100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CSIT 120 Final Exam Questions and Answers Fully Solved

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
31-01-2025
Written in
2024/2025

CSIT 120 Final Exam Questions and Answers Fully Solved Information Technology (IT) - Answers The study or use of systems for storing, retrieving, and sending information Cybercrime - Answers A criminal act committed primarily through the use of a computer system Phishing - Answers Sending emails to lure people into revealing their personal information or to take an action Hacking - Answers unauthorized access, modification, or use of an electronic device or some element of a computer system Social Networking - Answers process by which we make connections with others social media - Answers online tools and sites that allow netoworking Cloud Storage - Answers allows you to save files in storage and then access them on the Cloud Cloud Computing - Answers is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand intellectual property - Answers an idea, invention, or process that derives from the work of the mind or intellect copyright - Answers protection given to the creator of songs, computer programs, books, and other creative works copyright infringement - Answers When a copyrighted work is reproduced, distributed, performed, or publicly displayed work without the permission of copyright owner patent - Answers creates protection for someone who invents a new product or process Trademark - Answers a word, phrase, logo, shape or sound that identifies a source of goods or services that must be protected by an organization Digital Rights Management - Answers a strategy designed to prevent illegal distribution of movies, music, and other digital content public domain - Answers A work of authorship that is not under copyright protection and can be used freely without permission plagarism - Answers taking someones ideas or writing and offering them as your own digital divide - Answers The gap between those who have access to the Internet and technology and those who do not mobile commerce - Answers The process of buying, selling, or exchanging products, services, or information via phone E-commerce (electronic commerce) - Answers The process of buying, selling, or exchanging products, services, or information via internet black hat hackers - Answers A hacker that breaks into a system for malicious reasons white hat hackers - Answers A person who hacks into a system for non-malicious purposes Denial of service attack - Answers attack which a botnet overwhelms websites, mail servers, or other internet locations and a user cannot access the site Spam - Answers irrelevant or inappropriate messages sent on the Internet to a large number of recipients malware - Answers malicious software Spyware - Answers malware that can monitor and record user activities computer cookies - Answers A text file which a website can store on its visitors' hard drives. Can remember passwords, tracks number of visitors identity theft - Answers when a criminal or group uses the identity of unknown person Social Engineering - Answers manipulation of people into releasing information or performing a task that violates security protocols virus - Answers software that attaches or adds itself to other software; can replicate itself anti-virus software - Answers a program that finds and removes viruses from a computer Passwords - Answers a method of controlling access to confidential patient information. Choose strong passwords, change passwords periodically, do not use the same password for multiple purposes privacy policy - Answers Document that tells how personal data collected by a company will be used artificial intelligence - Answers the branch of computer science that attempts to develop computers that mimic human thought and behavior virtual reality - Answers Illusion of reality through the use of software and perception changing devices Augmented reality - Answers the combination of a "real" objects overlaid with data, images, etc. that are not real Excel - Answers a spreadsheet written or tailored to meet specific needs excel cell - Answers A box formed by the intersection of a row and column in a worksheet or a table, in which you enter information. excel active cell - Answers The selected cell in which data is entered when you begin

Show more Read less
Institution
CSIT 120
Course
CSIT 120









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIT 120
Course
CSIT 120

Document information

Uploaded on
January 31, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSIT 120 Final Exam Questions and Answers Fully Solved

Information Technology (IT) - Answers The study or use of systems for storing, retrieving, and sending
information

Cybercrime - Answers A criminal act committed primarily through the use of a computer system

Phishing - Answers Sending emails to lure people into revealing their personal information or to take an
action

Hacking - Answers unauthorized access, modification, or use of an electronic device or some element of
a computer system

Social Networking - Answers process by which we make connections with others

social media - Answers online tools and sites that allow netoworking

Cloud Storage - Answers allows you to save files in storage and then access them on the Cloud

Cloud Computing - Answers is a type of Internet-based computing that provides shared computer
processing resources and data to computers and other devices on demand

intellectual property - Answers an idea, invention, or process that derives from the work of the mind or
intellect

copyright - Answers protection given to the creator of songs, computer programs, books, and other
creative works

copyright infringement - Answers When a copyrighted work is reproduced, distributed, performed, or
publicly displayed work without the permission of copyright owner

patent - Answers creates protection for someone who invents a new product or process

Trademark - Answers a word, phrase, logo, shape or sound that identifies a source of goods or services
that must be protected by an organization

Digital Rights Management - Answers a strategy designed to prevent illegal distribution of movies,
music, and other digital content

public domain - Answers A work of authorship that is not under copyright protection and can be used
freely without permission

plagarism - Answers taking someones ideas or writing and offering them as your own

digital divide - Answers The gap between those who have access to the Internet and technology and
those who do not

, mobile commerce - Answers The process of buying, selling, or exchanging products, services, or
information via phone

E-commerce (electronic commerce) - Answers The process of buying, selling, or exchanging products,
services, or information via internet

black hat hackers - Answers A hacker that breaks into a system for malicious reasons

white hat hackers - Answers A person who hacks into a system for non-malicious purposes

Denial of service attack - Answers attack which a botnet overwhelms websites, mail servers, or other
internet locations and a user cannot access the site

Spam - Answers irrelevant or inappropriate messages sent on the Internet to a large number of
recipients

malware - Answers malicious software

Spyware - Answers malware that can monitor and record user activities

computer cookies - Answers A text file which a website can store on its visitors' hard drives. Can
remember passwords, tracks number of visitors

identity theft - Answers when a criminal or group uses the identity of unknown person

Social Engineering - Answers manipulation of people into releasing information or performing a task that
violates security protocols

virus - Answers software that attaches or adds itself to other software; can replicate itself

anti-virus software - Answers a program that finds and removes viruses from a computer

Passwords - Answers a method of controlling access to confidential patient information.

Choose strong passwords, change passwords periodically, do not use the same password for multiple
purposes

privacy policy - Answers Document that tells how personal data collected by a company will be used

artificial intelligence - Answers the branch of computer science that attempts to develop computers that
mimic human thought and behavior

virtual reality - Answers Illusion of reality through the use of software and perception changing devices

Augmented reality - Answers the combination of a "real" objects overlaid with data, images, etc. that
are not real

Excel - Answers a spreadsheet written or tailored to meet specific needs

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
369
Member since
1 year
Number of followers
16
Documents
29812
Last sold
6 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

59 reviews

5
21
4
15
3
12
2
0
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions