Exam 2: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Briefly discuss some of the health-related issues associated with heavy computer use.

(Essay)
4.8/5
(44)

A rejected e-mail automatically goes to the junk e-mail folder provided by your e-mail service.

(True/False)
4.8/5
(47)

Tracking software for laptops is not yet available.

(True/False)
4.7/5
(37)

The CAN-SPAM Act allows most e-mail spam to be sent as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.

(True/False)
4.9/5
(32)

The use of e-mail among public officials might violate transborder data flow laws.

(True/False)
5.0/5
(35)

A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks.

(Short Answer)
5.0/5
(36)

The ____________________ is the oldest computing society and boasts more than 80,000 members in more than 100 countries.

(Short Answer)
4.8/5
(35)

Define the term "spyware" and briefly describe three types of this malware.

(Essay)
4.9/5
(31)

What variable value is applied, using an algorithm, to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text?

(Multiple Choice)
4.8/5
(29)

Arash realized recently that someone has been withdrawing money from his account and is making purchases using his credit card.What type of computer crime is this?

(Multiple Choice)
4.9/5
(40)

The ____________________ Card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.

(Short Answer)
4.8/5
(42)

If a court determines that a patent infringement is intentional and the patent holder claims $5 million in damages, up to what amount can the patent holder be awarded?

(Multiple Choice)
4.8/5
(42)

Unfortunately, many intrusion detection systems frequently provide false alarms that result in wasted effort.

(True/False)
4.9/5
(43)

A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.

(Short Answer)
4.8/5
(34)

Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defences.

(Short Answer)
4.8/5
(35)

What condition can result from a job that involves sitting at a desk and using a computer all day?

(Multiple Choice)
4.9/5
(35)

Often, computer criminals manipulate people and get them to reveal their confidential information.This practice is called _______________.

(Short Answer)
4.7/5
(37)

Which of the following is FALSE about the Electronic Commerce Protection Act (ECPA)?

(Multiple Choice)
4.7/5
(40)

The Canadian government has established the Canadian Cyber Incident Response Centre to combat cyber attacks.

(True/False)
4.8/5
(37)

Software piracy is the act of authorized copying or distribution of copyrighted software.

(True/False)
4.7/5
(37)
Showing 41 - 60 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)