Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Exam 10: Multimedia and the Web100 Questions
Exam 11: E-Commerce100 Questions
Exam 12: Information Systems and System Development100 Questions
Exam 13: Program Development and Programming Languages100 Questions
Exam 14: Databases and Database Management Systems100 Questions
Exam 15: Computer Security and Privacy100 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
(True/False)
4.9/5
(39)
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time,even just a few minutes ago,when needed.
(True/False)
4.8/5
(44)
You can surf anonymously,opt out of some marketing activities,and use filters and other tools to limit your exposure to spam.
(True/False)
4.8/5
(42)
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
(Multiple Choice)
4.8/5
(46)
To prevent the counterfeiting of U.S.currency,the Treasury Department releases new currency designs every ____.
(Multiple Choice)
4.8/5
(25)
For online shopping,signing up for free offers,discussion groups,product registration,and other activities that typically lead to junk e-mail,use a disposable or ____.
(Multiple Choice)
4.9/5
(27)
To facilitate using a computer lock,nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
(Multiple Choice)
4.8/5
(36)
____________________ occurs when hardware is stolen from an individual or from a business,school,or other organization.
(Short Answer)
4.8/5
(26)
To supplement backup procedures,businesses and other organizations should have a(n)____.
(Multiple Choice)
4.9/5
(32)
-Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____,as shown in the accompanying figure.

(Multiple Choice)
4.9/5
(36)
For users who need more protection than a protective case can provide,____________________ devices (such as portable computers and mobile phones)are available.
(Short Answer)
4.7/5
(31)
The U.S.____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam,spyware,and Internet fraud and deception.
(Short Answer)
4.7/5
(30)
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
(Multiple Choice)
4.8/5
(34)
Scam refers to unsolicited e-mail sent to a large group of individuals at one time.
(True/False)
4.9/5
(33)
Semirugged PCs are designed to withstand drops of three feet or more onto concrete,extreme temperature ranges,wet conditions,and use while being bounced around over rough terrain in a vehicle.
(True/False)
4.7/5
(40)
By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws,the industry hopes to reduce the known use of illegal software significantly.
(Short Answer)
4.7/5
(29)
Law enforcement agencies contend that ____________________ systems and public video surveillance are no different than the many private video surveillance systems in place today.
(Short Answer)
4.8/5
(42)
____ are small programs that take care of software-specific problems,or bugs,such as security holes.
(Multiple Choice)
4.8/5
(36)
To prevent pop-up ads from disturbing your Internet sessions,use a(n)antipop-up cookie-such as the one built-into the Google toolbar or the ones that can be enabled through many Web browsers.
(True/False)
4.8/5
(38)
Although many of us may prefer not to think about it,____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)