Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Microsoft Office provides utilities for saving files in an encrypted format.

(True/False)
4.8/5
(39)

A virus is the technical term for any type of intrusive program.

(True/False)
4.8/5
(43)

Identity ____________________ occurs when someone obtains your personal information and uses it without your permission to commit fraud or other crimes.

(Short Answer)
4.8/5
(31)

Which of the following refers to the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information?

(Multiple Choice)
4.9/5
(28)

The Gramm-Leach-Bliley Act (2002) established financial reporting regulations to prevent corporate fraud.

(True/False)
4.8/5
(46)

The process of eradicating a virus, sometimes called _____, might include deleting the virus code from files or deleting infected files.

(Multiple Choice)
4.7/5
(35)

Explain how you can use a router to protect your computer from intrusions.

(Essay)
4.9/5
(37)

Never reply to ____________________ e-mails.

(Short Answer)
4.9/5
(36)

After using a public computer, make sure you _____.

(Multiple Choice)
4.7/5
(33)

Two networks can interconnect using a device called a(n) router .

(True/False)
4.9/5
(37)

A Web ____________________ is an object, such as tiny graphic, embedded on a Web page that sends a cookie to third-party Web sites.

(Short Answer)
4.8/5
(39)

Which one of the following laws or regulations interprets sections of the Communications Decency Act to mean that ISPs are not responsible for malicious software transmitted over their services by hackers?

(Multiple Choice)
4.8/5
(30)

Which of the following antivirus software is included with Windows 8?

(Multiple Choice)
4.7/5
(36)

In a typical LAN, the firewall is the only protection from the Internet for local devices.

(True/False)
4.9/5
(49)

____________________ software is designed to analyze the flow of traffic entering your computer from a network.

(Short Answer)
4.9/5
(36)
Showing 61 - 75 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)