Exam 8: Security Issues and Ethics in Education

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Spam is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient.

(True/False)
4.9/5
(41)

A ____ is a program that is activated when a certain condition is detected.

(Multiple Choice)
4.8/5
(33)

  Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs. Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs.

(True/False)
4.9/5
(27)

Biometrics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. _________________________

(True/False)
4.8/5
(32)

  Cryptogram is the process of converting readable data into unreadable characters by applying a formula that uses a code as shown in the accompanying figure. _________________________ Cryptogram is the process of converting readable data into unreadable characters by applying a formula that uses a code as shown in the accompanying figure. _________________________

(True/False)
4.8/5
(38)

A(n) ____________________ is a malfunction of a computer system.

(Short Answer)
4.9/5
(36)

By acquiring data from public and other sources, national marketing organizations can create an electronic profile of an individual.

(True/False)
4.8/5
(43)

Critical Thinking Case 8-2 You believe that your information privacy has been violated. You receive a call from your bank indicating that a large amount of money has been withdrawn. Which of the following is a likely cause of someone obtaining your personal and financial information?

(Multiple Choice)
4.8/5
(36)

____ is a service that blocks e-mail messages from designated sources.

(Multiple Choice)
4.7/5
(31)

  Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it. Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it.

(Essay)
4.9/5
(42)

____ studies have shown that using the correct type and configuration of chair, keyboard, display device and worksurface helps users work comfortably and efficiently, and helps protect their health.

(Multiple Choice)
4.8/5
(36)

  In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____. In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____.

(Multiple Choice)
4.9/5
(37)

Product registration is an antipiracy technology designed to verify that software products have been licensed legitimately. _________________________

(True/False)
5.0/5
(38)

A worm is a malicious software program that hides within a legitimate program.

(True/False)
4.9/5
(38)

A(n) ____________________ is a type of logic bomb that is activated on a particular date.

(Short Answer)
4.9/5
(36)

  A(n) ____________________ is designed to detect, disinfect, and protect computers and networks from viruses like those in the accompanying figure. A(n) ____________________ is designed to detect, disinfect, and protect computers and networks from viruses like those in the accompanying figure.

(Short Answer)
4.9/5
(49)

The daVinci virus destroys data on March 6, the date of the artist's birthday. _________________________

(True/False)
4.8/5
(44)

  Software licenses like the one in the accompanying figure are agreements that ____. Software licenses like the one in the accompanying figure are agreements that ____.

(Multiple Choice)
4.8/5
(36)

A(n) ____ is a complete power failure.

(Multiple Choice)
4.9/5
(44)

Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions.

(True/False)
4.8/5
(38)
Showing 41 - 60 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)