Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________

(True/False)
4.8/5
(32)

____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.

(Multiple Choice)
5.0/5
(40)

Read a Web site's piracy rules (if they exist) before providing any personal information.

(True/False)
4.9/5
(24)

One common way to deal with spam that makes it to your computer is to use a(n) ____.

(Multiple Choice)
4.8/5
(34)

System failure can occur because of a hardware problem, software problem, or a computer virus.

(True/False)
4.8/5
(34)

According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.

(True/False)
4.8/5
(39)

A government database is a collection of data about people that is collected and maintained by private industry.

(True/False)
4.9/5
(37)

Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

(Multiple Choice)
4.8/5
(37)

A(n) head crash occurs when a hard drive's read / write heads actually touch the surface of a hard disk. _________________________

(True/False)
4.8/5
(44)

Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.

(Short Answer)
4.8/5
(26)

Describe e-mail filters.

(Essay)
4.8/5
(37)

To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

(Multiple Choice)
4.7/5
(36)

A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.

(True/False)
4.7/5
(33)

  -Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure. -Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

(Multiple Choice)
4.8/5
(35)

For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

(Multiple Choice)
4.9/5
(35)

A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.

(True/False)
4.9/5
(32)

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

(Multiple Choice)
4.9/5
(30)

  -The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN. -The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

(Multiple Choice)
4.9/5
(31)

A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.

(Short Answer)
4.7/5
(35)

One antipiracy tool is requiring a unique ____ code.

(Short Answer)
4.8/5
(39)
Showing 41 - 60 of 88
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)