Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
(Multiple Choice)
4.9/5
(35)
COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
(True/False)
4.9/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A common infringement of copyright.
Responses:
ciphertext
web filtering software
digital security risk
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(47)
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
(True/False)
4.8/5
(35)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Usually does not have advanced computer and technical skills.
Responses:
Digital Millennium Copyright Act (DCMA)
CA
iris recognition system
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(44)
COGNITIVE ASSESSMENT Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
(Multiple Choice)
4.8/5
(41)
A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.
(Short Answer)
4.9/5
(47)
Which of the following is an authorized person or company that issues and verifies digital certificates?
(Multiple Choice)
4.8/5
(38)
Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.
(Short Answer)
4.9/5
(41)
The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

(True/False)
4.9/5
(33)
Computer viruses like the kind in the accompanying figure-along with worms, and Trojan horses-deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

(Short Answer)
4.8/5
(39)
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
(True/False)
4.8/5
(27)
Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
(True/False)
4.9/5
(38)
Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy.Because this has historically been rather easy to do, the practice has become very common.As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.Which of the following is NOT permissible under a single-user license agreement?
(Multiple Choice)
4.8/5
(31)
HIPAA protects individuals against the wrongful disclosure of their health information.
(True/False)
4.9/5
(41)
____________________ is the unauthorized and illegal duplication of copyrighted software.
(Short Answer)
4.7/5
(40)
The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
(Short Answer)
4.9/5
(35)
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
(True/False)
4.8/5
(38)
Showing 41 - 60 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)