_ are segments of computer code that attach to existing computer programs and
perform malicious acts.
C. Trojan horses
D. back doors
E. alien software
_ are software programs that hide in other computer programs and reveal their
The nature of business competition is changing drastically as a result of all of the
A. new online companies
B. new business models
C. the diversity of EC-related products and services
D. the increase in the number of digitizable product
_ occurs when various copies of the data agree.
A. Data isolation
B. Data integrity
C. Data consistency
D. Data redundancy
E. Application/data dependence
A(n) _ represents a character, such as a letter, number, or symbol.
_ is designed to use your computer as a launch pad for sending unsolicited e-mail
to other computers.
_ is the process in which an organization assesses the value of each asset being
protected, estimates t
_ is a method for analyzing and reducing a relational database to its most
A. Structured query
C. Query by example
E. Relational analysis
When data are normalized, fields/attributes in the table depend only on
_ are applications, delivered over the Internet, that use shared protocols to
interoperate without human intervention.
B. Web services
C. Service-oriented architectures
_ is a protocol that makes it easier to exchange da
Employees in which functional areas of the organization pose particularly grave threats
to information security?
A. human resources, finance
B. human resources, management information systems
C. finance, marketing
D. operations management, management info
In the relational database model, related tables can be joined when they contain
Data dictionaries perform all of the following functions except:
A. Provide information on each record
B. Provide info
In _, a person or a device intentionally or unintentionally interferes with your
wireless network transmissions.
A. RF jamming
B. War driving
D. War chalking
E. Installing rogue access points
Which of the following is not a component of h
The main problem with radio transmission is which of the following?
A. Radio waves cannot travel through walls
B. When you travel too far from the source, the signal fades
C. Devices are difficult to install
D. Radio waves are slow
E. Devices are expensiv