CSC 3040 Final

5.0(1)
studied byStudied by 16 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:29 AM on 4/25/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

102 Terms

1
New cards

IEEE

Institute of Electrical and Electronics Engineers

2
New cards

IEEE employs ______________ for in-text citations.

Bracketed Numbers

3
New cards

To reference multiple articles in IEE format it is written as:

[1], [2]

4
New cards

References are always number _____________

In Order of Citation

5
New cards

To cite an image begin the caption with ___________ then provide the word ________ and the reference list entry number in brackets.

Figure 1. Image Title
Source:

6
New cards

If an image is altered at all the citation should begin with:

Altered from

7
New cards

The numbers of ciations on your reference page should be _________ and seperated from the body of the reference by about ______.

Flush against the left margin

5 spaces

8
New cards

What is Research?

A combination of investigation of past work and effort in the present that will help others in the future.

9
New cards

Purpose of Quantitative Research:

Answer “How many/much?” question.

10
New cards

Data type used in Quantitative Research:

Numerical/Statistical Results

11
New cards

What is the approach to Quantitative Research?

Measure & Test (Example: Surveys and Experiments)

12
New cards

What are the sample sizes of Quantitative Research?

Large (typically over 100)

13
New cards

Purpose of Qualitative Research?

Answer “Why?” Question

14
New cards

Data type used in Qualitative Research?

Observation, Symbolic, Words

15
New cards

What is the approach to Qualitative Research?

Observe and Interpret (Example: conduct interviews, watch behavior)

16
New cards

What is the sample size of Qualitative Research?

Small (typically < 20)

17
New cards

What was the Therac-25?

A radiation treatment that resulted in overexposure to radiation due to software faults.

18
New cards

What is the purpose of using Computer Simulations?

To accommodate if something is too large scale, too expensive, or too risky to work with the real system.

19
New cards

Verification of Computer Simulations

The process of determining if the computer program correctly implements the model.

20
New cards

Validation of Computer Simulations

The process of determining if the model is an accurate representation of the real system.

21
New cards

What are the four steps to develop a software product?

Specification, Development, Validation, Evolution

22
New cards

What is specification in relation to Software Development?

Defining the functions to be performed by the software.

23
New cards

What is development in relation to Software Development?

Producing the software that meets the specifications.

24
New cards

What is validation in relation to Software Development?

Testing the software.

25
New cards

What is evolution in relation to Software Development?

Modifying the software to meet the changing needs of the customer.

26
New cards

What are good uses of simulations?

To see the dynamic responses of the system, ensure it does what it’s supposed to, and determine possible problems or errors.

27
New cards

Spam

Unsolicited Bulk Email

28
New cards

Spoofing

An identity theft where a person tries to use the identity of a legitimate user.

29
New cards

Phishing

Fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

30
New cards

Spear Phishing

Fraudulent practice of sending emails seemingly froma known or trusted sender in order to induce targeted individuals to reveal confidential information.

31
New cards

Ransomware

A vicious malware that prevents users from entering their systems and required victims to pay a ransom to unlock files/systems.

32
New cards

Malware

Malicious Software or Files

33
New cards

Internet Trolls

Slang for a person who posts or makes inflammatory, insincere, digressive, extraneous, of off-topic messages online.

34
New cards

Cyberbullying

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

35
New cards

Cyberstalking

The use of the Internet or other electronic means to stalk or harass an individual, group, or organization

36
New cards

Cyber Predators

People who use the internet to exploit usually younger people for sexual and other purposes.

37
New cards

How do identity thieves find victims?

Fake online reviews/websites, looking for personal information in dumpsters, shoulder surfing, and phishing.

38
New cards

Child Internet Protection Act

Requires that libraries receiving federal funds to provide Internet access to its patrons must prevent children from getting access to visual depictions of obscenity and child pornography.

39
New cards

Censorship

The attempt to suppress or regulate public access to material considered offensive or harmful.

40
New cards

Three forms of Direct Censorship

Government Monopolization, Prepublication Review, Licensing and Registration

41
New cards

Self Censorship

Most common form of censorship and it is when a group decides for itself not to publish material.

42
New cards

Characteristics of the Internet that make censorship more difficult.

Internet supports many-to-many communications.

Internet is Dynamic.

Internet is huge.

Internet is global.

Hard to distinguish between children & adults on the internet.

43
New cards

Intellectual Property

Refers to creations of the mind, including inventions, literary/artistic works, and symbols used in commerce.

44
New cards

Trade Secret

A confidential piece of intellectual property that gives a company a competitive advantage.

45
New cards

Defend Trade Secrets Act of 2016

A significant legislation related to trade secrets in the United States.

46
New cards

Trademark

A way for a business to distinguish goods and services from others.

47
New cards

How long does a patent last?

The owner has exclusive rights to the invention for 20 years.

48
New cards

Copyright law grants authors rights to their original works, including the right to:

Reproduction; Distribution; Public Display; Public Performance; Produce Derivative Works.

49
New cards

Works created on or after January 1, 1978 have a copyright term of:

The life of the author plus 70 years after that author’s death

50
New cards

Copyright

Protects original works of authorship, including literature and music.

51
New cards

Patent

Protects inventions, granting exclusive rights to make and sell the invention.

52
New cards

Intellectual property does not include the ________ of property

Physical Formats

53
New cards

Employers usually need to sign a confidentiality agreement to _______________.

Protect Trade Secrets

54
New cards

True or False: Open source software can be sold for profit.

True

55
New cards

Besides for File Sharing what are Peer-to-Peer networks used for?

Data Backup and Storage

Distributed Computing

Online Gaming

56
New cards

What are the consequences for first time offenders of copyright infrengement?

Up to 5 years in prison and fines of up to $250,000 per offfense.

57
New cards

What are the differences between a patent and a trade secret?

Patent: Public domain and only last 20 years.

Trade Secret: Confidential and never have to be disclosed to the public.

58
New cards

What is the difference between open-source software and proprietary software?

Source code of proprietary Software is treated like a trade secret. There are no restrictions on modifying and reselling open-source software.

59
New cards

Fair use

The doctrine that allows copyrighted material to be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.

60
New cards

Creative Commons

An international nonprofit organization that is devoted to educational access and expanding the range of creative works available for others to build upon and legally share.

61
New cards

Harms of Privacy

Illegal or immoral activities can occur under the cover of privacy.

Privacy in dysfunctional families can result in more harm.

An abundance of privacy may be a curse (ex: solitary confinement)

62
New cards

Benefits of Privacy

Allows people to focus their thoughts without interruption, be creative, grow spiritually.

63
New cards

Driver’s Privacy Protection Act (DPPA)

Protect the privacy of personal information assembly by State Department of Motor Vehicles by prohibiting the release or use by any state DMB of PI about an individual obtained by the department.

64
New cards

Fair Debt Collection Practices Act

A consumer protection amendment, establishing legal protection from abusive debt collection practices.

65
New cards

Fair & Accurate Credit Transactions Act (FACTA)

An amendment to the FCPA that allows consumers to request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies via AnnualCreditReport.com

66
New cards

Fair Credit Reporting Act (FCRA)

Enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies. It was intended to shield consumers from the willful and/or negligent inclusion of erroneous data in their credit reports.

67
New cards

Clarifying Lawful Overseas Use of Data Act (CLOUD Act)

Primarily amends the SCA of 1986 to allow federal law enforcement to force US Based technology companies via warrant or subpoena to provide requested data stored on servers regardless of whether the data is stored in the US or on foreign soil.

68
New cards

Privacy Act of 1974

Establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in system of records by federal agencies.

69
New cards

Children’s Online Privacy Protection Act (COPPA)

Designed to reduce the amount of information gathered from children using the internet.

70
New cards

Computer Fraud and Abuse Act (CFAA)

US cybersecurity bill that was enacted as an amendment to existing computer fraud law which has been included in the Comprehensive Crime Control Act of 1984

71
New cards

Family Educational Rights and Privacy Act (FERPA)

A law that governs the access to educational information and records by publicly funded educational institutions and foreign governments.

72
New cards

General Data Protection Regulation (GDPR)

The acts Primary aim is to enhance individual’s control and rights over their personal data and to simplify the regulatory environment for international business.

73
New cards

Right to Financial Privacy Act

Establishes specific procedures that federal government authorities must follow in order to obtain information from a financial institution about a customer’s financial records.

74
New cards

Information Technology Management Reform

The purpose is to improve the way the federal government acquires, uses, and disposes information technology (IT). IT with respect to an executive agency is defined in this act as any equipment or system that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency.

75
New cards

Communication Assistance for Law Enforcement Act

A US wiretapping law that requires phone companies to design or be able to modify networking equipment so that law enforcement agencies can trace calls, listen in on telephone calls, and intercept email messages.

76
New cards

Patriot Act

Was enacted following the 9/11 attacks and the 2001 anthrax attacks with the stated goal of dramatically tightening US national security, especially foreign terrorism.

77
New cards

Computer matching and Privacy Protection Act (CMPPA)

Requires Federal agencies to enter into written agreements with other agencies or non-Federal entities before disclosing records for use in computer matching programs.

78
New cards

Electronic Communications Privacy Act (ECPA)

Allows police to attach two kinds of surveillance devices to a suspect’s phone line. If the suspect gets a phone call, a trap-and-trace device displays the caller’s phone number.

79
New cards

Health Insurance Portability & Accountability Act (HIPPA)

A US federal statute that modernized the flow of healthcare information, stipulating how personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft.

80
New cards

Employee Polygraph Protection Act (EPPA)

Prohibits most private employers from using lie detector tests in most situations.

81
New cards

E-Government Act

United States statue with the purpose of improving the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer of the United States within the Office of Management and Budget and by establishing a framework of measures that require using internet-based information technology to improve citizen access to government information and services.

82
New cards

Telecommunications Act

Authorizes the Federal Communications Commission to impose restrictions on telecommunications carriers regarding the access, use, and disclosure of customer information.

83
New cards

RFID Tags

A tiny wireless transmitter that can be scanned to give additional information.

84
New cards

Cookies

A file placed on your computer’s hard drive by a web server that contains information about your visits to a Web site.

85
New cards

Implanted Microchip

An electronic device the size of a grain of rice that can be placed in animals to identify owner & residence.

86
New cards

Public Records

information about an incident or action reported to a government agency for the purpose of informing the public.

87
New cards

Automobile Black Boxes

A microprocessor attached to the car that records information about the speed of the car, the amount of pressure being put on the brake pedal, and whether the seat belts are connected.

88
New cards

Malware

Malicious Software

89
New cards

Trojan Horse

A malicious computer program designed to deceive users by concealing a sinister purpose behind a benign capability.

90
New cards

Bot

A particular kind of backdoor Trojan that responds to commands sent by a command-and-control program located on an external computer.

91
New cards

Drive-by downlaod

When a user visits a compromised website, and it results in unintentional downloading of software.

92
New cards

Virus

A piece of self-replicating code embedded within another program called the host

93
New cards

Cross-site scripting

Where an attacker injects a client-side script into a website and when a user visits the site, the user’s browser executes the script, which may steal cookies, track the user’s activity, or perform another malicious action.

94
New cards

Ransomware

Malware designed to extort money from the victim of the attack.

95
New cards

Spear phishing

When the attacker selects email addresses that target a particular group of recipients or even on particular person in an effort to gain sensitive information.

96
New cards

Worm

A self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

97
New cards

Spyware

A program that communicates over an internet connection without the user’s knowledge or consent.

98
New cards

BotNet

A colleciton o fbot-infected computers.

99
New cards

Bot Herder

A person who controls a botnet.

100
New cards

SQL Injection

A method of inserting an SQL query into a text string from a web client to the web application in order to trick the application into returning sensitive information.

Explore top flashcards

Set 1 (Fall Comp 1)
Updated 905d ago
flashcards Flashcards (25)
B1.1 Lipids
Updated 868d ago
flashcards Flashcards (32)
Ekologija
Updated 445d ago
flashcards Flashcards (104)
MGMT 105 Final
Updated 1173d ago
flashcards Flashcards (228)
Microbio Exam 5
Updated 803d ago
flashcards Flashcards (321)
Genetics
Updated 1045d ago
flashcards Flashcards (23)
Set 1 (Fall Comp 1)
Updated 905d ago
flashcards Flashcards (25)
B1.1 Lipids
Updated 868d ago
flashcards Flashcards (32)
Ekologija
Updated 445d ago
flashcards Flashcards (104)
MGMT 105 Final
Updated 1173d ago
flashcards Flashcards (228)
Microbio Exam 5
Updated 803d ago
flashcards Flashcards (321)
Genetics
Updated 1045d ago
flashcards Flashcards (23)