Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Section 4 & 8

TermDefinition
1.Is a bridge between the computer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet. Modem
What units are typically used to measure network bandwidth? Megabites per second (mbps) and Gigabytes per second (Gbps)
The two most common network topologies are Bus and star
What is the primary function of a router in a communication network? Determining the fastest network path for data packets.
Computing professionals and organizations must continuously consider 1. Ownership 2. Security 3. Ethical and Regulatory Obligations 4.Liability 5. Social impact
Morals that individuals and organizations abide by are Ethics
argues that good behavior is not the result of applying identifiable rules (regulations) Character-based ethics
a set of rules that limits access to data/information. Confidentiality
refers to the ability to provide reliable access to the data/information for authorized individuals. Availability
Examples of regulatory groups, or other standard bodies HIPAA and PCI
What are the functions of a professional organization? Publish professional journals, Raise public awareness, Develop standards of professional ethics and excellence
Implementing access controls is largely responsible for enforcing Confidentiality
File permissions, user access controls, version control and redundant systems or copies are methods of maintaining Integrity
is best ensured by rigorously maintaining all hardware, testing compatibility with operating systems and installed applications, and keeping systems patched and up-to-date. Availability
Which of the following best describes the role of professional organizations in IT and related fields? They support single disciplines through educational and informational missions.
What are some common functions of professional organizations in the IT field? Publishing professional journals, developing standards of ethics and excellence, and raising public awareness
Which of the following organizations are involved in promoting or regulating the responsible use of information technology and protecting against computer crimes? 1. omputer Professionals for Social Responsibility (CPSR) 2. Federal Communications Commission (FCC) 3. National Institute of Standards and Technology (NIST) 4. National Security Agency (NSA)
What is one reason the Internet of Things (IoT) poses a security challenge? Increasing amounts of data and use of emerging technologies like IoT
n a _____________ network topology the computers are connected directly to each other as a peer. Ring
Detects and removes known viruses from the network Antivirus software
Are a special purpose computer that forwards messages to and from the machines on their network. They use their forwarding table to match up the private IP address with the internet IP address and send the message to the correct machine. Router
provides large pools of shared computers that can be allocated as needed. (i.e. Amazon's Elastic Computer Cloud, Google Cloud and Google Apps) Cloud Computing
Provides services, such as website hosting and routing, for other devices Server
network various computers connected in the middle by a router. Star
The machines are connected to a common communication line Bus
Which technique allows someone to obtain sensitive information, such as usernames and passwords, by pretending to be a trustworthy person Phishing
Is a bridge between the computer network and the ISP, converting the incoming analog data into digital, and the outgoing digital data into analog. It provides the access point to the internet. Modem
What is a key characteristic of Shielded Twisted Pair (STP) cables compared to Unshielded Twisted Pair (UTP) cables? STP cables have an insulating sheath that protects against electromagnetic interference
Which wireless technology typically supports distances shorter than 30 feet, compared to Wi-Fi’s range of up to 300 feet? Bluetooth
Networks rely on __________ to govern communication between devices. Protocols
Performed by using an application and a large dictionary text with just words Dictionary attack
What is the primary function of a router in a communication network? Determining the fastest network path for data packets.
What units are typically used to measure network bandwidth? Megabits per second (Mbps) and Gigabits per second (Gbps)
Blocks outgoing messages with certain destination addresses or blocks incoming messages from trustworthy sources Firewall
Four types of malware are Phishing, Spyware, Worms, Computer viruses
What role does a firewall play in a communication system? Filtering incoming and outgoing network traffic for security purposes
Communication over the internet is governed by an open collection of standards known as TCP/IP
A network that links systems over a greater distance, including machines on the opposite side of the world. WAN
a software that acts as an intermediary between a client and a server to shield the client from adverse actions of the server. Proxy Server
Which type of cable transmits large volumes of data using the reflection of light through a glass or plastic core, surrounded by cladding? Fiber-optic cable
The _______________ is an independent U.S. government agency that regulates communications by radio, television, wire, satellite, and cable. Federal Communications Commission (FCC)
The client is responsible for licensing the operating system and managing back-end networking. SaaS
Which network topology best handles downed links without losing connectivity between devices? Mesh
Computer security, ethics and privacy Is security, Ethics and Professionalism
Security in Ethics Cameras, Card access, password policies
Ethics Follows privacy laws and acceptable use policies
Professionalism in Ethics Is ongoing learning and ethical practices with limited resources
Ethics vs. Regualtions 1. Personal moral standards vs. Rules enforced and authorities 2. Informal but socially expected vs. Formal with penalties 3. Based on what's "right" vs. Based on what's "allowed"
1st commandment Dont harm others with computers
2nd commandment Dont interfere with others work
3rd commandment Don't snoop in files
4th commandment Don't steal with computers
5th commandment Don't spread false information
6th commandment Don't use software illegally
7th commandment Don't use other' resources without permission
8th commandment Don't take credit for others work
9th commandment Think about the impact of your systems
10th commandment Use computers with respect for others
Why professional organizations matter in IT Promote ethical behavior, support continued learning, and strengthen the credibility of IT profession
Functions in IT 1. Set ethical standards 2. Offer education & training 3. Provide certifications & Accreditation 4. Create Networking opportunities 5. Advocate for the Profession
Why It matters Help guide IT professionals in making responsible decisions 2. Ensure quality and credibility in education and practice 3. Keep professionals up to date on emerging technologies and laws 4. Help members connect, collaborate, and find career support
Code of Ethics 1. IEEE 2. ACM 3. ASA 4. AITP
IEEE is Institute of Electrical and electronics Engineering. It is a public safety, sustainability, honesty in engineering
ACM is Association for Computing Machinery. It is the integrity, public interest, lifelong learning computing
ASA is American Statistical Association. Is fair data use, intellectual honesty, unbiased reporting.
AITP is Association of Information Technology/Professionals, is reporting IT use, privacy, professionalism
IT Ethics are 1. AWC 2. AAAI 3. ABET
Acceptable use policy (AUP) include, legal compliance, security use and liability disclaimers
Privacy is Control over personal use
Security is Protection from unauthorized access
Ethical dilemmas who owns or can view certain data
CIA Triad Confidentiality, Integrity, Availability
IT Law and Security include 1. CPSR 2. FCC 3. ITS 4. NIST 5. NSA
IT Law and Security what is CPSR Computer professionals for social responsibility. It advocates ethical tech use and social impact
IT Law and Security what is FCC Federal Communications Commission. They regulate US communications like radio, tv, internet, etc
IT Law and Security what is ITS Institute for telecommunications. Researches secure telecom and broadband tech
IT Law and Security what is NSA National Security Agency. It secures US government data and defends against cyber threats
US IT regulattions 1. HIPAA- Medical records 2. FERPA- College records
ASIMOV's 3 laws of robotics 1. A robot may not harm a human 2. A robot must obey a human 3. A robot must protect itself
Computing professionals and organizations must continuously consider Social impact Ethical and Regulatory Obligations Security Ownership Liability
____________________ argues that good behavior is not the result of applying identifiable rules (regulations). Character-based ethics
Examples of regulatory groups, or other standard bodies HIPAA PCI
is a written policy that assists employees in identifying ethical behaviors as defined by the organization. Ethical Code of Conduct
handles sensitive data and information for both employees and clients. Computing Professionals
is a set of rules that limits access to data/information. Confidentiality
refers to the ability to provide reliable access to the data/information for authorized individuals. Availability
is challenging for organizations with expanding volumes of data or those that are using emerging technologies. Security
poses a security risk because of the volume of data and information that needs to be safeguarded, the multiple places these data are stored and the different forms in which the data exists. Big Data
Implementing access controls is largely responsible for enforcing Confidentiality
File permissions, user access controls, version control and redundant systems or copies are methods of maintaining Integrity
is best ensured by rigorously maintaining all hardware, testing compatibility with operating systems and installed applications, and keeping systems patched and up-to-date Availability
re requirements set by governing bodies and can result in penalties, fines, or even criminal charges. Regulations
Rule-based, ethical standards have been published by multiple professional organizations including AITP IEEE ACM
Which of the following best describes the role of professional organizations in IT and related fields? They support single disciplines through educational and informational missions.
What are some common functions of professional organizations in the IT field? Publishing professional journals, developing standards of ethics and excellence, and raising public awareness
What best defines organizational culture? The expectations, experiences, philosophy, and values that guide employee behavior and interactions
What is the purpose of an ethical code of conduct in an organization? To assist employees in identifying ethical behaviors as defined by the organization
To assist employees in identifying ethical behaviors as defined by the organization To provide clear guidelines on how organizational computer systems may be used, reflecting ethical and legal expectations
.Which of the following are key components typically found in an Acceptable Use Policy (AUP)? Legal considerations, data security provisions, and liability disclaimers
What does information privacy primarily refer to? The right to control how your personal information is collected, used, and shared
Which of the following best highlights the difference between privacy and security? Privacy focuses on data use and governance, while security focuses on protecting data from unauthorized access and misuse.
Which of the following issues has intensified concerns over information privacy? Data breaches, selling of personal data, and abuse of targeted advertising
What is a conflict of interest? A situation where someone has two relationships that may be incompatible with each other
What is the primary purpose of confidentiality in data security? To limit access to data/information based on a set of rules
What is a common type of social engineering attack, and how does it work? Phishing, which uses fake emails to trick users into providing personal information
What does maintaining data integrity ensure? hat data is trustworthy and accurate
Which of the following could compromise data integrity? Data being altered by unauthorized users or changed in transit
Which methods help maintain data integrity? File permissions, user access controls, version control, and redundant systems
What does availability mean in the context of information security? The ability to provide reliable access to data/information for authorized individuals
Which of the following practices best supports maintaining system availability? Regularly maintaining hardware and keeping systems patched and up-to-date
Why is testing compatibility with operating systems and applications important for availability? It helps ensure reliable system performance and reduces the risk of crashes
Which of the following organizations are involved in promoting or regulating the responsible use of information technology and protecting against computer crimes? Computer Professionals for Social Responsibility (CPSR) Federal Communications Commission (FCC) National Institute of Standards and Technology (NIST) National Security Agency (NSA)
Which of the following professional organizations publish rule-based ethical standards related to computing, statistics, or IT? institute of Electrical and Electronics Engineers (IEEE) American Statistical Association (ASA) Association for Computing Machinery (ACM) Association of Information Technology Professionals (AITP)
What is a core focus of the IEEE Code of Ethics? Prioritizing public safety, honesty, and fair treatment while advancing technological competence
According to the ACM’s Software Engineering Code of Ethics, software engineers are expected to: Commit to public interest, professional integrity, and lifelong learning
According to the American Statistical Association's Ethical Guidelines, what is expected of ethical statisticians? Using valid methods, acknowledging others’ contributions, and addressing conflicts of interest
What is a key element of the AITP Code of Ethics? Upholding responsibilities to management, society, employers, and country with honesty and respect
What is the primary mission of the Association for Women in Computing (AWC)? To promote the advancement of women in the computing professions
What is the focus of the Association for the Advancement of Artificial Intelligence (AAAI)? Advancing scientific understanding of thought and intelligent behavior in machines
What does the Accreditation Board for Engineering and Technology (ABET) do? Certifies the quality of undergraduate programs in computing and engineering
Which commandment addresses the ethical use of software and intellectual property? Thou shalt not copy or use proprietary software without paying for it
According to Asimov’s First Law of Robotics, what must a robot never do? Allow a human to come to harm
According to the 2011 UK guidelines, which of the following is an ethical principle for designing robots? Robots should be clearly distinguishable from humans
What is one reason the Internet of Things (IoT) poses a security challenge? Increasing amounts of data and use of emerging technologies like IoT
Created by: mnapole
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards