Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers90 Questions
Exam 2: The System Unit: Processing and Memory91 Questions
Exam 3: Storage90 Questions
Exam 4: Input and Output90 Questions
Exam 5: System Software: Operating Systems and Utility91 Questions
Exam 6: Application Software89 Questions
Exam 7: Computer Networks89 Questions
Exam 8: The Internet and the World Wide Web87 Questions
Exam 9: Network and Internet Security90 Questions
Exam 10: Multimedia and the Web79 Questions
Exam 11: E-Commerce88 Questions
Exam 12: Information Systems and System Development75 Questions
Exam 13: Program Development and Programming Languages73 Questions
Exam 14: Databases and Database Management Systems72 Questions
Exam 15: Computer Security and Privacy88 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Acccess and the Environment80 Questions
Select questions type
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
(True/False)
4.8/5
(32)
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
(Multiple Choice)
5.0/5
(40)
Read a Web site's piracy rules (if they exist) before providing any personal information.
(True/False)
4.9/5
(24)
One common way to deal with spam that makes it to your computer is to use a(n) ____.
(Multiple Choice)
4.8/5
(34)
System failure can occur because of a hardware problem, software problem, or a computer virus.
(True/False)
4.8/5
(34)
According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.
(True/False)
4.8/5
(39)
A government database is a collection of data about people that is collected and maintained by private industry.
(True/False)
4.9/5
(37)
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
(Multiple Choice)
4.8/5
(37)
A(n) head crash occurs when a hard drive's read / write heads actually touch the surface of a hard disk. _________________________
(True/False)
4.8/5
(44)
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.
(Short Answer)
4.8/5
(26)
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
(Multiple Choice)
4.7/5
(36)
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
(True/False)
4.7/5
(33)
-Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

(Multiple Choice)
4.8/5
(35)
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
(Multiple Choice)
4.9/5
(35)
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
(True/False)
4.9/5
(32)
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
(Multiple Choice)
4.9/5
(30)
-The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

(Multiple Choice)
4.9/5
(31)
A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.
(Short Answer)
4.7/5
(35)
Showing 41 - 60 of 88
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)