CSC 3040 Final

studied byStudied by 16 people
5.0(1)
Get a hint
Hint

IEEE

1 / 101

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

102 Terms

1

IEEE

Institute of Electrical and Electronics Engineers

New cards
2

IEEE employs ______________ for in-text citations.

Bracketed Numbers

New cards
3

To reference multiple articles in IEE format it is written as:

[1], [2]

New cards
4

References are always number _____________

In Order of Citation

New cards
5

To cite an image begin the caption with ___________ then provide the word ________ and the reference list entry number in brackets.

Figure 1. Image Title
Source:

New cards
6

If an image is altered at all the citation should begin with:

Altered from

New cards
7

The numbers of ciations on your reference page should be _________ and seperated from the body of the reference by about ______.

Flush against the left margin

5 spaces

New cards
8

What is Research?

A combination of investigation of past work and effort in the present that will help others in the future.

New cards
9

Purpose of Quantitative Research:

Answer “How many/much?” question.

New cards
10

Data type used in Quantitative Research:

Numerical/Statistical Results

New cards
11

What is the approach to Quantitative Research?

Measure & Test (Example: Surveys and Experiments)

New cards
12

What are the sample sizes of Quantitative Research?

Large (typically over 100)

New cards
13

Purpose of Qualitative Research?

Answer “Why?” Question

New cards
14

Data type used in Qualitative Research?

Observation, Symbolic, Words

New cards
15

What is the approach to Qualitative Research?

Observe and Interpret (Example: conduct interviews, watch behavior)

New cards
16

What is the sample size of Qualitative Research?

Small (typically < 20)

New cards
17

What was the Therac-25?

A radiation treatment that resulted in overexposure to radiation due to software faults.

New cards
18

What is the purpose of using Computer Simulations?

To accommodate if something is too large scale, too expensive, or too risky to work with the real system.

New cards
19

Verification of Computer Simulations

The process of determining if the computer program correctly implements the model.

New cards
20

Validation of Computer Simulations

The process of determining if the model is an accurate representation of the real system.

New cards
21

What are the four steps to develop a software product?

Specification, Development, Validation, Evolution

New cards
22

What is specification in relation to Software Development?

Defining the functions to be performed by the software.

New cards
23

What is development in relation to Software Development?

Producing the software that meets the specifications.

New cards
24

What is validation in relation to Software Development?

Testing the software.

New cards
25

What is evolution in relation to Software Development?

Modifying the software to meet the changing needs of the customer.

New cards
26

What are good uses of simulations?

To see the dynamic responses of the system, ensure it does what it’s supposed to, and determine possible problems or errors.

New cards
27

Spam

Unsolicited Bulk Email

New cards
28

Spoofing

An identity theft where a person tries to use the identity of a legitimate user.

New cards
29

Phishing

Fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

New cards
30

Spear Phishing

Fraudulent practice of sending emails seemingly froma known or trusted sender in order to induce targeted individuals to reveal confidential information.

New cards
31

Ransomware

A vicious malware that prevents users from entering their systems and required victims to pay a ransom to unlock files/systems.

New cards
32

Malware

Malicious Software or Files

New cards
33

Internet Trolls

Slang for a person who posts or makes inflammatory, insincere, digressive, extraneous, of off-topic messages online.

New cards
34

Cyberbullying

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

New cards
35

Cyberstalking

The use of the Internet or other electronic means to stalk or harass an individual, group, or organization

New cards
36

Cyber Predators

People who use the internet to exploit usually younger people for sexual and other purposes.

New cards
37

How do identity thieves find victims?

Fake online reviews/websites, looking for personal information in dumpsters, shoulder surfing, and phishing.

New cards
38

Child Internet Protection Act

Requires that libraries receiving federal funds to provide Internet access to its patrons must prevent children from getting access to visual depictions of obscenity and child pornography.

New cards
39

Censorship

The attempt to suppress or regulate public access to material considered offensive or harmful.

New cards
40

Three forms of Direct Censorship

Government Monopolization, Prepublication Review, Licensing and Registration

New cards
41

Self Censorship

Most common form of censorship and it is when a group decides for itself not to publish material.

New cards
42

Characteristics of the Internet that make censorship more difficult.

Internet supports many-to-many communications.

Internet is Dynamic.

Internet is huge.

Internet is global.

Hard to distinguish between children & adults on the internet.

New cards
43

Intellectual Property

Refers to creations of the mind, including inventions, literary/artistic works, and symbols used in commerce.

New cards
44

Trade Secret

A confidential piece of intellectual property that gives a company a competitive advantage.

New cards
45

Defend Trade Secrets Act of 2016

A significant legislation related to trade secrets in the United States.

New cards
46

Trademark

A way for a business to distinguish goods and services from others.

New cards
47

How long does a patent last?

The owner has exclusive rights to the invention for 20 years.

New cards
48

Copyright law grants authors rights to their original works, including the right to:

Reproduction; Distribution; Public Display; Public Performance; Produce Derivative Works.

New cards
49

Works created on or after January 1, 1978 have a copyright term of:

The life of the author plus 70 years after that author’s death

New cards
50

Copyright

Protects original works of authorship, including literature and music.

New cards
51

Patent

Protects inventions, granting exclusive rights to make and sell the invention.

New cards
52

Intellectual property does not include the ________ of property

Physical Formats

New cards
53

Employers usually need to sign a confidentiality agreement to _______________.

Protect Trade Secrets

New cards
54

True or False: Open source software can be sold for profit.

True

New cards
55

Besides for File Sharing what are Peer-to-Peer networks used for?

Data Backup and Storage

Distributed Computing

Online Gaming

New cards
56

What are the consequences for first time offenders of copyright infrengement?

Up to 5 years in prison and fines of up to $250,000 per offfense.

New cards
57

What are the differences between a patent and a trade secret?

Patent: Public domain and only last 20 years.

Trade Secret: Confidential and never have to be disclosed to the public.

New cards
58

What is the difference between open-source software and proprietary software?

Source code of proprietary Software is treated like a trade secret. There are no restrictions on modifying and reselling open-source software.

New cards
59

Fair use

The doctrine that allows copyrighted material to be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.

New cards
60

Creative Commons

An international nonprofit organization that is devoted to educational access and expanding the range of creative works available for others to build upon and legally share.

New cards
61

Harms of Privacy

Illegal or immoral activities can occur under the cover of privacy.

Privacy in dysfunctional families can result in more harm.

An abundance of privacy may be a curse (ex: solitary confinement)

New cards
62

Benefits of Privacy

Allows people to focus their thoughts without interruption, be creative, grow spiritually.

New cards
63

Driver’s Privacy Protection Act (DPPA)

Protect the privacy of personal information assembly by State Department of Motor Vehicles by prohibiting the release or use by any state DMB of PI about an individual obtained by the department.

New cards
64

Fair Debt Collection Practices Act

A consumer protection amendment, establishing legal protection from abusive debt collection practices.

New cards
65

Fair & Accurate Credit Transactions Act (FACTA)

An amendment to the FCPA that allows consumers to request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies via AnnualCreditReport.com

New cards
66

Fair Credit Reporting Act (FCRA)

Enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies. It was intended to shield consumers from the willful and/or negligent inclusion of erroneous data in their credit reports.

New cards
67

Clarifying Lawful Overseas Use of Data Act (CLOUD Act)

Primarily amends the SCA of 1986 to allow federal law enforcement to force US Based technology companies via warrant or subpoena to provide requested data stored on servers regardless of whether the data is stored in the US or on foreign soil.

New cards
68

Privacy Act of 1974

Establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in system of records by federal agencies.

New cards
69

Children’s Online Privacy Protection Act (COPPA)

Designed to reduce the amount of information gathered from children using the internet.

New cards
70

Computer Fraud and Abuse Act (CFAA)

US cybersecurity bill that was enacted as an amendment to existing computer fraud law which has been included in the Comprehensive Crime Control Act of 1984

New cards
71

Family Educational Rights and Privacy Act (FERPA)

A law that governs the access to educational information and records by publicly funded educational institutions and foreign governments.

New cards
72

General Data Protection Regulation (GDPR)

The acts Primary aim is to enhance individual’s control and rights over their personal data and to simplify the regulatory environment for international business.

New cards
73

Right to Financial Privacy Act

Establishes specific procedures that federal government authorities must follow in order to obtain information from a financial institution about a customer’s financial records.

New cards
74

Information Technology Management Reform

The purpose is to improve the way the federal government acquires, uses, and disposes information technology (IT). IT with respect to an executive agency is defined in this act as any equipment or system that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency.

New cards
75

Communication Assistance for Law Enforcement Act

A US wiretapping law that requires phone companies to design or be able to modify networking equipment so that law enforcement agencies can trace calls, listen in on telephone calls, and intercept email messages.

New cards
76

Patriot Act

Was enacted following the 9/11 attacks and the 2001 anthrax attacks with the stated goal of dramatically tightening US national security, especially foreign terrorism.

New cards
77

Computer matching and Privacy Protection Act (CMPPA)

Requires Federal agencies to enter into written agreements with other agencies or non-Federal entities before disclosing records for use in computer matching programs.

New cards
78

Electronic Communications Privacy Act (ECPA)

Allows police to attach two kinds of surveillance devices to a suspect’s phone line. If the suspect gets a phone call, a trap-and-trace device displays the caller’s phone number.

New cards
79

Health Insurance Portability & Accountability Act (HIPPA)

A US federal statute that modernized the flow of healthcare information, stipulating how personally identifiable information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft.

New cards
80

Employee Polygraph Protection Act (EPPA)

Prohibits most private employers from using lie detector tests in most situations.

New cards
81

E-Government Act

United States statue with the purpose of improving the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer of the United States within the Office of Management and Budget and by establishing a framework of measures that require using internet-based information technology to improve citizen access to government information and services.

New cards
82

Telecommunications Act

Authorizes the Federal Communications Commission to impose restrictions on telecommunications carriers regarding the access, use, and disclosure of customer information.

New cards
83

RFID Tags

A tiny wireless transmitter that can be scanned to give additional information.

New cards
84

Cookies

A file placed on your computer’s hard drive by a web server that contains information about your visits to a Web site.

New cards
85

Implanted Microchip

An electronic device the size of a grain of rice that can be placed in animals to identify owner & residence.

New cards
86

Public Records

information about an incident or action reported to a government agency for the purpose of informing the public.

New cards
87

Automobile Black Boxes

A microprocessor attached to the car that records information about the speed of the car, the amount of pressure being put on the brake pedal, and whether the seat belts are connected.

New cards
88

Malware

Malicious Software

New cards
89

Trojan Horse

A malicious computer program designed to deceive users by concealing a sinister purpose behind a benign capability.

New cards
90

Bot

A particular kind of backdoor Trojan that responds to commands sent by a command-and-control program located on an external computer.

New cards
91

Drive-by downlaod

When a user visits a compromised website, and it results in unintentional downloading of software.

New cards
92

Virus

A piece of self-replicating code embedded within another program called the host

New cards
93

Cross-site scripting

Where an attacker injects a client-side script into a website and when a user visits the site, the user’s browser executes the script, which may steal cookies, track the user’s activity, or perform another malicious action.

New cards
94

Ransomware

Malware designed to extort money from the victim of the attack.

New cards
95

Spear phishing

When the attacker selects email addresses that target a particular group of recipients or even on particular person in an effort to gain sensitive information.

New cards
96

Worm

A self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network.

New cards
97

Spyware

A program that communicates over an internet connection without the user’s knowledge or consent.

New cards
98

BotNet

A colleciton o fbot-infected computers.

New cards
99

Bot Herder

A person who controls a botnet.

New cards
100

SQL Injection

A method of inserting an SQL query into a text string from a web client to the web application in order to trick the application into returning sensitive information.

New cards

Explore top notes

note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 318 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 71 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 32 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12087 people
Updated ... ago
4.7 Stars(54)

Explore top flashcards

flashcards Flashcard50 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard55 terms
studied byStudied by 41 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard28 terms
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard204 terms
studied byStudied by 7 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 32 people
Updated ... ago
5.0 Stars(2)