Exam 11: Computer Security, Ethics, and Privacy
Exam 1: Introduction to Computers191 Questions
Exam 2: The Internet and World Wide Web191 Questions
Exam 3: Application Software191 Questions
Exam 4: The Components of the System Unit191 Questions
Exam 5: Input181 Questions
Exam 6: Output191 Questions
Exam 7: Storage191 Questions
Exam 8: Operating Systems and Utility Programs191 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management191 Questions
Exam 11: Computer Security, Ethics, and Privacy191 Questions
Exam 12: Information System Development191 Questions
Exam 13: Programming Languages and Program Development191 Questions
Exam 14: Enterprise Computing191 Questions
Exam 15: Computer Careers and Certification191 Questions
Select questions type
The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.
(True/False)
4.9/5
(34)
Discuss what a virus is and related examples of malware, and include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Also discuss the symptoms of a computer's having been infected with a virus.
(Essay)
4.8/5
(39)
Explain at least three safeguards you can use to improve the security of wireless networks.
(Essay)
4.8/5
(25)
Figure 11-3 As shown in Figure 11-3, a(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

(Short Answer)
4.8/5
(30)
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
(Multiple Choice)
4.9/5
(40)
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
(Multiple Choice)
4.8/5
(35)
Online backup is not practical for users with high-speed Internet connections.
(True/False)
4.9/5
(33)
Some viruses are hidden in ____, which are instructions saved in an application such as a word processing or spreadsheet program.
(Multiple Choice)
4.9/5
(40)
____________________ are the moral guidelines that govern the use of computers and information systems.
(Short Answer)
5.0/5
(35)
____________________ is a program placed on a computer without the user's knowledge that secretly collects information about the user.
(Short Answer)
4.8/5
(32)
A computer ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
(Multiple Choice)
4.9/5
(24)
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
(Multiple Choice)
4.8/5
(35)
The most common type of license included with software purchased by individual users is a(n) ____.
(Multiple Choice)
4.8/5
(42)
A Web site that uses encryption techniques to secure its data is known as a(n) ____ site.
(Multiple Choice)
4.9/5
(34)
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
(Multiple Choice)
4.8/5
(31)
Figure 11-3 To ____ a program file, a program like the one in Figure 11-3 records information such as the file size and file creation date in a separate file.

(Multiple Choice)
4.9/5
(36)
Content ____ is the process of restricting access to certain material on the Web.
(Multiple Choice)
4.8/5
(39)
Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.
(Essay)
4.8/5
(41)
Showing 61 - 80 of 191
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)