Exam 11: Computer Security and Safety, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

(Short Answer)
4.9/5
(30)

A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.

(Short Answer)
4.8/5
(42)

COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
5.0/5
(28)

Analog signatures help to prevent e-mail forgery.

(True/False)
4.9/5
(37)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a perpetrator attempts to obtain your personal and financial information via spoofing?

(Multiple Choice)
4.9/5
(33)

Discuss what a virus is and related examples of malware, and include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Also discuss the symptoms of a computer's having been infected with a virus.

(Not Answered)
This question doesn't have any answer yet
Ask our community

COGNITIVE ASSESSMENT What is an AUP intended to do?

(Multiple Choice)
4.8/5
(43)

COGNITIVE ASSESSMENT Define the term back door, as it refers to computer crime.

(Multiple Choice)
4.9/5
(37)

COGNITIVE ASSESSMENT You set up your computer so that your elbows are at about 90 degrees and your viewing distance is 18 to 28 inches. What scientific principle are you using to ensure your comfort and safety while using the computer?

(Multiple Choice)
4.8/5
(35)

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

(Multiple Choice)
4.9/5
(42)

Which of the following occurs when a computer consumes someone's entire social life?

(Multiple Choice)
4.9/5
(38)

COGNITIVE ASSESSMENT Which of the following statements is not true about hardware theft and vandalism?

(Multiple Choice)
4.8/5
(32)

  To ____________________ a program file, a program like the one in the accompany figure records information such as the file size and file creation date in a separate file. To ____________________ a program file, a program like the one in the accompany figure records information such as the file size and file creation date in a separate file.

(Short Answer)
4.8/5
(30)

COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, Web site, or organization uses to verify the identity of the message sender?

(Multiple Choice)
4.7/5
(37)

Computer addiction is an untreatable illness.

(True/False)
4.9/5
(39)

COGNITIVE ASSESSMENT Define the term, payload, as it pertains to computer crime.

(Multiple Choice)
4.9/5
(26)

The only acceptable policy for backing up is to produce multiple backup copies.

(True/False)
4.8/5
(37)

Which of the following is someone who uses e-mail as a vehicle for extortion?

(Multiple Choice)
4.7/5
(30)

COGNITIVE ASSESSMENT Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

(Multiple Choice)
4.9/5
(39)

COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?

(Multiple Choice)
4.8/5
(39)
Showing 101 - 120 of 181
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)