Exam 5: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: A Closer Look at Hardware and Software100 Questions
Exam 3: The Internet and the World Wide Web100 Questions
Exam 4: Network and Internet Security100 Questions
Exam 5: Computer Security and Privacy100 Questions
Exam 6: Intellectual Property Rights and Ethics100 Questions
Exam 7: Health, Access and the Environment100 Questions
Exam 8: Emerging Technologies100 Questions
Select questions type
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.
(Multiple Choice)
4.8/5
(33)
System failure can occur because of a hardware problem, software problem, or a computer virus.
(True/False)
4.8/5
(35)
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
(True/False)
4.8/5
(40)
Our networked society has raised a number of ____ concerns.
(Multiple Choice)
5.0/5
(36)
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach ____ to these devices.
(Multiple Choice)
4.9/5
(45)
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
(Multiple Choice)
4.7/5
(30)
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
(True/False)
5.0/5
(32)
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.
(Short Answer)
4.9/5
(40)
Read a Web site's piracy rules (if they exist)before providing any personal information.
(True/False)
4.9/5
(31)
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
(Multiple Choice)
4.8/5
(31)
As shown in the accompanying figure, a(n) ____________________ app can lock and unlock your computer automatically as your iPhone moves in and out of range.

(Short Answer)
4.7/5
(32)
A marketing activity that can be considered a privacy risk is ____.
(Multiple Choice)
4.8/5
(37)
Information such as birth records, marriage certificates, and divorce information, as well as property purchases, assessments, liens, and tax values is confidential and can legally be seen only by authorized individuals.
(True/False)
4.9/5
(31)
____________________ labels change their appearance if someone (such as a thief)tries to remove them.
(Short Answer)
4.8/5
(29)
One of the most obvious types of hardware loss is hardware theft . _________________________
(True/False)
4.8/5
(40)
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
(True/False)
4.9/5
(42)
____________________ fluctuations, heat, dust, and static can all damage computer hardware.
(Short Answer)
4.8/5
(20)
Chain locks can be used to secure computers and other hardware. _________________________
(True/False)
5.0/5
(34)
____ refers to companies recording or observing the actions of employees while on the job.
(Multiple Choice)
4.8/5
(32)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)