Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

You can violate your own privacy by unintentionally releasing information about yourself that can be exploited by aggressive marketing companies, hackers, and criminals.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

A ____ is a snapshot of your computer settings and are essentially backups of the Windows Registry.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

Small ____ tags sewn into clothing communicate with inventory tracking systems.

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

A

A(n) ____________________ is issued by a certificate authority that essentially vouches for the certificate holder's identity.

(Short Answer)
4.9/5
(29)

The original wireless encryption was called ____ and was designed to provide a level of confidentiality similar to that of a wired network.

(Multiple Choice)
4.8/5
(31)

Coded software scrambles your data by using a multi-digit key._________________________

(True/False)
4.7/5
(35)

A typical ____ scam begins with a faked e-mail message that seems to be an official notice from a trusted source, such as a credit card company, online payment service, software vendor, or bank.

(Multiple Choice)
5.0/5
(35)

Case 22-1 Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below. -A professor contacts Genevieve saying that he thinks he has a computer virus, but he has been on vacation for a month, and has not used his computer.Genevieve explains that ____.

(Multiple Choice)
4.8/5
(33)

  -In the figure above, the Key 1: that is shown is also referred to as a(n) ____ key. -In the figure above, the "Key 1:" that is shown is also referred to as a(n) ____ key.

(Multiple Choice)
4.7/5
(36)

____ typically protect works such as software, photos, movies, and music.

(Multiple Choice)
4.8/5
(37)

____________________ refers to any physical method used to prevent works from being copied.

(Short Answer)
4.8/5
(41)

Most malicious code is stored in executable files, usually with ____ file name extensions.

(Multiple Choice)
4.8/5
(38)

A ____ worm makes use of information on an infected computer to mail itself to everyone listed in the e-mail address book.

(Multiple Choice)
4.8/5
(44)

A ____ uses a home-based computer and telecommunications equipment to perform work-related tasks.

(Multiple Choice)
4.8/5
(38)

Viruses spread themselves from one computer to another.

(True/False)
4.8/5
(28)

Legitimate macros are used to automate common word processing or spreadsheet tasks.

(True/False)
4.8/5
(28)

Personal information can be defined as any data that is associated with you as an individual.

(True/False)
4.9/5
(30)

Case 22-1 Genevieve is in charge of Internet Security for a small New England college. Please answer the questions below. -Genevieve has received three reports today, from students, about a computer virus that is spreading from one computer to another automatically with the name "Hello Friend." Genevieve knows the problem is not a virus because computer viruses ____.

(Multiple Choice)
4.8/5
(35)

  -In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____. -In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.

(Multiple Choice)
4.9/5
(27)

____ use allows you to insert fragments of literary works in research papers without first gaining permission from their authors.

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)