Site MapHelpFeedbackFill in the Blanks
Fill in the Blanks
(See related pages)

1

Your text defines ergonomics as the science and technology emphasizing the safety, comfort, and ease of use of human-operated machines such as computers. The goal is to produce systems that are user-friendly, safe, comfortable, and easy to use. It is also is also called engineering.
2

The concern for security has increased dramatically with the growth of E-business and E-commerce. Encryption is described as the process of scrambling data or converting it, prior to transmission, to a secret code that the meaning of the data to unauthorized recipients.
3

Organizations are increasingly using encryption of data and firewall computers as methods to protect computer network resources. Firewall computer are computers, communications processors, and software that protect computer networks from intrusion by all network traffic and serving as a safe transfer point for access to and from other networks.
4

Biometric control devices being used as a method of computer security. They include special purpose sensors to measure traits that make each individual unique–fingerprints, voice, keystroke analysis, genetic pattern analyses, etc.
5

tolerant systems are computers that have multiple central processors, peripherals, and system software and that are able to continue operations even if there is a major hardware or software failure.
6

A disaster recovery plan is a method for ensuring that an organization recovers from natural and human-caused that affect its computer-based operations. These plans specify items such as hardware, software, employee duties, and facilities to be used.
7

Your text discusses the importance of auditing E-business systems. The presence of documentation that allows a to be traced through all stages of information processing is called an audit trail.







O'BrienOnline Learning Center

Home > Chapter 13 > Fill in the Blanks