
Definition
c.
|
used to scan all removable storage media before copying or running programs from them
|
|
|
|
Term
The European Union has a data protection directive that requires firms transporting data ____ to have certain privacy procedures in place.
|
|
Definition
C) across national boundaries |
|
|
Term
Roughly ____ of U.S. employers monitor their employees Web surfing activities |
|
Definition
|
|
Term
____ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire. |
|
Definition
B) Platform for Privacy Preferences |
|
|
Term
____ involves publishing an intentionally false written statement that is damaging to a person’s or an organization’s reputation. |
|
Definition
|
|
Term
The Privacy Act of 1974 ____.
|
|
Definition
a.
|
applies only to certain federal agencies
|
|
|
|
Term
The ____ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause. |
|
Definition
a.
|
Electronic Communications Privacy Act
|
|
|
|
Term
The ____ requires telephone companies to turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation. |
|
Definition
|
|
Term
The ____ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data. |
|
Definition
|
c.
|
Gramm-Leach-Bliley Act
|
|
|
|
|
Term
A job that requires sitting at a desk and using a computer all day can lead to ____. |
|
Definition
a.
|
the formation of blood clots in the legs or lungs
|
b.
|
an undesirable weight gain
|
c.
|
greater risk of type 2 diabetes
|
d.
|
all of the above
D) ALL OF THE ABOVE
|
|
|
|
Term
____ is an aggravation of the pathway for the nerves that travel through the wrist. |
|
Definition
C) carpel tunnel syndrome |
|
|
Term
Computer users who work at their machines for several hours a day, should ____. |
|
Definition
D) consider the use of artificial tears |
|
|
Term
Spam messages often carry attached files with embedded ____________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files |
|
Definition
|
|
Term
____________________ spam is a new tactic spammers use to circumvent spam-filtering software. |
|
Definition
|
|
Term
Most organizations implement internal ____________________ to measure actual results against established goals, such as percentage of end-user reports produced on time.
|
|
Definition
|
|
Term
Often computer criminals talk a critical password out of a person, a practice called _______________. |
|
Definition
|
|
Term
A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching a computer-based attacks. |
|
Definition
|
|
Term
____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else. |
|
Definition
|
|
Term
With ____________________ tools, law enforcement agencies can analyze crime data relative to other factors, including the locations of common crime scenes and certain demographic data.
|
|
Definition
|
|
Term
A(n) ____________________ is a modified version of a virus.
|
|
Definition
|
|
Term
Software is considered intellectual property and may be protected by copyright or ____________________ law. |
|
Definition
|
|
Term
____________________ is involved in what represents the largest copyright infringement case in history. |
|
Definition
|
|
Term
____________________ is the operation of a fake Web site by someone trying to gain access to customer’s private information. |
|
Definition
|
|
Term
The ____________________ card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller. |
|
Definition
|
|
Term
Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use. |
|
Definition
|
|
Term
A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
|
|
Definition
|
|
Term
Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organizations’ security defenses.
|
|
Definition
|
|
Term
Managed ____________________ providers monitor, manage, and maintain network security for their customers. |
|
Definition
|
|
Term
A(n) ____________________ is a person paid by a company about how much they’ve earned and how easy the get-rich-quick plan was to operate.
|
|
Definition
|
|
Term
A libeled party can file what is known as a ____________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster.
|
|
Definition
|
|
Term
Organizations implement ____________________ software to prevent employees from visiting Web sites not related to work.
|
|
Definition
|
|
Term
The hazardous activities associated with unfavorable working conditions are collectively referred to as ____________________. |
|
Definition
|
|
Term
The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called ____________________.
|
|
Definition
|
|
Term
When working at a workstation, the ____________________ of the monitor should be at or just below eye level. |
|
Definition
|
|
Term
Just because an act is defined as legal does not mean that it is ____________________. |
|
Definition
|
|
Term
____________________ issues deal with what is generally considered right or wrong. |
|
Definition
|
|
Term
The ____________________ is the oldest computing society and boasts more than 80,000 members in more than 100 countries.
|
|
Definition
Association for Computing Machinery |
|
|