Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
(Multiple Choice)
4.9/5
(34)
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
(True/False)
4.8/5
(39)
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
(Multiple Choice)
4.7/5
(22)
COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?
(Multiple Choice)
4.7/5
(29)
The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

(True/False)
4.7/5
(28)
To remove spyware, users need to obtain a special program that can detect and delete it.
(True/False)
4.8/5
(29)
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
(True/False)
4.8/5
(33)
COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
(True/False)
5.0/5
(32)
Which of the following terms means in a location separate from the computer site?
(Multiple Choice)
4.7/5
(33)
A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
(Short Answer)
4.9/5
(37)
Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is not a frequently discussed area of computer ethics?
(Multiple Choice)
4.9/5
(36)
If a company does not have a formal email policy, it can read email messages without employee notification.
(True/False)
4.9/5
(35)
Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

(True/False)
4.9/5
(34)
Which of the following is the process of restricting access to certain material on the web?
(Multiple Choice)
4.8/5
(42)
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
(Multiple Choice)
4.9/5
(42)
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
(Multiple Choice)
5.0/5
(35)
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
(Multiple Choice)
4.8/5
(32)
Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
(True/False)
4.8/5
(38)
If a program or device has a default password, be sure to retain it.
(True/False)
4.9/5
(35)
Showing 121 - 140 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)