This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
163. If you're traveling through Philadelphia on your way to Acadia National Park in the state
of Maine, you can use your smartphone to make a room reservation and also find a place to eat,
without talking with another person. Your phone is equipped with ____________________ to serve
your needs.
164. __________ is a process that allows software-based networked computers to run multiple
operating systems and programs, and share storage.
165. ________ is a form of virtualization in which a company's data and applications are stored
offsite.
166. The three types of cloud computing are:
167. Rob has been using Dropbox. The cloud he is storing his information to is called a:
168. One of the most revolutionary impacts computer technology has had on business has
been to:
169. Employees of a business ____________ when they work at home, using computers linked
to their organization's office.
170. A(n) _______ is someone who breaks into a computer system for illegal purposes.
171. A computer ________ is a piece of programming code that is inserted into other
programming to cause an unexpected and often-undesirable event for the victim.
172. When it comes to computers and information technology, government and corporate
security officials are now most worried about:
173. The _____________ was created as a part of the Office of Homeland Security and given
the responsibility to devise a plan for improving the security of America's critical infrastructure.
174. A _________ is a small piece of software code a website downloads onto the hard drives
of people who visit the site.
175. Instability in technology:
176. Which of the following is an advantage of telecommuting?
177. Which of the following statements about computer viruses is most accurate?
178. Which of the following issues is least likely to be a concern when a company uses a
network computer system?
179. The ability of the Critical Infrastructure Protection Board to achieve its mission depends
crucially on:
180. Jason Hart was recently informed by his bank that someone illegally broke into the bank's
computer system and gained access to information about customer account numbers and ATM
access codes. The bank is recommending that Jason and other customers change their account
numbers and access numbers for security reasons. The bank and Jason are victims of a:
181. Although Tucker Lentz has used a computer for several years, he has never worried about
computer viruses. However, a computer-savvy friend recently told him that a new wave of viruses
has been reported. Tucker is wondering whether he should pay more attention to this threat, and
if so, what he can do to protect his computer. Which of the following represents the best advice
for Tucker?
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.