Exam 2: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What set of programs enables its user to gain administrator-level access to a computer or network?

(Multiple Choice)
4.7/5
(46)

When working at a workstation, the ____________________ of the monitor should be at or just below eye level.

(Short Answer)
4.9/5
(40)

The European Union has a data-protection directive that requires firms to have certain privacy procedures in place if they do which of the following?

(Multiple Choice)
4.9/5
(37)

Which of the following is an example of a company policy regarding the acquisition of computer systems and equipment?"

(Multiple Choice)
4.7/5
(35)

Managed ____________________ providers monitor, manage, and maintain network security for their customers.

(Short Answer)
4.8/5
(38)

Because it is important to maintain accurate data and ensure that people understand their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system's various modules.

(True/False)
4.8/5
(33)

While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.

(True/False)
4.8/5
(42)

Role-based system access means that only people who fill or used to fill a certain role can access a specific system.

(True/False)
4.8/5
(28)

Smartphones, such as the iPhone and Google's Android phone, which can run applications, are impervious to malware.

(True/False)
4.9/5
(39)

Fingerprint authentication devices, used to provide security in the PC environment, are sometimes employed rather than passwords.

(True/False)
4.8/5
(28)

Jason has been fired by his company and he posted on his blog false rumours about his company.What term is used to refer to Jason's postings?

(Multiple Choice)
4.8/5
(26)

Which of the following is TRUE about e-mails?

(Multiple Choice)
4.8/5
(33)

A(n) ____________________ is a modified version of a virus.

(Short Answer)
4.8/5
(40)

____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.

(Short Answer)
4.8/5
(32)

Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.

(True/False)
4.9/5
(32)

What should computer users do if they work at their machines for several hours a day?

(Multiple Choice)
4.8/5
(33)

Few small- and medium-sized organizations are willing to outsource their network security operations.

(True/False)
4.8/5
(39)

Just because an act is defined as legal does not mean that it is ____________________.

(Short Answer)
4.8/5
(44)

Kelsey is a new immigrant to Canada and she has shared her personal information with many institutions and is concerned that they may share her personal information with unauthorized parties without her consent.What type of concern does she have?

(Multiple Choice)
4.9/5
(37)

Many organizations have established best practices to govern and guide employees' moral behaviour and establish a healthy workplace.Into what type of system would these guidelines fall?

(Multiple Choice)
4.8/5
(39)
Showing 21 - 40 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)