Exam 15: Computer Security and Privacy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ systems encrypt everything stored on the drive (the operating system,application programs,data,temporary files,and so forth)automatically without any user interaction.

(Multiple Choice)
4.8/5
(40)

By ____,you instruct companies you do business with that they cannot share your personal data with third parties.

(Multiple Choice)
4.9/5
(45)

Creating a ____ means making a duplicate copy of important files so that when a problem occurs,you can restore those files using the copy.

(Multiple Choice)
5.0/5
(34)

Cookies and spyware are possible privacy risks.

(True/False)
4.8/5
(36)

Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting,watermarks,and other difficult-to-reproduce content.

(True/False)
4.7/5
(36)

A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk.

(True/False)
4.8/5
(39)

Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information. -To further protect his privacy,Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

(Multiple Choice)
4.9/5
(43)

Most businesses and Web sites that collect personal information have a(n)____ that discloses how the personal information you provide will be used.

(Multiple Choice)
4.9/5
(36)

One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.

(Short Answer)
4.8/5
(35)

Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information. -Before providing any personal information on a shopping site,Samuel always reads the Web site's ____.

(Multiple Choice)
4.8/5
(33)

Software piracy can occur because of a natural disaster (such as a tornado,fire,flood,or hurricane),sabotage,or terrorist attack.

(True/False)
4.8/5
(34)

When spam is sent via IM it is called ____.

(Multiple Choice)
4.8/5
(40)

____ is the use of video cameras to monitor activities of individuals,such as employees or individuals in public locations,for work-related or crime-prevention purposes.

(Multiple Choice)
4.8/5
(37)

Hardware theft can take many forms,including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.

(True/False)
4.9/5
(36)

What do surge suppressors do?

(Essay)
4.8/5
(40)

Using electronic means to collect a variety of in-depth information about an individual,such as name,address,income,and buying habits is called ____________________.

(Short Answer)
4.9/5
(41)

____________________ procedures,such as making copies of important documents and storing them in a safe location,also apply to important nonelectronic documents in your life,such as birth certificates,tax returns,passports,and so forth.

(Short Answer)
4.9/5
(38)

____________________ refers to following a predesignated procedure to remove yourself from marketing lists or otherwise preventing your personal information from being obtained by or shared with others.

(Short Answer)
4.8/5
(25)

Discuss the features and benefits of continuous data protection.

(Essay)
4.8/5
(29)

Describe e-mail filters.

(Essay)
4.8/5
(35)
Showing 81 - 100 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)