Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

To access Windows Firewall when using Windows, type "____" in the Start menu's Search box.

(Multiple Choice)
4.9/5
(26)

A Trojan ant is a computer program that seems to perform one function while actually doing something else, and is not designed to make copies of itself._________________________

(True/False)
5.0/5
(31)

____ software is designed to analyze the flow of traffic entering your computer from a network.

(Multiple Choice)
4.9/5
(29)

You can make copies for your own use and you can make copies under ____________________ regulations, which allow you to copy small excerpts of copyrighted works for use in educational materials and critical reviews.

(Short Answer)
4.8/5
(31)

Web site ____________________, the process of intentionally blocking access to certain sites, is controversial.

(Short Answer)
4.8/5
(26)

A virus clue is a section of code, such as a unique series of instructions, that can be used to identify a known virus or worm, much as a fingerprint is used to identify an individual._________________________

(True/False)
4.9/5
(31)

Gossip is defined as false and malicious statements published for the purpose of damaging the reputation of a living person._________________________

(True/False)
4.9/5
(31)

Many businesses that collect data online offer a(n) privacy policy that describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access._________________________

(True/False)
4.9/5
(30)

Personal information about your health, grades, charitable donations, and purchases is stored in a very limited number of places.

(True/False)
4.8/5
(31)

Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.

(Multiple Choice)
4.7/5
(42)

A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

(Multiple Choice)
4.9/5
(33)

____ key, also referred to as "personal mode," is a type of WPA used on most home networks.

(Multiple Choice)
4.8/5
(33)

____ violations take place when your personal information is distributed or your online activities are tracked without your permission.

(Multiple Choice)
4.8/5
(35)

Explain how you can use a router instead of a firewall to protect your computer from intrusions.

(Essay)
4.9/5
(31)

One of the forms of malicious code is worms.Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.

(Essay)
4.8/5
(41)

In the United States, ____ prevents health care organizations from distributing patient information without written permission, and gives patients the right to amend incorrect or missing information in their records.

(Multiple Choice)
4.7/5
(36)

____ typically protect corporate logos and product names.

(Multiple Choice)
4.8/5
(44)

____________________ is any technology that surreptitiously gathers information.

(Short Answer)
4.9/5
(38)

The process of eradicating a virus-sometimes called "____"-might include deleting the virus code from files or deleting infected files.

(Multiple Choice)
4.8/5
(31)

Copyright law prohibits all copying.

(True/False)
4.9/5
(30)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)