Exam 8: Security Issues, Ethics, and Emerging Technologies in Education

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Any item that you must carry to gain access to a computer or computer facility is called a(n) ____.

(Multiple Choice)
4.7/5
(36)

Software that is provided at no cost to a user by an individual or company is called ____.

(Multiple Choice)
4.8/5
(38)

A computer security risk is defined as any event or action that could cause loss of, or damage to, ____.

(Multiple Choice)
4.8/5
(31)

____ applies to all creative works and provides certain rights to authors.

(Multiple Choice)
4.7/5
(38)

Spam is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient.

(True/False)
4.8/5
(34)

____ is a service that blocks e-mail messages from designated sources.

(Multiple Choice)
4.9/5
(44)

Objectionable materials located on the Internet include ____.

(Multiple Choice)
4.9/5
(29)

A(n) ____ is a prolonged undervoltage.

(Multiple Choice)
4.8/5
(35)

  A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure. A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure.

(Multiple Choice)
4.8/5
(29)

____ is the use of a computer system without permission.

(Multiple Choice)
4.8/5
(36)

A ____ virus hides within or is designed to look like a legitimate program.

(Multiple Choice)
4.8/5
(40)

A person who tries to break into a computer system is called a ____.

(Multiple Choice)
4.8/5
(37)

  Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it. Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it.

(Essay)
4.9/5
(37)

A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.

(Multiple Choice)
5.0/5
(32)

Fair use guidelines allow ____.

(Multiple Choice)
4.8/5
(42)

A single-user license typically includes the following condition: ____.

(Multiple Choice)
4.9/5
(46)

Filtering software programs prevent access to all objectionable and inappropriate materials.

(True/False)
4.9/5
(41)

Teachers always must protect the identity of their students on student and teacher Web pages.

(True/False)
4.8/5
(23)

  In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____. In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____.

(Multiple Choice)
4.9/5
(34)

  Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs. Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs.

(True/False)
4.8/5
(23)
Showing 41 - 60 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)