Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

  -The figure above shows the ____ configuration software. -The figure above shows the ____ configuration software.

(Multiple Choice)
5.0/5
(35)

Virus software is a set of utility programs that looks for and eradicates viruses and worms._________________________

(True/False)
4.8/5
(32)

Although ____ property can be fixed in tangible media the underlying "property" is not necessarily tied to a particular media.

(Multiple Choice)
4.9/5
(35)

The marketing firms that distribute ad-serving cookies claim that this data is simply used to select and display ads that might interest you.

(True/False)
4.8/5
(30)

The music industry, the Recording Industry Association of America (RIAA) is attempting to stop rampant ____ music sharing on the Internet.

(Multiple Choice)
4.9/5
(41)

When setting up wireless encryption, you will create an encryption ____, which works like a password.

(Multiple Choice)
5.0/5
(37)

Information security refers to the techniques used to protect information from unauthorized access, damage, disclosure, loss, modification, or use._________________________

(True/False)
4.9/5
(28)

____ is the study of work and work environments, with the goal being to make work environments safer and healthier.

(Multiple Choice)
4.9/5
(31)

____________________ refers to intangibles, such as ideas, music, art, photos, logos, movies, and programs, that are the result of creativity and intellectual effort.

(Short Answer)
4.8/5
(35)

Copyright law makes it illegal to copy and distribute protected works without the permission of the author or the author's representative._________________________

(True/False)
4.9/5
(32)

In order to gain access to a(n) ____________________ Web site, you typically have to register for an account and password.

(Short Answer)
4.8/5
(33)

____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.

(Short Answer)
4.8/5
(38)

Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer over ____.

(Multiple Choice)
4.7/5
(39)

____________________ occurs when someone obtains your personal information and uses it without your permission to commit fraud or other crimes.

(Short Answer)
4.9/5
(24)

  -Referring to the figure above, if these were your settings, ____ would be scanned for viruses. -Referring to the figure above, if these were your settings, ____ would be scanned for viruses.

(Multiple Choice)
4.8/5
(35)
Showing 61 - 75 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)