Exam 2: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is the operation of a fake website by someone trying to gain access to customer's private information.

(Short Answer)
4.8/5
(35)

A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome.

(True/False)
4.7/5
(35)

Spam messages often carry attached files with embedded ____________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files.

(Short Answer)
4.9/5
(32)

What is the main reason that one would use antivirus software?

(Multiple Choice)
5.0/5
(36)

Organizations implement ____________________ software to prevent employees from visiting websites not related to work.

(Short Answer)
4.7/5
(32)

What is the term for publishing an intentionally false written statement that is damaging to a person's or an organization's reputation?

(Multiple Choice)
5.0/5
(35)

____________________ spam is a new tactic spammers use to circumvent spam-filtering software.

(Short Answer)
4.9/5
(38)

What is the term used to denote the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them?

(Multiple Choice)
4.9/5
(42)

Following an investigation by the Privacy Commissioner of Canada, what was Facebook forced to change in order to comply with PIPEDA?

(Multiple Choice)
4.9/5
(41)

You just bought the latest Call of Duty video game and Larry asks you to make a copy for him and he will pay you for it.Under what issue would this situation fall?

(Multiple Choice)
4.9/5
(33)

What small program, hidden in a network or computer system, records identification numbers and passwords?

(Multiple Choice)
4.9/5
(41)

Deleting the contents of the Recycle Bin make it impossible for individuals to view the deleted data.

(True/False)
4.8/5
(44)

The Electronic Commerce Protection Act (ECPA) is Canada's anti-spam and malware law.

(True/False)
4.7/5
(36)

Who has extra knowledge of logon IDs, passwords, and company procedures that helps them evade detection and makes them especially dangerous?

(Multiple Choice)
4.9/5
(36)

According to the Nielsen survey, over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic websites.

(True/False)
4.8/5
(42)

When waste is identified, it usually points to one common cause: the improper management of information systems and resources.

(True/False)
4.9/5
(43)

With ____________________ tools, law enforcement agencies can analyze crime data relative to other factors, including the locations of common crime scenes and certain demographic data.

(Short Answer)
4.9/5
(27)

Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use.

(Short Answer)
4.9/5
(30)

A(n) ____________________ is a person paid by a company to pose as a satisfied customer in order to lure other people into buying into the get-rich-quick plan.

(Short Answer)
4.8/5
(41)

Federal law prohibits private employers from monitoring e-mail sent or received by their employees.

(True/False)
4.7/5
(43)
Showing 61 - 80 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)