100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CSIT 120 Final Exam Questions and Answers Fully Solved

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
31-01-2025
Escrito en
2024/2025

CSIT 120 Final Exam Questions and Answers Fully Solved Information Technology (IT) - Answers The study or use of systems for storing, retrieving, and sending information Cybercrime - Answers A criminal act committed primarily through the use of a computer system Phishing - Answers Sending emails to lure people into revealing their personal information or to take an action Hacking - Answers unauthorized access, modification, or use of an electronic device or some element of a computer system Social Networking - Answers process by which we make connections with others social media - Answers online tools and sites that allow netoworking Cloud Storage - Answers allows you to save files in storage and then access them on the Cloud Cloud Computing - Answers is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand intellectual property - Answers an idea, invention, or process that derives from the work of the mind or intellect copyright - Answers protection given to the creator of songs, computer programs, books, and other creative works copyright infringement - Answers When a copyrighted work is reproduced, distributed, performed, or publicly displayed work without the permission of copyright owner patent - Answers creates protection for someone who invents a new product or process Trademark - Answers a word, phrase, logo, shape or sound that identifies a source of goods or services that must be protected by an organization Digital Rights Management - Answers a strategy designed to prevent illegal distribution of movies, music, and other digital content public domain - Answers A work of authorship that is not under copyright protection and can be used freely without permission plagarism - Answers taking someones ideas or writing and offering them as your own digital divide - Answers The gap between those who have access to the Internet and technology and those who do not mobile commerce - Answers The process of buying, selling, or exchanging products, services, or information via phone E-commerce (electronic commerce) - Answers The process of buying, selling, or exchanging products, services, or information via internet black hat hackers - Answers A hacker that breaks into a system for malicious reasons white hat hackers - Answers A person who hacks into a system for non-malicious purposes Denial of service attack - Answers attack which a botnet overwhelms websites, mail servers, or other internet locations and a user cannot access the site Spam - Answers irrelevant or inappropriate messages sent on the Internet to a large number of recipients malware - Answers malicious software Spyware - Answers malware that can monitor and record user activities computer cookies - Answers A text file which a website can store on its visitors' hard drives. Can remember passwords, tracks number of visitors identity theft - Answers when a criminal or group uses the identity of unknown person Social Engineering - Answers manipulation of people into releasing information or performing a task that violates security protocols virus - Answers software that attaches or adds itself to other software; can replicate itself anti-virus software - Answers a program that finds and removes viruses from a computer Passwords - Answers a method of controlling access to confidential patient information. Choose strong passwords, change passwords periodically, do not use the same password for multiple purposes privacy policy - Answers Document that tells how personal data collected by a company will be used artificial intelligence - Answers the branch of computer science that attempts to develop computers that mimic human thought and behavior virtual reality - Answers Illusion of reality through the use of software and perception changing devices Augmented reality - Answers the combination of a "real" objects overlaid with data, images, etc. that are not real Excel - Answers a spreadsheet written or tailored to meet specific needs excel cell - Answers A box formed by the intersection of a row and column in a worksheet or a table, in which you enter information. excel active cell - Answers The selected cell in which data is entered when you begin

Mostrar más Leer menos
Institución
CSIT 120
Grado
CSIT 120









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CSIT 120
Grado
CSIT 120

Información del documento

Subido en
31 de enero de 2025
Número de páginas
7
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CSIT 120 Final Exam Questions and Answers Fully Solved

Information Technology (IT) - Answers The study or use of systems for storing, retrieving, and sending
information

Cybercrime - Answers A criminal act committed primarily through the use of a computer system

Phishing - Answers Sending emails to lure people into revealing their personal information or to take an
action

Hacking - Answers unauthorized access, modification, or use of an electronic device or some element of
a computer system

Social Networking - Answers process by which we make connections with others

social media - Answers online tools and sites that allow netoworking

Cloud Storage - Answers allows you to save files in storage and then access them on the Cloud

Cloud Computing - Answers is a type of Internet-based computing that provides shared computer
processing resources and data to computers and other devices on demand

intellectual property - Answers an idea, invention, or process that derives from the work of the mind or
intellect

copyright - Answers protection given to the creator of songs, computer programs, books, and other
creative works

copyright infringement - Answers When a copyrighted work is reproduced, distributed, performed, or
publicly displayed work without the permission of copyright owner

patent - Answers creates protection for someone who invents a new product or process

Trademark - Answers a word, phrase, logo, shape or sound that identifies a source of goods or services
that must be protected by an organization

Digital Rights Management - Answers a strategy designed to prevent illegal distribution of movies,
music, and other digital content

public domain - Answers A work of authorship that is not under copyright protection and can be used
freely without permission

plagarism - Answers taking someones ideas or writing and offering them as your own

digital divide - Answers The gap between those who have access to the Internet and technology and
those who do not

, mobile commerce - Answers The process of buying, selling, or exchanging products, services, or
information via phone

E-commerce (electronic commerce) - Answers The process of buying, selling, or exchanging products,
services, or information via internet

black hat hackers - Answers A hacker that breaks into a system for malicious reasons

white hat hackers - Answers A person who hacks into a system for non-malicious purposes

Denial of service attack - Answers attack which a botnet overwhelms websites, mail servers, or other
internet locations and a user cannot access the site

Spam - Answers irrelevant or inappropriate messages sent on the Internet to a large number of
recipients

malware - Answers malicious software

Spyware - Answers malware that can monitor and record user activities

computer cookies - Answers A text file which a website can store on its visitors' hard drives. Can
remember passwords, tracks number of visitors

identity theft - Answers when a criminal or group uses the identity of unknown person

Social Engineering - Answers manipulation of people into releasing information or performing a task that
violates security protocols

virus - Answers software that attaches or adds itself to other software; can replicate itself

anti-virus software - Answers a program that finds and removes viruses from a computer

Passwords - Answers a method of controlling access to confidential patient information.

Choose strong passwords, change passwords periodically, do not use the same password for multiple
purposes

privacy policy - Answers Document that tells how personal data collected by a company will be used

artificial intelligence - Answers the branch of computer science that attempts to develop computers that
mimic human thought and behavior

virtual reality - Answers Illusion of reality through the use of software and perception changing devices

Augmented reality - Answers the combination of a "real" objects overlaid with data, images, etc. that
are not real

Excel - Answers a spreadsheet written or tailored to meet specific needs
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorJosh Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
369
Miembro desde
1 año
Número de seguidores
16
Documentos
29812
Última venta
5 horas hace
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

59 reseñas

5
21
4
15
3
12
2
0
1
11

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes