Knowledge Mouse

Welcome to the Knowledge Mouse Online Quiz

CJ160 Terminology Quiz Unit 4

Choose a quiz style:



You can also try another quiz or
create your own quiz (requires a PRO account).

Or learn about how to embed/host this quiz on your website

Questions Answers
Providing IT services, applications, and data using dynamically scalable storage locations possibly residing remotely, so users do not need to consider the physical location of the storage that supports their needs. cloud computing 
The set of legal and ethical methods for collecting, developing, analyzing, and disseminating actionable information pertaining to competitors, suppliers, customers, the organization itself, and the business environment that can affect a company’s plans, competitive intelligence
A form of protection provided by law to the authors of original works of literary, dramatic, musical, artistic, and certain other intellectual efforts. This protection is available to both published and unpublished works. copyright
Involves criminal activity carried out via the internet. cybercrime 
The process of protecting data, networks, and computing power that make up computer systems. cyber/computer security
A euphemism for online interactions, and describes the Internet universe and its various computer networks. cyberspace
Use of the Internet for terrorist activities, including large-scale acts of deliberate disruption of computer networks. cyberterrorism
Uses the Internet to infiltrate or attack an enemy’s computer network. cyberwarfare 
One of the most frequent attacks seen on the Internet is an effort to flood computer systems with emails, logons, requests, or other types of intrusions. denial of service
Secretly getting access to another person or organization’s computer network in order to steal information, cause damage, or disrupt communication. hacking
The theft of someone else’s personal information—name, credit card number, or other identifying information—to obtain money, credit, or other things of value. identity theft
The theft of information by legal or illegal means. It entails obtaining confidential information from other companies such as strategic plans or pricing policies, with the intent to use the information to gain a competitive edge in the marketplace. industrial espionage
A global system of interconnected computer networks, sensors, actuators, and devices all using the Internet protocol that enables communication among “intelligent” physical objects. Internet of things (IoT) 
Stands for malicious software—software programs that are designed to damage or do other unwanted actions to a computer system. malware
A type of malware that once installed on a victim’s computer via the Internet both locks the device and also generates a pop-up window, Web page, or email warning and demands payment be made in order for the system to be unlocked. ransomware
Processes, devices, or something else that is used continuously in the operation of the business. trade secrets
A destructive program that masquerades as a legitimate file or application to gain entry to a computer. Trojan horse
Internet-based communities in which users interact with each other online on websites such as Facebook, Twitter, LinkedIn, Instagram, YouTube, and Pinterest. social media
Collections of software tools that enable administrators to access a computer or computer network. rootkits
An ad hoc network that wirelessly connects computers and devices directly to each other without passing through any central authority or organization. mesh network

Quick Feedback for Knowledge Mouse

Want to suggest a feature? Report a problem? Suggest a correction? Please let Knowledge Mouse know below: