Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses
Exam 1: Introducing Todays Technologies: Computers, Devices, and the Web86 Questions
Exam 2: Connecting and Communicating Online: the Internet, Websites, and Media86 Questions
Exam 3: Computers and Mobile Devices: Evaluating Options for Home and Work86 Questions
Exam 4: Programs and Apps: Productivity, Graphics, Security, and Other Tools86 Questions
Exam 5: Digital Security, Ethics, and Privacy: Threats, Issues, and Defenses86 Questions
Exam 6: Appendix: Focus on Web Development42 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following is NOT true about CAPTCHAs?
(Multiple Choice)
4.8/5
(35)
Employers can use firewalls to restrict employees' access to sensitive data.
(True/False)
4.9/5
(41)
A digital ______ is a notice that guarantees a user or website is legitimate.
(Short Answer)
4.8/5
(39)
Badges, cards, smart cards, and keys are examples of _____ objects.
(Multiple Choice)
4.9/5
(38)
You should disable GPS tracking on your mobile device unless you need to use it.
(True/False)
4.8/5
(32)
Identify the letter of the choice that best matches the phrase or definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(40)
COGNITIVE ASSESSMENT Which of the following is NOT a recommended practice for gaming safety?
(Multiple Choice)
4.9/5
(40)
A(n) ______ is a private combination of characters associated with a user name that allows access to certain computer resources.
(Short Answer)
4.8/5
(27)
A(n) ______ is a private combination of words associated with a user name that allows access to certain computer resources.
(Short Answer)
4.9/5
(38)
Critical Thinking Questions Case 5-2
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations.
Which of the following is NOT true about cloud data privacy?
(Multiple Choice)
4.7/5
(39)
A(n) ______ was originally a complimentary work for a computer enthusiast.
(Multiple Choice)
4.9/5
(38)
Which of the following is NOT a part of a typical single-user license agreement?
(Multiple Choice)
4.8/5
(35)
User IDs are also called user names, log on names, or sign in names.
(True/False)
4.9/5
(36)
COGNITIVE ASSESSMENT An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)?
(Multiple Choice)
4.7/5
(39)
In case of system failure or the discovery of corrupted files, you ______ files by copying backed up files to their original location.
(Short Answer)
4.8/5
(33)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)