Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
(Short Answer)
4.8/5
(35)
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
(True/False)
4.9/5
(36)
Websites often collect data about you so that they can customize advertisements and send you personalized email messages.
(True/False)
4.7/5
(46)
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

(Multiple Choice)
4.9/5
(33)
COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
(Multiple Choice)
4.8/5
(36)
COGNITIVE ASSESSMENT In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
(Multiple Choice)
4.9/5
(43)
It is illegal for employers to use software programs that monitor employees.
(True/False)
4.9/5
(37)
Any illegal act involving a computer generally is referred to as a computer crime.
(True/False)
4.9/5
(36)
Any device that connects to the Internet is susceptible to mobile malware.
(True/False)
4.7/5
(35)
With which of the following do users choose which folders and files to include in a backup?
(Multiple Choice)
4.9/5
(40)
The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
(Short Answer)
4.7/5
(29)
Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?
(Multiple Choice)
5.0/5
(39)
A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.
(Short Answer)
4.8/5
(39)
____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.
(Short Answer)
4.9/5
(34)
Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following is NOT permissible under a single-user license agreement?
(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)