ISTM 210: CURTSINGER EXAM 3 NEWEST ACTUAL /
QUESTIONS WITH ACCURATE ANSWERS
Tracking Cookie - ----Answers----Remember that you don't visit a website; it visits you. A copy of a webpage was sent from the bookseller's server to your computer (client). Along with the webpage copy, the server also sent a small text file called a cookie that the user is typically unaware of. When the user typed information into the webpage, it was also being copied to the cookie.
Data Mining - ----Answers----experts extract useful data and information from recorded data, like a cookie. Keep in mind that all of the personal information you typed into a website, (your email address, for example) resides in a cookie.
Computer Privacy - ----Answers----refers to protecting one
of its most important assets: its data and information. A
business' data and information in the wrong hands can spell disaster. Compromised financial information, research and development ideas, and employee records are just some examples of business data and information that must remain private.
History Files - ----Answers----a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the 1 / 3
web. If an employee wants to protect their privacy at work, they need to assume they are always being monitored, whether on the web, email, or telephone.
Identity Theft - ----Answers----a crime concerning the unlawful practice of assuming another individual's identity, and it is one of the fastest growing crimes in the United States and Canada.
Shoulder Surfing - ----Answers----Although a quaint term,
shoulder surfing is exactly what it sounds like: a criminal in a
public place will simply glance over their victims' shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number. One example that most people can relate to is when they type their PIN number into an ATM; they typically look around to make sure no one else is looking.
Dumpster Diving - ----Answers----A lot of information is simply thrown away around homes and offices, like copies of checks, bank statements, and credit card statements, that usually bear your name, address, and sometimes even your phone number. It's not uncommon to throw away pre- approved credit card applications that arrive in the mail, the post offices' version of spam. Criminals know this and are willing to simply sift through trash to get the information.
SCAM - ----Answers----SCAM stands for the following: Be
"Stingy" about giving out personal information and treat all of your personal information on a "need to know" basis. "Check" 2 / 3
your financial information on a regular basis and inspect what should and shouldn't be there. "Ask" periodically for your
credit report: it is a good idea to check your credit score on a
regular basis as a barometer of your financial status and watch for any unusual fluctuations. Finally, "maintain" careful records of your banking and financial records.
- core business functions - ----Answers----accounting,
production, research & development, human resources, and marketing.
Collaboration - ----Answers----is simply two or more people working towards a common goal, and in the case of the automobile manufacturer, five business departments working towards a common goal.
Accounting Department - ----Answers----measures and provides financial information about an organization primarily for its decision makers, investors, and taxing authorities.Accounting is often referred to as the language or mathematics of business.
Human Resource Management - ----Answers----second core business functional behavior, primarily involved with administration of a business' personnel. Traditional roles of human resource departments involve recruiting and hiring new employees, evaluating and managing personnel, tracking personnel data, administering payroll and pensions and sometimes providing advice to employees regarding work- related issues.
- / 3