Exam 8: Security Issues, Ethics, and Emerging Technologies in Education
Exam 1: Integrating Educational Technology Into the Curriculum103 Questions
Exam 2: Communications, Networks, the Internet, and the World Wide Web103 Questions
Exam 3: Software for Educators103 Questions
Exam 4: Hardware for Educators103 Questions
Exam 5: Technology, Digital Media, and Curricul112 Questions
Exam 6: The Changing Face of Education: Teaching Online103 Questions
Exam 7: Evaluating Educational Technology and Integration Strategies103 Questions
Exam 8: Security Issues, Ethics, and Emerging Technologies in Education103 Questions
Select questions type
Any item that you must carry to gain access to a computer or computer facility is called a(n) ____.
(Multiple Choice)
4.7/5
(36)
Software that is provided at no cost to a user by an individual or company is called ____.
(Multiple Choice)
4.8/5
(38)
A computer security risk is defined as any event or action that could cause loss of, or damage to, ____.
(Multiple Choice)
4.8/5
(31)
____ applies to all creative works and provides certain rights to authors.
(Multiple Choice)
4.7/5
(38)
Spam is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient.
(True/False)
4.8/5
(34)
____ is a service that blocks e-mail messages from designated sources.
(Multiple Choice)
4.9/5
(44)
Objectionable materials located on the Internet include ____.
(Multiple Choice)
4.9/5
(29)
A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure.

(Multiple Choice)
4.8/5
(29)
A ____ virus hides within or is designed to look like a legitimate program.
(Multiple Choice)
4.8/5
(40)
A person who tries to break into a computer system is called a ____.
(Multiple Choice)
4.8/5
(37)
Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it.

(Essay)
4.9/5
(37)
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
(Multiple Choice)
5.0/5
(32)
A single-user license typically includes the following condition: ____.
(Multiple Choice)
4.9/5
(46)
Filtering software programs prevent access to all objectionable and inappropriate materials.
(True/False)
4.9/5
(41)
Teachers always must protect the identity of their students on student and teacher Web pages.
(True/False)
4.8/5
(23)
In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____.

(Multiple Choice)
4.9/5
(34)
Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs.

(True/False)
4.8/5
(23)
Showing 41 - 60 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)