Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar

level: Chapter 4

Questions and Answers List

level questions: Chapter 4

QuestionAnswer
Key Terms: BSABusiness Software Alliance
Key Terms: CSSContent Scramble System
Key Terms: DRMDigital Rights Management
Key Terms: DVDDigital versatile disc
Key Terms: IPRIntellectual Property Rights
Key Terms: NDANon-disclosure agreements
Key Terms: NFCNear field communications
Key Terms: PMprivate message
Key Terms: are non-tangible and considered valuable for what they representconceptual resources
Key Terms: is a set of exclusive rights granted by a state to the creator of an original work or his or her assignee for a limited period of time in exchange for public disclosure of the work, and includes the right to copy, distribute, and adapt the work.Copyright
Key Terms: is done to hide sensitive information from unauthorized usersData scrambling
Key Terms: pertain to the permission of individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communications networkDigital rights
Key Terms: Is used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of his or her work is entitled to do.Digital Rights Management
Key Terms: are considered relevant truths which have been validated and identifiedFacts
Key Terms: refers to processed datainformation
Key Terms: Is allowing those who have appropriate authority access to and use of information on the bases of the authority that they hold.Information control
Key Terms: Is a number of distinct types of intangible assets for which a set of exclusive rights are recognized.Intellectual property
Key Terms: refers to useful informationknowledge
Key Terms: is the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technologymobile commerce (m-commerce)
Key Terms: Is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention.Patent
Key Terms: Is a subset of a security breach that actually leads to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.Personal data breach
Key Terms: are tangible and can be easily identifiedPhysical resources
Key Terms: is accomplished by the addition of components to the original signal or the changing of some important components of the original signal in order to make extraction of the original signal difficult.Scrambling
Key Terms: Is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity, or condifentialitySecurity incident
Key Terms: is the unauthorized copying or distribution of copyrighted software. It can be done through copying, downloading, sharing, selling, or installing multiple copies of software onto personal or work computersSoftware piracy
Key Terms: is the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competitors.Trade secret
Key Terms: is a distinctive sign used by an individual, business organization, or other legal entity to identify products or servicesTrademark
are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.resources
are tangible and can be easily identified usually start from acquisition and are then assembled to be available for use when neededPhysical resources
The other type of resources, are non-tangible and are considered valuable for what they represent rather than their physical makeupconceptual resources
the conceptual resources identified are called: can simply be defined as "facts about something or someone that are provided or learned."information
are considered relevant truths which have been validated and identified:Facts
data are considered:fact
processed data are considered as:information, as they are organized in such way that they have additional value beyond the value of the facts themselves.
Unlike other organizational resources, information is considered:expandable, compressible, transportable, diffusive, sharable
Information is considered valuable and also has a life cycle in a way,it begins with transforming raw materials into a finished product--- processing data to come up with a valuable information.
There are two options in acquiring software applications online:a free or trial version or; a full version
have limitations in functionalityfree or trial version
True or false, information can be substituted and consumption can either be expanded or capitalizeddepending on how its used
Information is said to be valuable if it has the following characteristics: 1: is error-freeaccurate
Information is said to be valuable if it has the following characteristics: 1: Accurate: inaccurate information is generated because:inaccurate data was processed.
Information is said to be valuable if it has the following characteristics: 1: Accurate: inaccurate information generated by inaccurate data, analysts call this as?"garbage-in-garbage-out"
Information is said to be valuable if it has the following characteristics: 1: Accurate: It is official and authoritative It is meant to be taken seriously and is presented in a formal manner It is usually more carefully prepared and verified, and its accuracy and reliability should also be higherformal information
Information is said to be valuable if it has the following characteristics: 1: Accurate: It is more casual, and less authoritative It is presented in a less formal manner It is possibly less reliableInformal information
Information is said to be valuable if it has the following characteristics:accurate economical reliable flexible relevant simple timely verifiable accessible secure