Exam 31: Security, Privacy, and Ethics Online

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Two-step verification requires more than just a password to authenticate your identity on a Web site.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

Keylogging is a way to block content being passed through the Internet. _______________________

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Reproducing and distributing music without the permission of the artist is called software ____________________.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

piracy

Explain the purpose of an End User License Agreement. List three different types of software licensing available and how they work.

(Essay)
4.9/5
(32)

Which of the following is NOT true about securing data?

(Multiple Choice)
4.7/5
(37)

An End User License Agreement is a contract between you and your Internet service provider.

(True/False)
4.9/5
(37)

A strong password contains all of the following EXCEPT: ____.

(Multiple Choice)
4.7/5
(27)

A ____ program can take control of your browser.

(Multiple Choice)
4.8/5
(39)

Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. The best position for a monitor is _____.

(Multiple Choice)
4.8/5
(32)

Which of the following is NOT true regarding computer hacking?

(Multiple Choice)
4.7/5
(34)

Computer hacking involves invading someone else's computer without his or her permission. _______________________

(True/False)
4.7/5
(32)

Identity theft is an example of unethical behavior.

(True/False)
4.9/5
(40)

Which of the following is NOT an acceptable way to protect a system?

(Multiple Choice)
4.7/5
(36)

  The accompanying figure shows a likely ____ scheme. The accompanying figure shows a likely ____ scheme.

(Multiple Choice)
4.8/5
(27)

A _____ is an act intended to deceive or defraud users.

(Multiple Choice)
4.8/5
(29)

An ergonomic workstation requires a wireless connection.

(True/False)
4.8/5
(36)

Abby is a human resource director. She is preparing a presentation on ergonomics and responsible computer use for an upcoming employee meeting. Abby tells employees that they should do all of the following EXCEPT: ____.

(Multiple Choice)
4.8/5
(39)

Public domain software provides remote access to software applications on the Internet. ____________________

(True/False)
4.9/5
(22)

A time bomb virus replicates itself and consumes the computer's resources, resulting in a computer slowdown.

(True/False)
4.7/5
(29)

Joanna is a responsible and secure computer user. Joanna knows that all of the following are true about securing data EXCEPT: ____.

(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)