Exam 30: Computer Safety and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The goal of ____ is to collect information about the user, the user's browsing habits, and other personal information.

(Multiple Choice)
4.8/5
(26)

Which of the following would be considered the strongest password?

(Multiple Choice)
4.8/5
(36)

Often, you can inadvertently run a virus program by ____.

(Multiple Choice)
4.9/5
(31)

To make sure your e-commerce transactions are secure and to protect your private information, you should ____.

(Multiple Choice)
4.8/5
(34)

Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.

(True/False)
4.8/5
(36)

Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.

(True/False)
4.7/5
(44)

Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?

(Multiple Choice)
4.8/5
(30)

Surge protectors help protect computers from ____.

(Multiple Choice)
4.8/5
(35)

FIGURE 30-2 FIGURE 30-2   You could use the program shown in Figure 30-2 above to ____. You could use the program shown in Figure 30-2 above to ____.

(Multiple Choice)
4.8/5
(32)

Using a notebook computer introduces risks not associated with desktop computers.

(True/False)
4.8/5
(43)

Why are passwords important? How do you maintain passwords and keep them secure? How do you create a strong password?

(Essay)
4.9/5
(30)

Hackers often use spyware to control your browser, a practice called ____________________.

(Short Answer)
4.8/5
(31)

What action might obstruct the air vents in your notebook computer and cause it to overheat?

(Multiple Choice)
4.8/5
(41)

Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?

(Multiple Choice)
5.0/5
(35)

A software firewall is more secure and easier to monitor than a hardware firewall.

(True/False)
4.9/5
(44)

____________________ are small files that are created when you visit a Web site and are stored on your computer, then accessed again the next time you visit the same site.

(Short Answer)
4.8/5
(43)

It is the responsibility of a company or individual to protect their data.

(True/False)
4.8/5
(38)

A(n) public key deciphers the encrypted information in a transmission.

(True/False)
4.9/5
(47)

External hard drives can be used to help ____.

(Multiple Choice)
4.7/5
(39)
Identify the letter of the choice that best matches the phrase or definition.
Where could you back up data?
Backup and Restore Center window
Where could you find resources for Internet safety?
FBI site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Correct Answer:
Verified
Premises:
Responses:
Where could you back up data?
Backup and Restore Center window
Where could you find resources for Internet safety?
FBI site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Occupational Safety and Health Administration site
Where would you find guidelines for using and purchasing computer equipment?
VeriSign site
(Matching)
4.7/5
(46)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)