INTRODUCTION TO M.I.S. AND DATA
PROCESSING 2025 NEW UPDATE University of
Texas, Arlington
Your answers
1 of 40
Term
Joint Application Design*
Give this one a try later!
In the context of antivirus software, the process of identifying malware based not
on a signature, but on other factors, such as context and behavior.
, (information and communications industry) Companies involved in the
development, production, sales, and support of computers, software,
and telecommunication networks.
Gordon Moore's prediction that technological innovation would double
the number of transistors in an integrated circuit every two years
without raising its cost.
(JAD) A widely accepted design technique that is based on the idea
that the best information systems are designed when end users and
systems analysts work together on a project as equal partners.
Don't know?
2 of 40
Term
Information System
Give this one a try later!
A computer system that collects, stores, and processes
information, usually within the context of an organization.
Law responding to 9/11. Expands anti-terrorist powers (wiretapping,
surveillance); 4th Amendment concern for civil liberties.
, The Electronic Communications Privacy Act (ECPA) is a United States
federal statute that prohibits a third party from intercepting or
disclosing communications without authorization. The Act, which was
originally passed as an amendment to the Wiretap Act of 1968, applies to
both government employees and private citizens. It protects
communications in storage as well as in transit.
A type of malware that spreads over the internet, usually by sending
itself to random ip addresses.
Don't know?
3 of 40
Term
Computer Virus*
Give this one a try later!
A program designed to attach itself to a file, reproduce, destroy
data, display an irritating message, or otherwise disrupt computer
operations.
Programs such as viruses, worms, and bots designed to disrupt
computer operations.
A software program designed to enter a computer system, usually a
network, through security "holes" and then replicate itself and spread to
other devices.