Shared Flashcard Set

Details

AIT
Chapter 9: The Challenges of the Digital Age // Society & Information Technology Today
18
Computer Science
Professional
10/23/2013

Additional Computer Science Flashcards

 


 

Cards

Term
Computer crime (pg. 471)
Definition
Can be two types; (1) It can be an illegal act perpetrated against computers or telecommunications, or (2) it can be the use of computers or telecommunications to accomplish an illegal act.
Term
Evil twin attack (pg. 474)
Definition
In which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think it’s accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website
Term
Zombie (pg. 474) (drone)
Definition
A computer taken over covertly and programmed to respond to instructions sent remotely
Term
Botnet (pg. 474)
Definition
Short for “robot network,”; A network of computers compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the person controlling that network.
Term
Security (pg. 478)
Definition
A system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss.
Term
Disaster recovery plan (pg. 481)
Definition
A method of restoring information-processing operations that have been halted by destruction or accident
Term
List the five limitations users should bear in mind when using databases for research. (pgs. 467-468)
Definition
Term
Describe various errors, accidents, and natural hazards that can affect computer systems. (pgs. 468-471)
Definition
Term
Identify five types of theft involving computers and computer systems. (pgs. 471-473)
Definition
Term
Describe types of internet fraud. (pgs. 473-475)
Definition
Term
List seven types of parties that are known to have committed computer crimes. (pgs. 475-476)
Definition
Term
Summarize three ways to deter computer crimes. (pgs. 478-479)
Definition
Term
What are three methods that security systems use to verify an individual’s legitimate right of access? (pgs. 479-480)
Definition
Term
Describe the purpose and features of a disaster-recovery plan. (pgs. 481-482)
Definition
Term
Describe three types of mental-health problems linked to information technology. (pgs. 474-475)
Definition
Term
Summarize some of the problems resulting from computers that impede productivity in the workplace. (pgs. 487-488)
Definition
Term
What has been the impact of technology on employment? (pg. 490)
Definition
Term
What have some executives done because of the lack of reliability of the public internet? (pg. 491)
Definition
Supporting users have an ad free experience!