Exam 8: Security Issues, Ethics, and Emerging Technologies in Education
Exam 1: Integrating Educational Technology Into the Curriculum103 Questions
Exam 2: Communications, Networks, the Internet, and the World Wide Web103 Questions
Exam 3: Software for Educators103 Questions
Exam 4: Hardware for Educators103 Questions
Exam 5: Technology, Digital Media, and Curricul112 Questions
Exam 6: The Changing Face of Education: Teaching Online103 Questions
Exam 7: Evaluating Educational Technology and Integration Strategies103 Questions
Exam 8: Security Issues, Ethics, and Emerging Technologies in Education103 Questions
Select questions type
A(n) ____________________ replaces the program used to start the computer system with an infected version.
Free
(Short Answer)
5.0/5
(35)
Correct Answer:
boot sector virus
A ____ virus hides virus code within an application such as a word processing or spreadsheet document.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____.

Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
A
Critical Thinking Case 8-1 Your computer is not behaving normally and you need to investigate. You discover that your computer's boot program is infected. Which of the following solutions should you try?
(Multiple Choice)
4.7/5
(36)
Match the U.S. government privacy law with its description below.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
____ studies have shown that using the correct type and configuration of chair, keyboard, display device and worksurface helps users work comfortably and efficiently, and helps protect their health.
(Multiple Choice)
4.8/5
(31)
A ____ is a program that is activated when a certain condition is detected.
(Multiple Choice)
4.9/5
(35)
____ prevents your browser from displaying materials from targeted sites or sites that contain certain keywords or phrases.
(Multiple Choice)
4.7/5
(40)
Copyright laws protect original materials created by students and teachers and published on the Web.
(True/False)
4.8/5
(34)
A(n) ____________________ contains surge protection circuits and batteries that can provide power during power outages.
(Short Answer)
4.7/5
(35)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
(Multiple Choice)
4.8/5
(28)
An antivirus program like the one in the accompanying figure also is called a serum.

(True/False)
4.7/5
(34)
Schools should never store backup copies at an off-site location.
(True/False)
4.9/5
(39)
A(n) ____ is a set of rules that govern the use of school and school district computers, networks, and the Internet.
(Multiple Choice)
4.8/5
(33)
____ is the use of a computer or data for unapproved or possibly illegal activities.
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)