Name 1 of the Common Human Error's
1. Carelessness with Laptops
2. Carelessness with Computing Devices
3. Opening Questionable E-mail
4. Careless Internet Surfing
5. Poor Password Selection and Use
Name 1 of the 3 things that Database Management Systems Maximize
1. Data Security
2. Data Integrity
3. Data Independence
What is 1 of the 2 Network Protocols
1. Ethernet
2. Transmission Control Protocol/Internet Protocol (TCP/IP)
What is 1 of the 2 Unintentional Threats to Information Systems
1. Human Errors
2. Social Engineering
What is 1 of the 3 Main Problems that Database Management Systems Minimize
1. Data Redundancy
2. Data Isolation
3. Data Inconsistency
What are the 2 Basic Concepts of Network Fundamentals
1. Digital Signals
2. Modem or Modulator-demodulator
Name 1 of the Five Factors Contributing to Vulnerability
1. Today's interconnected, interdependent, wirelessly networked business environment
2. Smaller, faster, cheaper computers & storage devices
3. Decreasing skills necessary to be a computer hacker
4. International organized crime taking over cybercrime
5. Lack of management support
Name 1 of the 5 Difficulties in Managing Data
1. Data increases exponentially with time
2. Multiple sources of data
3. Data rot, or data degradation
4. Data security, quality, and integrity
5. Government Regulation
What is 1 of the 2 Types of Network Processing
1. Client/server computing
2. Peer -to-peer Processing (P2P)
Name the 4 Software Attacks that require User Action
1. Virus
2. Worm
3. Phishing Attack
4. Spear Phishing Attack
What are the 3 Sources of Data
1. Internal Sources
2. Personal Sources
3. External Sources
What are 2 of the 4 Layers of the TCP/IP Reference Model
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Interface Layer
What are the 4 Alien Softwares
1. Adware
2. Spyware
3. Spamware
4. Cookies
Name the Data Hierarchy
1. Bit
2. Byte
3. Field
4. Data File or Table
5. Database
What are the 3 ways of Accessing the Internet
1. Connecting via an Online Service
2. Connecting via Other Means
3. Addresses on the Internet