Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Undervoltages can cause equipment damage, but generally do not cause data loss.

(True/False)
4.8/5
(43)

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

(Multiple Choice)
4.9/5
(45)

To help reduce the chance of ____________________, physical controls such as locked doors and cables usually are adequate to protect equipment.

(Short Answer)
4.9/5
(37)

Biometric objects are gaining popularity because they are entirely foolproof.

(True/False)
4.8/5
(44)

An online UPS switches to battery power when a problem occurs in the power line.

(True/False)
4.7/5
(39)

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.

(True/False)
4.7/5
(47)

It is illegal for employers to use software programs that monitor employees.

(True/False)
4.8/5
(38)

COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?

(Multiple Choice)
4.8/5
(42)

For a computer work space, ergonomics experts recommend an area smaller than two feet by four feet.

(True/False)
4.7/5
(32)

An employee using an organization's computer to track his or her child's soccer league scores is an example of unauthorized access.

(True/False)
4.7/5
(33)

  Many Web sites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? Many Web sites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

(Multiple Choice)
4.8/5
(35)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

(Multiple Choice)
4.8/5
(38)

A hash is a mathematical formula that generates a code from the contents of an e-mail message.

(True/False)
4.8/5
(34)

COGNITIVE ASSESSMENT Define social engineering as it pertains to computers.

(Multiple Choice)
5.0/5
(34)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

(Short Answer)
4.9/5
(41)

A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.

(True/False)
4.8/5
(34)

Which of the following is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace?

(Multiple Choice)
4.9/5
(29)

Which of the following kinds of certificate is a notice that guarantees a user or Web site is legitimate?

(Multiple Choice)
5.0/5
(39)

  In order to safeguard personal information, you should not reply to messages like those shown in the accompanying figure for any reason. In order to safeguard personal information, you should not reply to messages like those shown in the accompanying figure for any reason.

(True/False)
4.9/5
(36)

Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.

(True/False)
4.7/5
(41)
Showing 61 - 80 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)