Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Chapter 4 BCIS | CS - Computer Architecture & Assembly Programming, Quizzes of Computer Architecture and Organization

Class: CS - Computer Architecture & Assembly Programming; Subject: Computer Science; University: Tyler Junior College; Term: Forever 1989;

Typology: Quizzes

2012/2013

Uploaded on 03/06/2013

littletaxikab
littletaxikab 🇺🇸

5

(2)

22 documents

1 / 4

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
TERM 1
Which act restricts what information the
federal government can collect?
DEFINITION 1
The Privacy Act
TERM 2
What is a special class of adware that collects
data about the user and transmits it over the
Internet without the user's knowledge or
permission?
DEFINITION 2
Spyware
TERM 3
How do prevention and resistance
technologies stop intruders from accessing
and reading sensitive information?
DEFINITION 3
Content filtering, encryption, and firewalls
TERM 4
What is the method or system of government
for information management or control?
DEFINITION 4
Information governance
TERM 5
What is one of the major problems with
email?
DEFINITION 5
User's expectation of privacy
pf3
pf4

Partial preview of the text

Download Chapter 4 BCIS | CS - Computer Architecture & Assembly Programming and more Quizzes Computer Architecture and Organization in PDF only on Docsity!

Which act restricts what information the federal government can collect? The Privacy Act TERM 2 What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? DEFINITION 2 Spyware TERM 3 How do prevention and resistance technologies stop intruders from accessing and reading sensitive information? DEFINITION 3 Content filtering, encryption, and firewalls TERM 4 What is the method or system of government for information management or control? DEFINITION 4 Information governance TERM 5 What is one of the major problems with email? DEFINITION 5 User's expectation of privacy

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user? Adware TERM 7 Which of the below represents the definition of information compliance? DEFINITION 7 The act of conforming, acquiescing, or yieldinginformation. TERM 8 Who are hackers with criminal intent? DEFINITION 8 Crakcers TERM 9 All of the following are types of information security breaches except: DEFINITION 9 E-discovery TERM 10 A DDoS stands for one of the common forms of viruses, that attacks multiple computers to flood a website until it slows or crashes. What does DDoS stand for? DEFINITION 10 Distributed denial-of-service attack

White-hat hacker Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen? TERM 17 Which of the following protection techniques scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware? DEFINITION 17 Antivirus software