Chapter 10 Flashcards Preview

Computer Class > Chapter 10 > Flashcards

Flashcards in Chapter 10 Deck (20)
Loading flashcards...
1
Q

Reverse ________ list telephone numbers followed by subscriber names.

A

directories

2
Q

The privacy issue that relates to the responsiblity of controlling who is able to use data is:

A

access

3
Q

Two basic types of cookies are _________

A

ad network and traditional

4
Q

A small image or other HTML code that is hidden within an e-mail message is called a ________.

A

web bug

5
Q

People who create or improve programs and share those programs are ________.

A

hackers

6
Q

An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

A

denial-of-service attack

7
Q

Secret words or phrases used to gain access to a computer system are called

A

passwords

8
Q

Computer __________ are guidlines for the morally acceptable use of computers to our society.

A

ethics

9
Q

Copyright is a(n) __________ concept that gives content creators the right to control use and distribution of their work.

A

legal

10
Q

_________ is a collection of technologies designed to prevent copyright violations.

A

DRM

11
Q

Programs that record virtually every activity on a computer system.

A

Snoopware

12
Q

A type of cookie that records activities across different sites.

A

Ad Network

13
Q

Relates to who owns data and rights to software

A

Property

14
Q

An attack that overwhelms Web sites with data making them inaccessible.

A

DoS

15
Q

Security hardware and software that controls access to internal computer networks.

A

Firewall

16
Q

Belief that there is little threat to personal privacy via the Internet.

A

Illusion of anonymity

17
Q

Programs that alert users when certain viruses enter a system

A

virus checkers

18
Q

Gains unauthorized access to a system for malicious purposes

A

cracker

19
Q

Illegal action involving special knowledge of computer technology.

A

Computer crime

20
Q

Replicates itself over a network–spreading to other systems automatically

A

worm