Exam 11: Computer Security, Ethics, and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) IT ____________________ is a written guideline that helps determine whether a specific computer action is ethical or unethical.

(Short Answer)
4.9/5
(38)

Intrusion detection software is quite inexpensive.

(True/False)
4.8/5
(40)

Web sites use a ____ to keep track of items in a user's shopping cart.

(Multiple Choice)
4.7/5
(39)

For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet.

(True/False)
4.8/5
(34)

A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.

(True/False)
4.8/5
(29)

____________________ is the use of a computer or its data for unapproved or possibly illegal activities.

(Short Answer)
4.9/5
(34)

Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart.

(True/False)
4.7/5
(42)

Computer addiction is an untreatable illness.

(True/False)
4.9/5
(39)

Any illegal act involving a computer generally is referred to as a computer security risk.

(True/False)
4.7/5
(35)

____________________ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.

(Short Answer)
4.7/5
(28)

____ is the process of converting readable data into unreadable characters to prevent unauthorized access.

(Multiple Choice)
4.9/5
(29)

____________________ occurs when a computer consumes someone's entire social life.

(Short Answer)
4.8/5
(37)

An online UPS switches to battery power when a problem occurs in the power line.

(True/False)
4.9/5
(30)

A ____ is the unit of energy a surge protection device can absorb before it can be damaged.

(Multiple Choice)
4.9/5
(36)

Digital retouching of photographs is an area in which legal precedents have been established.

(True/False)
4.7/5
(32)

____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

(Multiple Choice)
4.8/5
(38)

A(n) ____ copies all of the files in a computer.

(Multiple Choice)
4.8/5
(28)

A(n) ____ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

(Multiple Choice)
4.8/5
(24)

Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.

(True/False)
4.7/5
(33)

To prevent unauthorized access and use, at a minimum a company should have a written ____ that outlines the computer activities for which a computer or network may and may not be used.

(Multiple Choice)
4.8/5
(30)
Showing 141 - 160 of 191
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)