Exam 15: Computer Security and Privacy
Exam 1: Introduction to the World of Computers100 Questions
Exam 2: The System Unit: Processing and Memory100 Questions
Exam 3: Storage100 Questions
Exam 4: Input and Output100 Questions
Exam 5: System Software: Operating Systems and Utility Programs100 Questions
Exam 6: Application Software100 Questions
Exam 7: Computer Networks100 Questions
Exam 8: The Internet and the World Wide Web100 Questions
Exam 9: Network and Internet Security100 Questions
Exam 10: Multimedia and the Web100 Questions
Exam 11: E-Commerce100 Questions
Exam 12: Information Systems and System Development100 Questions
Exam 13: Program Development and Programming Languages100 Questions
Exam 14: Databases and Database Management Systems100 Questions
Exam 15: Computer Security and Privacy100 Questions
Exam 16: Intellectual Property Rights, Ethics, Health, Access, and the Environment100 Questions
Select questions type
____ systems encrypt everything stored on the drive (the operating system,application programs,data,temporary files,and so forth)automatically without any user interaction.
(Multiple Choice)
4.8/5
(40)
By ____,you instruct companies you do business with that they cannot share your personal data with third parties.
(Multiple Choice)
4.9/5
(45)
Creating a ____ means making a duplicate copy of important files so that when a problem occurs,you can restore those files using the copy.
(Multiple Choice)
5.0/5
(34)
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting,watermarks,and other difficult-to-reproduce content.
(True/False)
4.7/5
(36)
A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk.
(True/False)
4.8/5
(39)
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
-To further protect his privacy,Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.
(Multiple Choice)
4.9/5
(43)
Most businesses and Web sites that collect personal information have a(n)____ that discloses how the personal information you provide will be used.
(Multiple Choice)
4.9/5
(36)
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.
(Short Answer)
4.8/5
(35)
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
-Before providing any personal information on a shopping site,Samuel always reads the Web site's ____.
(Multiple Choice)
4.8/5
(33)
Software piracy can occur because of a natural disaster (such as a tornado,fire,flood,or hurricane),sabotage,or terrorist attack.
(True/False)
4.8/5
(34)
____ is the use of video cameras to monitor activities of individuals,such as employees or individuals in public locations,for work-related or crime-prevention purposes.
(Multiple Choice)
4.8/5
(37)
Hardware theft can take many forms,including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
(True/False)
4.9/5
(36)
Using electronic means to collect a variety of in-depth information about an individual,such as name,address,income,and buying habits is called ____________________.
(Short Answer)
4.9/5
(41)
____________________ procedures,such as making copies of important documents and storing them in a safe location,also apply to important nonelectronic documents in your life,such as birth certificates,tax returns,passports,and so forth.
(Short Answer)
4.9/5
(38)
____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.
(Short Answer)
4.8/5
(25)
Showing 81 - 100 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)