BTMA 317 Final UPDATED Actual Exam Questions and CORRECT Answers
5 views 0 purchase
Course
BTMA 317
Institution
BTMA 317
BTMA 317 Final UPDATED Actual Exam
Questions and CORRECT Answers
three components of IT systems are - CORRECT ANSWER- people information and
information technology
most important component of IT systems - CORRECT ANSWER- people
Ethics are defined as - CORRECT ANSWER- the principles and stand...
BTMA 317 Final UPDATED Actual Exam
Questions and CORRECT Answers
three components of IT systems are - CORRECT ANSWER- ✔✔people information and
information technology
most important component of IT systems - CORRECT ANSWER- ✔✔people
Ethics are defined as - CORRECT ANSWER- ✔✔the principles and standards that shape our
behaviour toward other people
2 factors that influence how we decide ethical issues - CORRECT ANSWER- ✔✔our basic
ethical structure and the circumstances surrounding the choice
minor ethical violations - CORRECT ANSWER- ✔✔taking paper clips or browsing youtube
at work
serious ethical violations - CORRECT ANSWER- ✔✔reading someone elses emails to
manipulate them later
very serious ethical violations - CORRECT ANSWER- ✔✔embezzling money operating a
Ponzi scheme directly harming people
6 components of ethical decision making - CORRECT ANSWER- ✔✔consequence
society's opinion
likelihood of effect
time of consequences
relatedness
reach of result
intellectual property - CORRECT ANSWER- ✔✔is things that people have rights to it is the
creators ideas or immaginations manifested in physical form
,copyright - CORRECT ANSWER- ✔✔intellectual property is protected by
fair use doctrine - CORRECT ANSWER- ✔✔states that your IP can be used without your
express contsent only if it is used for teaching purposes or used in the creation of new content
keylogging - CORRECT ANSWER- ✔✔saving keystrokes event data recorders record events
with automobiles which can be leveraged in investigations
identity theft - CORRECT ANSWER- ✔✔includes people stealing your information for
financial gain
friendly fraud - CORRECT ANSWER- ✔✔someone that you know takes your information
from you very common
Phishing - CORRECT ANSWER- ✔✔is when you are redirected to a website that looks like
the one you are trying to visit for the purpose of stealing your password
spear phishing - CORRECT ANSWER- ✔✔the hackers specifically target you they have
parts of your info and desire more
whaling - CORRECT ANSWER- ✔✔high level execuatives and other high profile people are
targeted
Pharming - CORRECT ANSWER- ✔✔you try to visit a website and upon doing so it auto re-
directs you to website to steal your password
monitoring technology - CORRECT ANSWER- ✔✔these things can scan incoming and
outgoing emails employers can track you with keylogger software
cookies - CORRECT ANSWER- ✔✔basic tools of web monitoring they are small files
containing information about you keeps password details also manages storing shopping carts
on sites for when you return next
, unique cookies - CORRECT ANSWER- ✔✔track history across websites including what
websites you visit
common cookies - CORRECT ANSWER- ✔✔start as unique cookies but are then changed
and sold access to third party where they can be used to track activity across many sites
spam - CORRECT ANSWER- ✔✔is unsolicited email from businesses that deliver goods
and services people who are bad can skirt laws and get past blockers link to unsubscribe but
then you are linked on to more of these emails
adware - CORRECT ANSWER- ✔✔is software that generates ads that installs itself on your
computer when you download something from the internet
Trojan horse software - CORRECT ANSWER- ✔✔something you don't want hidden in a
download you do want
spyware - CORRECT ANSWER- ✔✔is a more malicious form of adware that installs itself
and then collects your information and data and gives it to a third party without your consent
web log - CORRECT ANSWER- ✔✔is something given to a specific website when you visit
it is usually just a line of information for every visitor stored usually on webservers provides
record of your clickstream
clickstream - CORRECT ANSWER- ✔✔information during your web session about with
websites you visited what ads you looked at
Anonymous web browsing servies - CORRECT ANSWER- ✔✔can hide your information
and thus your clickstream from people who may want to view it
two parties collecting information to their advantages - CORRECT ANSWER- ✔✔NCIC and
IRS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.