Exam 11: Computer Security, Ethics, and Privacy
Exam 1: Introduction to Computers191 Questions
Exam 2: The Internet and World Wide Web191 Questions
Exam 3: Application Software191 Questions
Exam 4: The Components of the System Unit191 Questions
Exam 5: Input181 Questions
Exam 6: Output191 Questions
Exam 7: Storage191 Questions
Exam 8: Operating Systems and Utility Programs191 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management191 Questions
Exam 11: Computer Security, Ethics, and Privacy191 Questions
Exam 12: Information System Development191 Questions
Exam 13: Programming Languages and Program Development191 Questions
Exam 14: Enterprise Computing191 Questions
Exam 15: Computer Careers and Certification191 Questions
Select questions type
A(n) IT ____________________ is a written guideline that helps determine whether a specific computer action is ethical or unethical.
(Short Answer)
4.9/5
(38)
Web sites use a ____ to keep track of items in a user's shopping cart.
(Multiple Choice)
4.7/5
(39)
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet.
(True/False)
4.8/5
(34)
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
(True/False)
4.8/5
(29)
____________________ is the use of a computer or its data for unapproved or possibly illegal activities.
(Short Answer)
4.9/5
(34)
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart.
(True/False)
4.7/5
(42)
Any illegal act involving a computer generally is referred to as a computer security risk.
(True/False)
4.7/5
(35)
____________________ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
(Short Answer)
4.7/5
(28)
____ is the process of converting readable data into unreadable characters to prevent unauthorized access.
(Multiple Choice)
4.9/5
(29)
____________________ occurs when a computer consumes someone's entire social life.
(Short Answer)
4.8/5
(37)
An online UPS switches to battery power when a problem occurs in the power line.
(True/False)
4.9/5
(30)
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.
(Multiple Choice)
4.9/5
(36)
Digital retouching of photographs is an area in which legal precedents have been established.
(True/False)
4.7/5
(32)
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
(Multiple Choice)
4.8/5
(38)
A(n) ____ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
(Multiple Choice)
4.8/5
(24)
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.
(True/False)
4.7/5
(33)
To prevent unauthorized access and use, at a minimum a company should have a written ____ that outlines the computer activities for which a computer or network may and may not be used.
(Multiple Choice)
4.8/5
(30)
Showing 141 - 160 of 191
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)