Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Audit trails only record unsuccessful access attempts.

(True/False)
4.9/5
(29)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

(Multiple Choice)
4.8/5
(38)

Users may have this disorder if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. What is the name of this disorder?

(Multiple Choice)
4.7/5
(41)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a Web server stores on your computer?

(Multiple Choice)
4.7/5
(42)

COGNITIVE ASSESSMENT Which of the following terms is used to describe junk mail sent via VoIP.

(Multiple Choice)
4.7/5
(31)

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.

(Short Answer)
4.8/5
(37)

Which of the following software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches?

(Multiple Choice)
4.8/5
(40)

Web sites use which of the following to keep track of items in a user's shopping cart?

(Multiple Choice)
4.8/5
(36)

What is the term for the prolonged malfunction of a computer?

(Multiple Choice)
5.0/5
(34)

COGNITIVE ASSESSMENT Which of the following statements is not true about protecting yourself against computer viruses?

(Multiple Choice)
4.8/5
(43)

COGNITIVE ASSESSMENT Your roommate is complaining about sore eyes and blurred vision after prolonged computer use. What computer-related disorder may she have?

(Multiple Choice)
4.8/5
(30)

COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?

(Multiple Choice)
4.9/5
(25)

COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

(Multiple Choice)
4.9/5
(42)

A UPS for a personal computer should provide about 24 hours of use in the event of a total power loss.

(True/False)
4.8/5
(35)

  As shown in the accompanying figure, which of the following is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once? As shown in the accompanying figure, which of the following is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once?

(Multiple Choice)
4.8/5
(39)

Which of the following category of rights are the rights to which creators are entitled for their work?

(Multiple Choice)
4.9/5
(41)

  As shown in the accompanying figure, which of the following kinds of program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files? As shown in the accompanying figure, which of the following kinds of program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files?

(Multiple Choice)
4.9/5
(38)

To do this to a file means to make a copy of it. What is the term in question?

(Multiple Choice)
4.8/5
(32)

COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

(Multiple Choice)
4.8/5
(36)

Discuss the four types of software theft.

(Not Answered)
This question doesn't have any answer yet
Ask our community
Showing 21 - 40 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)