

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Class: IS 101 - Introduction to Information Systems; Subject: Information Systems; University: University of Nevada-Reno; Term: Fall 2011;
Typology: Quizzes
1 / 3
This page cannot be seen from the preview
Don't miss anything!
TERM 1
DEFINITION 1 Science of measuring individual body characteristics. TERM 2
DEFINITION 2 Short for robot network. A network of computers compromised by means of a Trojan horse that plants instructions within each PC to wait for commands form the person controlling that network. TERM 3
DEFINITION 3 Crime of two types: (1) an illegal act perpetrated against computers or telecommunications; (2) the use of computers or telecommunications to accomplish an illegal act. TERM 4
DEFINITION 4 The use of computers and the internet to attack an enemys information systems. TERM 5
DEFINITION 5 Method of restoring information-processing operations that have been halted by destruction or accident.
TERM 6
DEFINITION 6 Process of altering readable data so that it is not usable unless the changes are undone. TERM 7
DEFINITION 7 A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think its accessing a safe public network or your home network and then monitors your communications. TERM 8
DEFINITION 8 System of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss. Five components of security are deterrents to computer crime, identification and access, encryption, protection of software and data, and disaster-recovery plans. TERM 9
DEFINITION 9 The act of sending sexually revealing pictures of oneself through cellphone text messages or email. TERM 10
DEFINITION 10 Also known as a drone. A computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels.