Exam 11: Computer Security, Ethics, and Privacy
Exam 1: Introduction to Computers191 Questions
Exam 2: The Internet and World Wide Web191 Questions
Exam 3: Application Software191 Questions
Exam 4: The Components of the System Unit191 Questions
Exam 5: Input181 Questions
Exam 6: Output191 Questions
Exam 7: Storage191 Questions
Exam 8: Operating Systems and Utility Programs191 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management191 Questions
Exam 11: Computer Security, Ethics, and Privacy191 Questions
Exam 12: Information System Development191 Questions
Exam 13: Programming Languages and Program Development191 Questions
Exam 14: Enterprise Computing191 Questions
Exam 15: Computer Careers and Certification191 Questions
Select questions type
A(n) ____________________ uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
(Short Answer)
4.9/5
(34)
A(n) ____________________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
(Short Answer)
4.9/5
(28)
Figure 11-4 A(n) ____ object, an example of which is shown in Figure 11-4, is any item that must be carried to gain access to a computer or computer facility.

(Multiple Choice)
4.8/5
(39)
Users may have ____________________ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
(Short Answer)
4.8/5
(39)
Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
(True/False)
4.9/5
(32)
A(n) ____________________ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
(Short Answer)
4.9/5
(39)
The term ____ refers to online or Internet-based illegal acts.
(Multiple Choice)
4.9/5
(42)
____________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
(Short Answer)
4.8/5
(33)
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
(Multiple Choice)
4.8/5
(44)
Software ____________________ is the unauthorized and illegal duplication of copyrighted software.
(Short Answer)
4.8/5
(30)
Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer.
(True/False)
4.8/5
(47)
Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers.

(Short Answer)
4.8/5
(25)
The higher a surge protector's Joule rating, the poorer the protection.
(True/False)
4.7/5
(37)
____ access is the use of a computer or network without permission.
(Multiple Choice)
4.9/5
(42)
____________________ involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
(Short Answer)
4.8/5
(30)
A ____ is a small text file that a Web server stores on a user's computer.
(Multiple Choice)
4.9/5
(35)
A(n) ____________________ is someone who uses e-mail as a vehicle for extortion.
(Short Answer)
5.0/5
(33)
In addition to access controls, a computer should maintain a(n) ____ trail that records both successful and unsuccessful access attempts.
(Multiple Choice)
4.8/5
(33)
Showing 161 - 180 of 191
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)