The international exchange of goods and services
What is the global economy?
Someone who votes
What is a voter?
Software that secretly monitors and collects info. from a user's device without them knowing
What is spyware?
Malicious software designed to damage computer systems, steal data, or disrupt operations
What is malware?
The school was infected with malware, or ____, that locked all information and required a payment to unlock it.
What is ransomware?
Responsible for following trading rules and providing goods or services
Who are sellers?
Facts and statistics collected together for reference or analysis
What is data?
A weakness in a system that can be exploited by an attacker
What is a vulnerability?
A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
What is a firewall?
The company used _____ to protect its sensitive material by replacing that data with a convincing fake.
What is data masking?
The products and actions exchanged for money in an economy
What are goods and services?
Data that is fed into a program to be processed
What is input?
A secret word or phrase that must be used to gain admission to something
What is a password?
Responsible for following trading rules and purchasing goods or services
Who are buyers?
The school board had too much _____ to go through, so they had to parameters for what they wanted to see.
What is data?
Not having any sort of real contact with other countries
What is isolationism?
Data that is produced by a program for the user or by another program
What is output?
Information that should be kept private, such as: names, addresses, Social Security numbers, etc.
What is personal information?
Record keeping and making sure the country is on track with achieving its goals
Who is a Government regulator?
Being allowed to trade with anyone is known as _____.
What is free trade?
Being allowed to trade with anyone
What is free trade?
A special value that is used to further define the action of a function
What is a parameter?
Where attackers trick victims into revealing sensitive info. about themselves by pretending to be trusted people
What is phishing?
Computing devices and skills used in production or investigation; and the application of knowledge to the practical aims of the human environment.
What is technology?
An example of _____ would be using a laptop to Google Search this answer.
What is technology?