Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CSIT 120 Final Exam with complete solution

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
17-11-2023
Written in
2023/2024

CSIT 120 Final Exam with complete solution Information Technology (IT) The study or use of systems for storing, retrieving, and sending information Cybercrime A criminal act committed primarily through the use of a computer system Phishing Sending emails to lure people into revealing their personal information or to take an action Hacking unauthorized access, modification, or use of an electronic device or some element of a computer system Social Networking process by which we make connections with others social media online tools and sites that allow netoworking Cloud Storage allows you to save files in storage and then access them on the Cloud Cloud Computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand intellectual property an idea, invention, or process that derives from the work of the mind or intellect copyright protection given to the creator of songs, computer programs, books, and other creative works copyright infringement When a copyrighted work is reproduced, distributed, performed, or publicly displayed work without the permission of copyright owner patent creates protection for someone who invents a new product or process Trademark a word, phrase, logo, shape or sound that identifies a source of goods or services that must be protected by an organization Digital Rights Management a strategy designed to prevent illegal distribution of movies, music, and other digital content public domain A work of authorship that is not under copyright protection and can be used freely without permission plagarism taking someones ideas or writing and offering them as your own digital divide The gap between those who have access to the Internet and technology and those who do not mobile commerce

Show more Read less
Institution
Course

Content preview

CSIT 120 Final Exam with complete solution
Information Technology (IT)
The study or use of systems for storing, retrieving, and sending information
Cybercrime
A criminal act committed primarily through the use of a computer system
Phishing
Sending emails to lure people into revealing their personal information or to take an
action
Hacking
unauthorized access, modification, or use of an electronic device or some element of a
computer system
Social Networking
process by which we make connections with others
social media
online tools and sites that allow netoworking
Cloud Storage
allows you to save files in storage and then access them on the Cloud
Cloud Computing
is a type of Internet-based computing that provides shared computer processing
resources and data to computers and other devices on demand
intellectual property
an idea, invention, or process that derives from the work of the mind or intellect
copyright
protection given to the creator of songs, computer programs, books, and other creative
works
copyright infringement
When a copyrighted work is reproduced, distributed, performed, or publicly displayed
work without the permission of copyright owner
patent
creates protection for someone who invents a new product or process
Trademark
a word, phrase, logo, shape or sound that identifies a source of goods or services that
must be protected by an organization
Digital Rights Management
a strategy designed to prevent illegal distribution of movies, music, and other digital
content
public domain
A work of authorship that is not under copyright protection and can be used freely
without permission
plagarism
taking someones ideas or writing and offering them as your own
digital divide
The gap between those who have access to the Internet and technology and those who
do not
mobile commerce

, The process of buying, selling, or exchanging products, services, or information via
phone
E-commerce (electronic commerce)
The process of buying, selling, or exchanging products, services, or information via
internet
black hat hackers
A hacker that breaks into a system for malicious reasons
white hat hackers
A person who hacks into a system for non-malicious purposes
Denial of service attack
attack which a botnet overwhelms websites, mail servers, or other internet locations and
a user cannot access the site
Spam
irrelevant or inappropriate messages sent on the Internet to a large number of recipients
malware
malicious software
Spyware
malware that can monitor and record user activities
computer cookies
A text file which a website can store on its visitors' hard drives. Can remember
passwords, tracks number of visitors
identity theft
when a criminal or group uses the identity of unknown person
Social Engineering
manipulation of people into releasing information or performing a task that violates
security protocols
virus
software that attaches or adds itself to other software; can replicate itself
anti-virus software
a program that finds and removes viruses from a computer
Passwords
a method of controlling access to confidential patient information.
Choose strong passwords, change passwords periodically, do not use the same
password for multiple purposes
privacy policy
Document that tells how personal data collected by a company will be used
artificial intelligence
the branch of computer science that attempts to develop computers that mimic human
thought and behavior
virtual reality
Illusion of reality through the use of software and perception changing devices
Augmented reality
the combination of a "real" objects overlaid with data, images, etc. that are not real
Excel
a spreadsheet written or tailored to meet specific needs
excel cell

Written for

Course

Document information

Uploaded on
November 17, 2023
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
joneskioko10

Get to know the seller

Seller avatar
joneskioko10 Arizona State University
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
2 year
Number of followers
5
Documents
646
Last sold
1 year ago
streak

TIGHT DEADLINE? I CAN HELP Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions