Exam 5: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
The 2013 Secure Our Smartphones (SOS)Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.
(Short Answer)
4.8/5
(39)
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
(True/False)
4.8/5
(40)
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
(Multiple Choice)
4.7/5
(38)
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers)that cannot afford to be without power for any period of time, generators can be used. _________________________
(True/False)
4.8/5
(39)
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks , and other difficult-to-reproduce content. _________________________
(True/False)
4.8/5
(38)
Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.
(Short Answer)
5.0/5
(37)
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example)on a network (such as the Internet or a mobile phone network)to identify another device on the same network and determine its status.
(Multiple Choice)
4.8/5
(32)
To supplement backup procedures, businesses and other organizations should have a(n)____.
(Multiple Choice)
4.8/5
(29)
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
(Multiple Choice)
4.8/5
(40)
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
(True/False)
4.8/5
(41)
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
(Multiple Choice)
4.8/5
(35)
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
(Multiple Choice)
4.8/5
(37)
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
(Multiple Choice)
5.0/5
(36)
____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.
(Short Answer)
4.8/5
(24)
The disaster recovery plan is also called a business continuity plan.
(True/False)
4.9/5
(37)
A government database is a collection of data about people that is collected and maintained by private industry.
(True/False)
4.8/5
(41)
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
(Multiple Choice)
4.8/5
(49)
One common way to deal with spam that makes it to your computer is to use a(n)____.
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)