A social engineering scam called ___________ is when a victim is...
Which ecommerce classification encompasses consumers selling...
A(n) __________ is available for use by any routine in the program...
The human-readable version of a program created in a high-level...
A(n) ______________ attack exploits previously unknown...
Which of the following sequence of events best describes an online...
A(n) __________ is a section of code that is part of a program, but is...
Computer historians believe that ____________ was the first...
To establish a(n) ________, hackers set up an unsecured Wi-Fi...
Which of the following is not a characteristic of a weak password?
Prolog allows you to ask open-ended questions by replacing constants...
Which type of problem requires human intuition as the basis for...
A(n) ___________ converts all the statements in a program in a single...
A(n) _____________ changes the order in which instructions are...
The current method of encrypting communication between a client and a...
Which type of security measure reduces the effect of an attack by...
____________ encompasses a broad set of activities that include...
__________-generation languages, such as COBOL and Fortran, were used...
_____________ software shields certain applications against...
Three key concepts ensure good quality of service include all of the...
A ___________ is malware that arrives in a trojan disguised...
Which of the following type of attack uses password-cracking software...
A(n) ___________ is the sequence of organizations, people, activities,...
Most modern transaction processing systems use ________...
Which type of security measure reduces the likelihood of a deliberate...
What is the term that refers to the sequence in which a computer...
The ________________ paradigm is based on the idea that the solution...
In the context of Prolog programming, a(n) ________________ is a...
A(n) __________ pings a packet of data to a port in order to see...
A(n) ____________ for a computer program is a set of steps that...
When antivirus software detects malware, which of the following would...
Which programming language is used for artificial intelligence...
Which of the following would be considered spyware?
After unit and integration testing are completed, _________ testing...
A low-level language has a low level of ___________ because it...
A cryptographic __________ is a procedure for encryption or...
The current standard for object-oriented documentation is referred to...
A computer _________ is a set of self-replicating program...
If you use a password manager, what do you as the user need to...
Which of the following is not a type of spam filter?
Trojans depend on ________ to spread.
_______________, such as BASIC, Python, Java, Prolog, and C++,...
The _____________ in a problem statement is the information that is...
The instructions that make up a computer program are sometimes...
A(n) _____________ defines the characteristics of a set of...
Which of the following is not a characteristic of a computer worm?
Which type of device is the top target for ransomware?
Which ecommerce classification encompasses online storefronts selling...
_______ applications provide optimal information when they encompass...
Dark data centers are an extension of ___________, which allows...
Which of the following is an example of an authentication protocol?
Which of the following is not a core CRM system?
The design phase of a SDLC includes all of the following except...
Which of the following terms would best match this definition:...
Spam accounts for approximately ______ of all email.
A(n) ________________ takes place when an unauthorized person...
A(n) _____________ is a group of people working together to accomplish...
What is the term used to describe unwanted software that installs...
Which of the following can be used to block unauthorized access while...
______________ is a deceptive practice that exploits human...
There are various encryption methods, but __________ is the...
The _______________ paradigm describes aspects of a problem that lead...
A(n) _________ is a graphical representation of the way a computer...
The best defense against malware is _____________.
_________________ refers to the process of hiding the internal details...
In addition to sales, CRM, and SCM, ERP modules support business...
Which of the following is a scripting language?
The process of designing, entering, and testing the rules in an expert...
A(n) __________ is a device or software that is designed to block...
A(n) ________________ tells a computer what to do based on whether a...
What is the process called when an app from a source other than an...
Which business practice is a technique initiated by top management...
__________ is the process of modifying an executable file or data...
The maintenance phase of a SDLC includes all of the following except...
____________ is a service offered by Google that checks URLs...
__________ changes an originating address or a destination address to...
A ______________ exploit usually begins with a virus warning and an...
MITM attacks include which of the following?
A key component of an ecommerce application is an online _________.
A password manager can store passwords in an encrypted file located at...
The planning phase of a SDLC includes all of the following except...
In 1969, computer scientists began to develop high-level languages,...
_______ can be used to flood a Web site with so much traffic that...
Which of the following is not a step that a data breach victim should...
The implementation phase of a SDLC includes all of the following...
Which of the following is not a programming paradigm?
A virus __________ usually arrives as an email message that...
Which of the following is not part of the analysis phase of a SDLC?
If you feel more secure with a totally random and unique password...
___________ provides OO programs with easy extensibility and can help...
A transaction processing system is characterized by its ability to:
Regarding OO programming, which of the following terms best matches...
A(n) __________ is a factor that remains the same throughout a...
The scope of an information system includes which of the following?
Which of the following is not a characteristic of a management...
In Prolog, the __________ describes the relationship between the...
Industry standard tools for scheduling and project management include...
Which of the following is not a characteristic for a good problem...
____________ is a term for a person who devises and carries out a scam...
Antivirus software can use techniques called__________ to detect...
The goal of the planning phase for an information system project is to...
A(n) _________ provides programmers with tools to build substantial...
Which programming language is an interpreted language most commonly...
In a problem statement, you can limit complexity by making...
In a repetition control structure, the computer is directed to repeat...
Which of the following is not included in Michael Porter's Five...
Finding a value for a variable is referred to as ___________.