ログイン

Social And Professional Issues

Social And Professional Issues
20問 • 1年前
  • sharielkeila
  • 通報

    問題一覧

  • 1

    This can be activated on a particular date

    Time bomb

  • 2

    this a act of copromising digital services and networks through unauthorized access to any accounts or computer system

    Hacking

  • 3

    can be activated in any particular event or set of conditions

    trojan horse

  • 4

    a self replicating program entails deleting portion of a computer memory

    worm

  • 5

    set of rules that can be enforced in a court

    Law

  • 6

    is used to mean the area covered by a single legal system and set of laws.

    Jurisdiction

  • 7

    The person who initiates the court action

    plantiff

  • 8

    "Riding" into the system

    piggybacking

  • 9

    means that the law-making body (the legislature) is made up of two chambers or groups of people

    two chamber

  • 10

    The British legislature is known as

    Parliament

  • 11

    Taking Credit Card and National Insurance or Social Security Numbers

    Identity Theft

  • 12

    Unlawful Theft that Involves the theft of these corporate assets or trade secrets from competitors

    Corporate Espionage

  • 13

    Pyramid Schemes, Chain Letters Sales of Counterfeit, Goods, Etc

    Computer Fraud

  • 14

    Commit Malicious Activities on digital systems

    Software Piracy

  • 15

    Technologies work by "Unique" biological fratures such as voice, fingerprint

    Biometrics

  • 16

    It is used to scramble voice and data messages over telephone networks

    Dsp

  • 17

    Used to Encrypt credit card information being transmitted over the internet

    SET

  • 18

    Collecting Evidence in A computer

    Computer Forensics

  • 19

    Fraudulent Approcition of funs by a person to whom funds entrusted

    Embezzlement

  • 20

    Can also be conducted on behalf of law enforcement agencies

    Crime Prevention

  • Bussiness Process

    Bussiness Process

    sharielkeila · 51問 · 1年前

    Bussiness Process

    Bussiness Process

    51問 • 1年前
    sharielkeila

    System Administration and Maintenance

    System Administration and Maintenance

    sharielkeila · 19問 · 1年前

    System Administration and Maintenance

    System Administration and Maintenance

    19問 • 1年前
    sharielkeila

    Technoprenuership

    Technoprenuership

    sharielkeila · 41問 · 1年前

    Technoprenuership

    Technoprenuership

    41問 • 1年前
    sharielkeila

    問題一覧

  • 1

    This can be activated on a particular date

    Time bomb

  • 2

    this a act of copromising digital services and networks through unauthorized access to any accounts or computer system

    Hacking

  • 3

    can be activated in any particular event or set of conditions

    trojan horse

  • 4

    a self replicating program entails deleting portion of a computer memory

    worm

  • 5

    set of rules that can be enforced in a court

    Law

  • 6

    is used to mean the area covered by a single legal system and set of laws.

    Jurisdiction

  • 7

    The person who initiates the court action

    plantiff

  • 8

    "Riding" into the system

    piggybacking

  • 9

    means that the law-making body (the legislature) is made up of two chambers or groups of people

    two chamber

  • 10

    The British legislature is known as

    Parliament

  • 11

    Taking Credit Card and National Insurance or Social Security Numbers

    Identity Theft

  • 12

    Unlawful Theft that Involves the theft of these corporate assets or trade secrets from competitors

    Corporate Espionage

  • 13

    Pyramid Schemes, Chain Letters Sales of Counterfeit, Goods, Etc

    Computer Fraud

  • 14

    Commit Malicious Activities on digital systems

    Software Piracy

  • 15

    Technologies work by "Unique" biological fratures such as voice, fingerprint

    Biometrics

  • 16

    It is used to scramble voice and data messages over telephone networks

    Dsp

  • 17

    Used to Encrypt credit card information being transmitted over the internet

    SET

  • 18

    Collecting Evidence in A computer

    Computer Forensics

  • 19

    Fraudulent Approcition of funs by a person to whom funds entrusted

    Embezzlement

  • 20

    Can also be conducted on behalf of law enforcement agencies

    Crime Prevention