- Social Science
- Sociology
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (173)
Students also viewedSets found in the same folderOther sets by this creatorVerified questionspolitics of the united states
Verified answer
finance
Federal Semiconductors issued 11% bonds, dated January 1, with a face amount of $800 million on January 1, 2016. The bonds sold for$739,814,813 and mature on December 31, 2035 (20 years). For bonds of similar risk and maturity the market yield was 12%. Interest is paid semiannually on June 30 and December 31. Required: 1. Prepare the journal entry to record their issuance by Federal on January 1, 2016. 2. Prepare the journal entry to record interest on June 30, 2016 (at the effective rate). 3. Prepare the journal entry to record interest on December 31, 2016 (at the effective rate). 4. At what amount will Federal report the bonds among its liabilities in the December 31, 2016, balance sheet?
Verified answer
politics of the united states
Verified answer
Recommended textbook solutions
資料庫原理與設計
11th EditionFred R. McFadden, Jeffrey A Hoffer, Mary B. Prescott
128 solutions
Other Quizlet setsUpgrade to remove ads
Only A$47.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (44)
AAA
Authentication, Authorization, Accountability
CIA
Confidentiality, Integrity, Availability
availability
Security actions that ensure that data is accessible to authorized users.
block attacks
building security permiter
vulnerability
A flaw or weakness that allows a threat agent to bypass security.
integrity
insures information is correct and no alter
User Account Control
provides information to users and obtains their approval before a program can make a change to the computer's settings
patch
publicly released software security update intended to repair a vulnerability
viruses, Trojans, and worms
three types of malware that have the primary traits of circulation and/or infection
Rootkit
hide or remove all traces of evidence that may reveal the malware, such as log entries
Business Impact Analysis
incident response plan should be preceded by
The impact time frame of security awareness is
short term
Which of the following is a high level document that acts as an organizational law on cybersecurity?
policy
worm
computer through the network and then take advantage of a vulnerability in an application or an operating system on the host computer.
Which of the following is NOT a technology typically used by spyware?
disk driving software
Trojan
A program disguised as a harmless application that actually produces harmful results.
what are the three backup types
Full, Incremental, Differential
WWW
World Wide Web
HTML
- Allows Web authors to combine text, graphic
images, audio, video, and hyperlinks
Web Browser
- Displays the words, pictures, and other elements on
a user's screen
HTTP
Standards or protocols used by Web servers to
distribute HTML documents
Post Office Protocol (POP)
Responsible for incoming mail
Simple Mail Transfer Protocol (SMTP)
Handles outgoing mail
Extensions
Expand the
normal capabilities of a web browser for
a specific webpage
Plug-in
- Adds new functionality to the browser so users can
play music, view videos, or display special graphic
images
Java
- Complete programming language
- Used to create small applications called applets
Add-Ons
Add a greater degree of functionality to the entire
browser; not just a single webpage as with a plug-in
First-party cookies
can be stolen and used to
impersonate user
Third-party cookies
used to track user's
browsing and buying habits
Cryptography
the art of protecting information by transforming it into an unreadable format, called cipher text
Steganography
the art and science of hiding information by embedding messages within other, seemingly harmless messages
Cleartext data
Data in an unencrypted form
Plaintext data
Cleartext data that is to be encrypted
Hash algorithms
Creates a unique "digital fingerprint" of a set of data
Symmetric Cryptographic Algorithms
Use the same single key to encrypt and decrypt
Digital Certificates
- Technology used to associate a user's identity to a
public key
What standarizes sounds and video format so plug-ins like Flash are no longer needed?
HTML5
Which type of web browser enhancement can change browser menus or create additional toolbars?
Add-ons
Which of the following uses graphical images of text in order to circumvent text-based filters?
Image spam
is also called a Flash cookie, named after Adobe Flash.
LSO
What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?
drive-by-download
Which of the following can be described as a poisoned ad attack?
malvertising
Proving that a document was created by a particular user is referred to as which of the following?
nonrepudiation
evil twin
fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam
Students also viewedChapter 5, 6
74 terms
amazinganabennett
Chapter 3, 4
59 terms
amazinganabennett
Cybersecurity
20 terms
ashia_itsmytime
Security Awareness Chapters 3 and 4
65 terms
crammychris
CIS133 - Chapter 3 Quiz
25 terms
thehumangerm
CIS133 - Chapter 1 Quiz
26 terms
thehumangerm
Computer Security
37 terms
lisapep
Security Awareness ch 1 quiz
23 terms
Olga365
Verified questions
physics
Using noble gas notation write the electron configuration for the chromium atom.
Verified answer
physics
Determine the transmission coefficient for a rectangular barrier $(V(x) = +V_0 > 0$ in the region –a<x<a). Treat separately the three cases $E<V_0, E=V_0,$ and $E>V_0$ (note that the wave function inside the barrier is different in the three cases).
Verified answer
chemistry
Hydrogen gas reacts with each of the halogen elements to form the hydrogen halides (HF, HCl, HBr, HI). Calculate the percent by mass of hydrogen in each of these compounds.
Verified answer
chemistry
An example of the positive deviation from Raoult's law is a solution made of acetone $\left(\mathrm{CH}_3 \mathrm{COCH}_3\right)$ and carbon disulfide $\left(\mathrm{CS}_2\right)$.\ Draw Lewis structures of these molecules. Explain the deviation from ideal behavior in terms of intermolecular forces.
Verified answer
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Other Quizlet setsECON 2
35 terms
jack-yifei
Configuration and Setup Exam Weight 20%
102 terms
anthony_leonard89
bio 2000 ch 7
56 terms
yssa12345
Final Exam
28 terms
nferolito