Exam 8: Security Issues, Ethics, and Emerging Technologies in Education

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ replaces the program used to start the computer system with an infected version.

Free
(Short Answer)
5.0/5
(35)
Correct Answer:
Verified

boot sector virus

A ____ virus hides virus code within an application such as a word processing or spreadsheet document.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

  An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____. An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____.

Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
Verified

A

A(n) ____ is a complete power failure.

(Multiple Choice)
4.8/5
(37)

Critical Thinking Case 8-1 Your computer is not behaving normally and you need to investigate. You discover that your computer's boot program is infected. Which of the following solutions should you try?

(Multiple Choice)
4.7/5
(36)
Match the U.S. government privacy law with its description below.
Closes a narrow loophole in the law that allowed people to give away copyrighted material (such as software) on the Internet without legal repercussions
Children's Internet Protection Act (CIPA)
Regulates disclosure of cable television subscriber records
Telephone Consumer Protection Act
Protects children from obscene and pornographic materials by requiring libraries to install filtering software on their computers; upheld by the Supreme Court in July 2003
CAN-SPAM Act
Correct Answer:
Verified
Premises:
Responses:
Closes a narrow loophole in the law that allowed people to give away copyrighted material (such as software) on the Internet without legal repercussions
Children's Internet Protection Act (CIPA)
Regulates disclosure of cable television subscriber records
Telephone Consumer Protection Act
Protects children from obscene and pornographic materials by requiring libraries to install filtering software on their computers; upheld by the Supreme Court in July 2003
CAN-SPAM Act
Establishes the Dot Kids domain that lists only Web sites that conform to policies to protect children under the age of 13; it functions similarly to the children's section of a library and was ruled unconstitutional in 2004
Right to Financial Privacy Act
Restricts activities of telemarketers
Family Educational Rights Privacy Act
Gives students and parents access to school records and limits disclosure of and records to unauthorized parties
Cable Communications Policy Act
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam
No Electronic Theft (NET) Act
Amends 1984 and 1996 acts to outlaw transmission of harmful computer code such as viruses
Video Privacy Protection Act
Strictly outlines procedures federal agencies must follow when looking at customer records in banks
Dot Kids Implementation and Efficiency Act
Forbids retailers from releasing or selling video-rental records without customer consent or a court order
Computer Abuse Amendments Act
(Matching)
4.8/5
(38)

____ studies have shown that using the correct type and configuration of chair, keyboard, display device and worksurface helps users work comfortably and efficiently, and helps protect their health.

(Multiple Choice)
4.8/5
(31)

A ____ virus inserts virus code into program files.

(Multiple Choice)
4.7/5
(33)

A proxy server screens all incoming and outgoing messages.

(True/False)
4.8/5
(29)

Surge protectors ____.

(Multiple Choice)
4.7/5
(30)

A ____ is a program that is activated when a certain condition is detected.

(Multiple Choice)
4.9/5
(35)

____ prevents your browser from displaying materials from targeted sites or sites that contain certain keywords or phrases.

(Multiple Choice)
4.7/5
(40)

Copyright laws protect original materials created by students and teachers and published on the Web.

(True/False)
4.8/5
(34)

A(n) ____________________ contains surge protection circuits and batteries that can provide power during power outages.

(Short Answer)
4.7/5
(35)

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

(Multiple Choice)
4.8/5
(28)

Copyright laws ____.

(Multiple Choice)
4.9/5
(33)

  An antivirus program like the one in the accompanying figure also is called a serum. An antivirus program like the one in the accompanying figure also is called a serum.

(True/False)
4.7/5
(34)

Schools should never store backup copies at an off-site location.

(True/False)
4.9/5
(39)

A(n) ____ is a set of rules that govern the use of school and school district computers, networks, and the Internet.

(Multiple Choice)
4.8/5
(33)

____ is the use of a computer or data for unapproved or possibly illegal activities.

(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)