Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are steps computer owners should take to have a positive effect on the environment, EXCEPT _____.

(Multiple Choice)
4.8/5
(40)

Digital certificates can be attached to software, but NOT to a document or e-mail.

(True/False)
4.9/5
(36)

A virus pattern is a section of a virus program that can be used to identify a known virus.

(True/False)
4.8/5
(43)

Case-Based Critical Thinking Questions Case 22-1 Ethan is in charge of Internet security for a small company. Employees are often asking him questions related to their identity and privacy online, as well as about some phishing schemes. Below are three of these questions. I have received an e-mail that warns about a devastating new virus, tells how to remove it, and encourages me to notify all my friends. What is this e-mail called?

(Multiple Choice)
4.8/5
(37)

A digital certificate is issued by a(n) _____.

(Multiple Choice)
4.7/5
(36)

Malicious code can slip into your computer only through unknown Web sites.

(True/False)
4.9/5
(48)

____________________ software is a set of utility programs that looks for and eradicates viruses, Trojan horses, worms, and other malware.

(Short Answer)
4.9/5
(28)

Which of the following files is most likely to contain a hidden virus?

(Multiple Choice)
4.8/5
(46)

Which of the following is a computer program that seems to perform one function while actually doing something else?

(Multiple Choice)
4.8/5
(35)

A _____ is malicious software designed to spread from computer to computer over local area networks and the Internet.

(Multiple Choice)
4.8/5
(37)

Privacy violations take place only when you distribute your personal information over the Internet.

(True/False)
4.9/5
(32)

The original wireless encryption was called _____ because it was designed to provide a level of confidentiality similar to that of a wired network.

(Multiple Choice)
4.9/5
(36)

  Referring to the accompanying figure, which of the following icons should you click to view a digital certificate? Referring to the accompanying figure, which of the following icons should you click to view a digital certificate?

(Multiple Choice)
4.8/5
(31)

You can use a music clip or a photo on your Web site without the author's permission.

(True/False)
4.7/5
(40)

Which of the following is the opposite of a gateway?

(Multiple Choice)
4.8/5
(45)

The term Intellectual property refers to intangibles, such as ideas, music, art, photos, logos, movies, and programs, that are the result of creativity and intellectual effort.

(True/False)
4.8/5
(38)

Which of the following is a major online privacy threat today?

(Multiple Choice)
4.7/5
(31)

To configure Internet Explorer to block third-party cookies, you should first select Internet Options from the Settings menu, then select the _____ tab.

(Multiple Choice)
4.8/5
(32)

The data carried by Wi-Fi signals can be encrypted with all of the following, EXCEPT _____.

(Multiple Choice)
4.9/5
(37)

A(n) worm is a computer program that seems to perform one function while actually doing something else.

(True/False)
4.7/5
(41)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)