Exam 2: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To obtain a patent or to determine whether a patent exists in an area a company seeks to exploit, the Canadian Patent Office requires the company to submit a $1 million deposit.

(True/False)
4.8/5
(38)

What is the practice of disguising illegally gained funds so that they seem legal?

(Multiple Choice)
4.8/5
(36)

Which of the following is an effective way of protecting computer systems against hackers?

(Multiple Choice)
4.9/5
(36)

Flexibility is a major component of ergonomics and an important feature in computer devices.

(True/False)
4.9/5
(29)

Copyright laws protect processes, machines, and compositions of matter.

(True/False)
4.9/5
(31)

Company YU recently added a paragraph on its website outlining how the information requested from its clients would be used and disclosed to third parties or vendors.Under which legislation would YU be convicted if it failed to comply to the rules governing management of personal information?

(Multiple Choice)
4.8/5
(40)

Recent court cases and police reports involving computer crime show that lawmakers are not yet ready to introduce newer and tougher computer crime legislation.

(True/False)
4.9/5
(39)

Ian was recently laid off from the company and, with the help of his cousin who works for the competitor; he got into the company's file system and installed a virus.What term is used to refer to Ian in relation to the computer crime he committed?

(Multiple Choice)
4.9/5
(38)

To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.

(True/False)
4.8/5
(37)

What act prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause?

(Multiple Choice)
4.7/5
(33)

____________________ issues deal with what is generally considered right or wrong.

(Short Answer)
4.8/5
(33)

Peter is a smart hacker.He talks people into sharing important information about the system they are using and then uses what he learns to hack into their system.What term refers to this type of crime?

(Multiple Choice)
4.9/5
(33)
Showing 81 - 92 of 92
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)