100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BTMA 317 Final Exam Questions With Verified Answers $10.49   Add to cart

Exam (elaborations)

BTMA 317 Final Exam Questions With Verified Answers

 2 views  0 purchase
  • Course
  • Btma
  • Institution
  • Btma

BTMA 317 Final Exam Questions With Verified Answers Three components of IT systems are - answerpeople information and information technology most important component of IT systems - answerpeople Ethics are defined as - answerthe principles and standards that shape our behaviour toward other pe...

[Show more]

Preview 3 out of 17  pages

  • October 16, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Btma
  • Btma
avatar-seller
sirjoel
©SIRJOEL EXAM SOLUTIONS
10/7/2024 11:03AM



BTMA 317 Final Exam Questions With
Verified Answers


Three components of IT systems are - answer✔people information and information technology

most important component of IT systems - answer✔people

Ethics are defined as - answer✔the principles and standards that shape our behaviour toward
other people

2 factors that influence how we decide ethical issues - answer✔our basic ethical structure and the
circumstances surrounding the choice

minor ethical violations - answer✔taking paper clips or browsing youtube at work

serious ethical violations - answer✔reading someone elses emails to manipulate them later

very serious ethical violations - answer✔embezzling money operating a Ponzi scheme directly
harming people

6 components of ethical decision making - answer✔consequence
society's opinion
likelihood of effect
time of consequences
relatedness
reach of result

intellectual property - answer✔is things that people have rights to it is the creators ideas or
immaginations manifested in physical form

copyright - answer✔intellectual property is protected by

, ©SIRJOEL EXAM SOLUTIONS
10/7/2024 11:03AM


fair use doctrine - answer✔states that your IP can be used without your express contsent only if it
is used for teaching purposes or used in the creation of new content

keylogging - answer✔saving keystrokes event data recorders record events with automobiles
which can be leveraged in investigations

identity theft - answer✔includes people stealing your information for financial gain

friendly fraud - answer✔someone that you know takes your information from you very common

Phishing - answer✔is when you are redirected to a website that looks like the one you are trying
to visit for the purpose of stealing your password

spear phishing - answer✔the hackers specifically target you they have parts of your info and
desire more

whaling - answer✔high level execuatives and other high profile people are targeted

Pharming - answer✔you try to visit a website and upon doing so it auto re-directs you to website
to steal your password

monitoring technology - answer✔these things can scan incoming and outgoing emails employers
can track you with keylogger software

cookies - answer✔basic tools of web monitoring they are small files containing information
about you keeps password details also manages storing shopping carts on sites for when you
return next

unique cookies - answer✔track history across websites including what websites you visit

common cookies - answer✔start as unique cookies but are then changed and sold access to third
party where they can be used to track activity across many sites

spam - answer✔is unsolicited email from businesses that deliver goods and services people who
are bad can skirt laws and get past blockers link to unsubscribe but then you are linked on to
more of these emails

adware - answer✔is software that generates ads that installs itself on your computer when you
download something from the internet

Trojan horse software - answer✔something you don't want hidden in a download you do want

spyware - answer✔is a more malicious form of adware that installs itself and then collects your
information and data and gives it to a third party without your consent

, ©SIRJOEL EXAM SOLUTIONS
10/7/2024 11:03AM


web log - answer✔is something given to a specific website when you visit it is usually just a line
of information for every visitor stored usually on webservers provides record of your clickstream

clickstream - answer✔information during your web session about with websites you visited what
ads you looked at

Anonymous web browsing servies - answer✔can hide your information and thus your
clickstream from people who may want to view it

two parties collecting information to their advantages - answer✔NCIC and IRS

employee misconduct - answer✔companies are most likely to lose money as a result of

hackers - answer✔computer users who use their knowledge to invade other peoples computers

Hacktivists - answer✔philosophical or political message hackers

crackers - answer✔hired guns who illegally break into and usually steal information for a fee

White-hat hacker - answer✔good guys who test the vulnerability of systems so that protective
measures can be taken

computer virus - answer✔software that is written with malicious intent to cause annoyance or
damage

worm - answer✔a type of virus that spreads itself not just from file to file but form computer to
computer via email and other internet traffic

Black-hat hackers - answer✔break into peoples computers systems and may just look around
steal credit card info destroy information or otherwise damage

script kiddies - answer✔find hacking code on the internet and click and point their way into
systems to cause damage or spread viruses

cyber terrorists - answer✔cause harm to others or destroy critical systems or information

Denial of service DDos - answer✔attacks flood server with so many requests that it is forced to
shut down and can't handle the requests

three ways to prove access rights - answer✔passwords atm card fingerprint

Biometrics - answer✔is the use of physiological characterisitcs like your finger eye voice to
provide authentication to some services

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller sirjoel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart