Chapter 14: The Personal and Social Impact of Computers31. Which of the following is a useful policy to minimize waste and mistakes?a.Changes to HTML and URLs should be documented and authorized by end users.b.System report titles should be as brief as possible and should simply indicate the report number.c.Users should implement proper procedures to ensure correct input data.d.Tight control should be avoided over critical tables.
32. The Internet Crime Computer Center (IC3) is an alliance between ______.
Get answer to your question and much more
33. The LeadsOnline Web-based service system is one of several information systems used by law enforcementto _____.
Get answer to your question and much more
34. A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computersystems to steal passwords, corrupt files or programs, or even transfer money.
Get answer to your question and much more
35. _____ have extra knowledge that make them especially dangerous—they know logon IDs, passwords, andcompany procedures that help them evade detection.a.Crackersb.Hackersc.Insidersd.Script bunnies
36. _____ is a type of malware that executes when specific conditions occur.
Get answer to your question and much more
37. _____ is a set of programs that enables its user to gain administrator level access to a computer or network.Worm
Get answer to your question and much more
38. A _____ is a small program hidden in a network or computer system that records identification numbers.
Get answer to your question and much more
39. _____ refers to the use of any of several technologies to enforce policies for controlling access to digitalmedia, such as movies, music, and software.a.Copyright protectionb.Software protection donglec.Software piracyd.Digital rights management