Exam 30: Computer Safety and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

Which of the following is not true about spyware?

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

C

A(n) ____________________ is a malicious program that records keystrokes.

Free
(Short Answer)
4.8/5
(25)
Correct Answer:
Verified

keylogger

When you use a computer in a public place, you should ____.

(Multiple Choice)
4.8/5
(43)

Firewalls help prevent employees from tampering with or deleting data.

(True/False)
4.8/5
(32)

Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. What is the first step Molly should take when setting up her wireless network?

(Multiple Choice)
4.8/5
(31)

Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.

(True/False)
4.8/5
(27)

If non-copyrighted information is published on a Web site, ____.

(Multiple Choice)
4.8/5
(41)

Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What can Nelson do to help avoid or minimize eyestrain?

(Multiple Choice)
4.8/5
(35)

A(n) ____________________ is a program that hackers use to capture IDs and passwords on a network.

(Short Answer)
5.0/5
(31)

If you work for a company that provides e-mail services, the information that you send is your property.

(True/False)
4.8/5
(33)

A(n) ____________________ encrypts the information in a data transmission.

(Short Answer)
4.8/5
(35)

Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.

(True/False)
4.9/5
(30)

One easy way to avoid data loss is to ____.

(Multiple Choice)
4.7/5
(39)

When communicating on a forum, blog, or social network or other similar Internet-related sites, use a(n) alias to protect your privacy.

(True/False)
4.8/5
(32)

TSL and SSL technology enables ____.

(Multiple Choice)
4.9/5
(38)

Sniffer attacks use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.

(True/False)
5.0/5
(28)

FIGURE 30-1 FIGURE 30-1   The message in Figure 30-1 above shows an example of ____. The message in Figure 30-1 above shows an example of ____.

(Multiple Choice)
4.8/5
(36)

Any information stored on a computer in an educational facility is the property of the ____.

(Multiple Choice)
4.9/5
(30)

If a network is large, a software firewall that controls the computers from one point should be implemented.

(True/False)
4.9/5
(38)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)