Exam 5: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
Collecting in-depth information about an individual is known as ____.
(Multiple Choice)
4.8/5
(30)
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
(Multiple Choice)
4.9/5
(36)
A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
(Short Answer)
4.8/5
(33)
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
(Multiple Choice)
4.8/5
(41)
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
(True/False)
4.9/5
(35)
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
(True/False)
4.9/5
(36)
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

(Multiple Choice)
4.7/5
(28)
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.
(Multiple Choice)
4.8/5
(30)
A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk. _________________________
(True/False)
4.7/5
(36)
There are many options for protecting yourself against computer monitoring by your employer or the government.
(True/False)
4.8/5
(34)
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
(Multiple Choice)
4.8/5
(30)
To comply with truth-in-advertising laws, a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
(True/False)
4.7/5
(42)
The U.S. ____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
(Short Answer)
4.7/5
(44)
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
(True/False)
4.8/5
(34)
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
(Multiple Choice)
4.9/5
(36)
____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.
(Short Answer)
4.9/5
(34)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)