Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.

(Short Answer)
5.0/5
(33)

____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

(Multiple Choice)
4.8/5
(27)

Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and / or play a sound to help the owner locate the phone if it is nearby. _________________________

(True/False)
4.9/5
(40)

Collecting in-depth information about an individual is known as ____.

(Multiple Choice)
4.8/5
(32)

____________________ databases contain marketing and demographic data about people, such as where they live and what products they buy.

(Short Answer)
4.8/5
(36)

For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

(Multiple Choice)
4.8/5
(34)

____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

(Multiple Choice)
4.8/5
(39)

Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.

(True/False)
4.8/5
(32)

Often used in conjunction with face recognition technology, public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________

(True/False)
4.8/5
(34)

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

(Multiple Choice)
4.7/5
(36)

To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.

(Multiple Choice)
4.9/5
(45)

One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________

(True/False)
4.9/5
(32)

____ devices are designed to withstand much more physical abuse than conventional devices.

(Multiple Choice)
5.0/5
(30)

Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.

(Short Answer)
4.9/5
(35)

Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.

(True/False)
4.7/5
(31)

The 2013 Secure Our Smartphones (SOS) Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.

(Short Answer)
4.7/5
(36)

Law enforcement agencies contend that ____________________ systems and public video surveillance are no different than the many private video surveillance systems in place today.

(Short Answer)
4.8/5
(39)

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

(Multiple Choice)
4.8/5
(40)

What do surge suppressors do?

(Essay)
4.8/5
(40)

____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.

(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)