Exam 31: Security, Privacy, and Ethics Online
Exam 1: Computers and Computer Systems42 Questions
Exam 2: Input, Output and Processing42 Questions
Exam 3: Computer Protection42 Questions
Exam 4: Computer Maintenance40 Questions
Exam 5: Computer-Related Issues42 Questions
Exam 6: Software and Hardware Interaction42 Questions
Exam 7: Software Fundamentals42 Questions
Exam 8: Operating Systems42 Questions
Exam 9: Windows Management42 Questions
Exam 10: Operating System Customization42 Questions
Exam 11: Exploring Microsoft Office 201042 Questions
Exam 12: Getting Started With Word Essentials40 Questions
Exam 13: Editing and Formatting Documents37 Questions
Exam 14: Sharing Documents44 Questions
Exam 15: Working With Tables42 Questions
Exam 16: Using Templates, Styles, and Building Blocks42 Questions
Exam 17: Enhancing Documents41 Questions
Exam 18: Getting Started With Excel Essentials42 Questions
Exam 19: Organizing and Enhancing Worksheets42 Questions
Exam 20: Creating Formulas and Charting Data42 Questions
Exam 21: Getting Started With Powerpoint Essentials42 Questions
Exam 22: Enhancing Presentations With Multimedia Effects42 Questions
Exam 23: Getting Started With Access Essentials42 Questions
Exam 24: Managing and Reporting Database Information42 Questions
Exam 25: Networks Fundamentals42 Questions
Exam 26: Communication Services42 Questions
Exam 27: Communications and Collaboration42 Questions
Exam 28: Using the Internet and the World Wide Web42 Questions
Exam 29: Web Content42 Questions
Exam 30: Technology and Society31 Questions
Exam 31: Security, Privacy, and Ethics Online41 Questions
Exam 32: Using Windows 742 Questions
Select questions type
Two-step verification requires more than just a password to authenticate your identity on a Web site.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
Keylogging is a way to block content being passed through the Internet. _______________________
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Reproducing and distributing music without the permission of the artist is called software ____________________.
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
piracy
Explain the purpose of an End User License Agreement. List three different types of software licensing available and how they work.
(Essay)
4.9/5
(32)
An End User License Agreement is a contract between you and your Internet service provider.
(True/False)
4.9/5
(37)
A strong password contains all of the following EXCEPT: ____.
(Multiple Choice)
4.7/5
(27)
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. The best position for a monitor is _____.
(Multiple Choice)
4.8/5
(32)
Which of the following is NOT true regarding computer hacking?
(Multiple Choice)
4.7/5
(34)
Computer hacking involves invading someone else's computer without his or her permission. _______________________
(True/False)
4.7/5
(32)
Which of the following is NOT an acceptable way to protect a system?
(Multiple Choice)
4.7/5
(36)
Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. Abby tells employees that they should do all of the following EXCEPT: ____.
(Multiple Choice)
4.8/5
(39)
Public domain software provides remote access to software applications on the Internet. ____________________
(True/False)
4.9/5
(22)
A time bomb virus replicates itself and consumes the computer's resources, resulting in a computer slowdown.
(True/False)
4.7/5
(29)
Joanna is a responsible and secure computer user. Joanna knows that all of the following are true about securing data EXCEPT: ____.
(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 41
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)