Term
A _____ uses software and/or hardware to prevent unwanted access to a computer or computer system. |
|
Definition
|
|
Term
The _____ requires senders of unsolicited commercial emails to label their messages as ads and to tell the recipients how to decline future messages. |
|
Definition
|
|
Term
_____ are skilled computer users who try to gain unauthorized access to other people’s computers |
|
Definition
|
|
Term
By offering limited access of their intranets to select groups of people, firms create |
|
Definition
|
|
Term
Among larger nations, the piracy rate in _____ is one of the highest in the world. |
|
Definition
|
|
Term
Apple’s iPad tablet computer can complete approximately 3______ mathematical operations per second. |
|
Definition
|
|
Term
_____ are files of related records organized according to logical systems and stored on computer-accessible media. |
|
Definition
|
|
Term
The two broad categories of software are |
|
Definition
system software and applications software |
|
|
Term
_____ is the sending of official-looking but fake email messages designed to get users to disclose personal information in an attempt to steal identities |
|
Definition
|
|
Term
_____ are specialized Internet sites where B2B buyers and sellers exchange products and services |
|
Definition
|
|