D217 AIS SET2, (ANswered) Complete Verified Solution Graded A+
D217 AIS SET2 The domain address of a web page is the equivalent of its universal rescue locator (URL) True XBRL allows users to extract and compare financial data from many different companies HTML tags describe how data and graphics should be presented by a web browser EDI automates the exchange of business information, particularly with respect to source documents True Data encryption renders a text message unreadable during data transmission, even if intercepted Public key transcription requires the use of a pair of public/ private encryption keys True Digital signatures can never be as secure as written signatures False 3 types of access security are What you have What you know Who you are Phishing use of web pages or other means to trick viewer into revealing their passwords or other personal information True Click Fraud inflating the number of uses of a link to an alternate website DES an encryption standard used by the US government EDI the exchange of electronic documents such as contracts HTML the makeup language typically used to display web pages in a web browser Phishing an activity designed to steal a person's financial identity Proxy Server a local area network file server typically devoted to providing Internet service TCP/ IP a transmission protocol used to send email messages sent over the Internet VPN a secure method of transmitting messages cheaply over existing Internet connections VoIP a transmission protocol enabling users to send voice-grade messages over the internet According to the chapter, a computer virus is an example of a type of cybercrime called "denial of service" False Many types of cybercrime have other, more common names such as "vandalism" and "embezzlement" True The US Congress passed the first federal computer crime law in 1986 making it illegal to alter or destroy federal information True We believe that most cybercrime is not discovered True Worm programs are viruses that insert themselves into computer systems and disrupt operations or files True A computer virus may lie dormant in a system until software is copied and run on non-licensed machines True Lockout systems disconnect telephone connections if users fail to provide a correct password in a set number of tries True ACL auditing software used to test computer data CSI acronym for security institute that studies computer crime activities EnCase software program specifically designed for computer forensic investigations Salami Technique type of fraud where perpetrator steals a small amount from many different accounts Worm malicious software similar to a computer virus The data field that distinguishes one computer record from another on a computer file is called the primary record key True For a file of employee workers, it would make more sense to use their last name as a primary key rather than the SS number False A foreign key is a data field in the records of one file that references a primary key in the records of another file True 3 database concerns when creating large databases data integrity processing accuracy data security Data dictionary computer file describing the data items of an accounting database Transaction control requirement that a database system either processes a transaction entirely or not at all An example of a transitive relationship in a parking-tickets application is the one between "ticket code" and "fine amount"
Geschreven voor
- Instelling
- D217 AIS SET2
- Vak
- D217 AIS SET2
Documentinformatie
- Geüpload op
- 13 februari 2023
- Aantal pagina's
- 95
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
d217 ais set2 the domain address of a web page is the equivalent of its universal rescue locator url true xbrl allows users to extract and compare financial data from many different companies html t