Exam 14: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Some web sites offer digital tools-often without charge-that let people snoop, crash computers, hijack control of a machine, or retrieve a copy of every keystroke.

Free
(True/False)
4.8/5
(26)
Correct Answer:
Verified

True

Incidents of identity theft are reported to the Federal Trade Commission (FTC).

Free
(True/False)
5.0/5
(34)
Correct Answer:
Verified

True

Only few small and mid-sized organizations are willing to outsource their network security operations.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

In order to protect the privacy of employees, email messages that have been erased from hard disks cannot be retrieved.

(True/False)
4.8/5
(39)

Organizations continue to operate their businesses using integrated information systems that leads to missed opportunities, increased costs, and lost sales.

(True/False)
4.7/5
(37)

Proper use of antivirus software requires:

(Multiple Choice)
4.7/5
(40)

Outline six useful policies to minimize computer-related waste and mistakes.

(Essay)
4.9/5
(40)

The act of going through the trash of an organization to find secret or confidential information, including information needed to access an information system or its data is known as _____.

(Short Answer)
4.7/5
(35)

A useful guideline to protect corporate computers from criminal hackers is to _____.

(Multiple Choice)
4.9/5
(31)

Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.

(True/False)
4.9/5
(35)

Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.

(True/False)
4.8/5
(30)

_____ is the act of unauthorized copying, downloading, sharing, selling, or installing of software.

(Short Answer)
4.8/5
(34)

Catching and convicting criminal hackers remains an easy task, and the method behind these crimes is often easy to determine.

(True/False)
4.7/5
(36)

A(n) _____ is a malicious program that disguises itself as a useful application or game and purposefully does something a user does not expect.

(Short Answer)
4.9/5
(25)

_____ is a set of programs that enables its user to gain administrator level access to a computer or network.

(Multiple Choice)
4.7/5
(34)

The hazardous activities associated with unfavorable working conditions are collectively referred to as _____.

(Short Answer)
4.8/5
(36)

Penalties for software piracy are lenient and liberal.

(True/False)
4.9/5
(38)

Role-based system access means that only people who fill a particular role can access a specific system.

(True/False)
4.8/5
(32)

A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

(Multiple Choice)
4.8/5
(29)

A job that requires sitting at a desk and using a computer for many hours a day can lead to:

(Multiple Choice)
4.7/5
(41)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)