Exam 8: Security Issues and Ethics in Education

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A proxy server screens all incoming and outgoing messages.

(True/False)
4.8/5
(39)

A community/state site license normally does not provide substantial savings over single-use licenses.

(True/False)
4.8/5
(41)

A complete power failure is called a(n) ____________________.

(Short Answer)
4.8/5
(38)

____ is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient.

(Multiple Choice)
4.9/5
(34)

People who try to access computer systems illegally are called ____________________.

(Short Answer)
4.8/5
(29)

  All of the following are true concerning viruses like those described in the accompanying figure EXCEPT ____. All of the following are true concerning viruses like those described in the accompanying figure EXCEPT ____.

(Multiple Choice)
4.9/5
(43)

  Most viruses like those described in the accompanying figure are harmless pranks that cause no permanent damage. Most viruses like those described in the accompanying figure are harmless pranks that cause no permanent damage.

(True/False)
4.9/5
(48)

  A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure. A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the accompanying figure.

(Multiple Choice)
4.9/5
(34)

A(n) ____________________ allows network users to share a single copy of the software, which resides on the network server.

(Short Answer)
4.8/5
(34)

Many display devices and keyboards have features that help address ergonomic issues.

(True/False)
4.8/5
(29)

____ prevents your browser from displaying materials from targeted sites or sites that contain certain keywords or phrases.

(Multiple Choice)
4.8/5
(40)

In case a file is corrupted or destroyed, a user can utilize the backup copies to ____________________, or reload, the files on a computer.

(Short Answer)
4.9/5
(48)

Modified Multiple Choice Computer vandalism includes ____.

(Multiple Choice)
4.7/5
(29)

Copyright laws protect original materials created by students and teachers and published on the Web.

(True/False)
4.7/5
(37)

Critical Thinking Case 8-1 Your computer is not behaving normally and you need to investigate. You discover that the computer has limited resources and shuts down frequently. Which of the following viruses might your computer have?

(Multiple Choice)
4.8/5
(40)

____________________ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.

(Short Answer)
4.8/5
(38)

An Acceptable Use Policy (AUP) is a set of rules that governs the use of school and school district computers, networks, and the Internet by teachers, administrators, staff, and students. Briefly describe guidelines that many AUPs contain.

(Essay)
4.9/5
(41)

A(n) ____ occurs when the electrical power supply drops.

(Multiple Choice)
4.9/5
(44)

____ applies to all creative works and provides certain rights to authors.

(Multiple Choice)
4.8/5
(35)

Any illegal act involving a computer generally is referred to as a computer crime.

(True/False)
4.8/5
(43)
Showing 81 - 100 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)