Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
Exam 1: Introducing Todays Technologies: Computers, Devices, and the Web86 Questions
Exam 2: Connecting and Communicating Online: the Internet, Websites, and Media86 Questions
Exam 3: Computers and Mobile Devices: Evaluating Options for Home and Work86 Questions
Exam 4: Programs and Apps: Productivity, Graphics, Security, and Other Tools86 Questions
Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses86 Questions
Exam 6: Appendix: Focus on Web Development42 Questions
Select questions type
A(n) ____ license is a legal agreement that permits users to install the software on multiple computers.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
site
COGNITIVE ASSESSMENT You want to ensure your wireless network is secure. Which of the following should you NOT do?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
Free
(Short Answer)
4.9/5
(43)
Correct Answer:
virus
If your computer's operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall.
(True/False)
4.8/5
(45)
With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the user.
(True/False)
4.8/5
(36)
Critical Thinking Questions Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications.
(Multiple Choice)
4.8/5
(36)
Which of the following best describes a single sign on account?
(Multiple Choice)
4.8/5
(37)
The destructive event or prank a malware delivers is its ______.
(Short Answer)
4.8/5
(40)
An iris recognition system uses technology to read patterns in the user's ______.
(Multiple Choice)
4.8/5
(36)
COGNITIVE ASSESSMENT If the web address of a website begins with https instead of http, what do you know about the website?
(Multiple Choice)
4.9/5
(34)
Common digital security risks include information theft and system failure.
(True/False)
4.8/5
(30)
Critical Thinking Questions Case 5-1
You recently purchased a new laptop for home. You want to ensure that you are safe from malware.
You should make sure to do all of the following EXCEPT ______.
(Multiple Choice)
4.9/5
(39)
Critical Thinking Questions Case 5-2
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
FERPA regulates the confidentiality of ______.
(Multiple Choice)
4.8/5
(43)
Digital ______ is the discovery, collection, and analysis of evidence found on computers and networks.
(Short Answer)
4.8/5
(33)
A(n) ______ backup copies only the files that have changed since the last full backup.
(Multiple Choice)
4.9/5
(44)
______ is the process of converting data that is readable by humans into encoded characters.
(Short Answer)
4.9/5
(40)
A(n) ______ is a program that performs a repetitive task on a network.
(Short Answer)
4.8/5
(43)
Intentionally erasing software is not an example of software theft.
(True/False)
4.7/5
(42)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)