Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers90 Questions
Exam 2: The System Unit: Processing and Memory91 Questions
Exam 3: Storage90 Questions
Exam 4: Input and Output90 Questions
Exam 5: System Software: Operating Systems and Utility91 Questions
Exam 6: Application Software89 Questions
Exam 7: Computer Networks89 Questions
Exam 8: The Internet and the World Wide Web87 Questions
Exam 9: Network and Internet Security90 Questions
Exam 10: Multimedia and the Web79 Questions
Exam 11: E-Commerce88 Questions
Exam 12: Information Systems and System Development75 Questions
Exam 13: Program Development and Programming Languages73 Questions
Exam 14: Databases and Database Management Systems72 Questions
Exam 15: Computer Security and Privacy88 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment80 Questions
Select questions type
____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.
(Short Answer)
5.0/5
(33)
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
(Multiple Choice)
4.8/5
(27)
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and / or play a sound to help the owner locate the phone if it is nearby. _________________________
(True/False)
4.9/5
(40)
Collecting in-depth information about an individual is known as ____.
(Multiple Choice)
4.8/5
(32)
____________________ databases contain marketing and demographic data about people, such as where they live and what products they buy.
(Short Answer)
4.8/5
(36)
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
(Multiple Choice)
4.8/5
(34)
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
(Multiple Choice)
4.8/5
(39)
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
(True/False)
4.8/5
(32)
Often used in conjunction with face recognition technology, public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________
(True/False)
4.8/5
(34)
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
(Multiple Choice)
4.7/5
(36)
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
(Multiple Choice)
4.9/5
(45)
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
(True/False)
4.9/5
(32)
____ devices are designed to withstand much more physical abuse than conventional devices.
(Multiple Choice)
5.0/5
(30)
Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.
(Short Answer)
4.9/5
(35)
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
(True/False)
4.7/5
(31)
The 2013 Secure Our Smartphones (SOS) Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.
(Short Answer)
4.7/5
(36)
Law enforcement agencies contend that ____________________ systems and public video surveillance are no different than the many private video surveillance systems in place today.
(Short Answer)
4.8/5
(39)
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
(Multiple Choice)
4.8/5
(40)
____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
(Short Answer)
4.8/5
(37)
Showing 21 - 40 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)