Exam 14: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against, computers, networks, and the information stored on them.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

False

____________________ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

Spyware

Just over 300,000 crimes were reported to the Internet Crime Computer Center in 2010 and this represents the majority of computer-related crimes.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

Just because an act is defined as legal does not mean that it is ____________________.

(Short Answer)
4.9/5
(31)

______ is a small program hidden in a network or computer system that records identification numbers and passwords.

(Multiple Choice)
4.8/5
(40)

Patent laws protect processes, machines, and compositions of matter.

(True/False)
4.8/5
(35)

Role-based system access means that only people who fill or used to fill a certain role can access a specific system.

(True/False)
4.8/5
(35)

A useful guideline to protect corporate computers from criminal hackers is to ____.

(Multiple Choice)
4.8/5
(32)

Software is considered intellectual property and may be protected by copyright or ____________________ law.

(Short Answer)
4.8/5
(32)

If a court determines that a patent infringement is intentional, it can award up to _____ to the patent holder.

(Multiple Choice)
4.8/5
(27)

The use of e-mail among public officials might violate "open meeting" laws.

(True/False)
4.7/5
(26)

The federal agency to which identity theft complaints are made is the ______.

(Multiple Choice)
4.7/5
(30)

Both SOPA and PIPA are two bills proposed by congress that aim to __________________.

(Multiple Choice)
4.8/5
(28)

To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.

(True/False)
4.8/5
(26)

Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance group to provide improved e-mail security and protection from phishing.

(True/False)
4.8/5
(32)

If an activity is defined as legal then it is ethical.

(True/False)
4.9/5
(37)

The FBI's Domestic Investigations and Operations Guide encourages agents to consider dumpster diving as a technique to gain information.

(True/False)
4.7/5
(41)

Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.

(True/False)
5.0/5
(35)

Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.

(True/False)
4.9/5
(28)

A script bunny is a young, female computer hacker.

(True/False)
4.9/5
(43)
Showing 1 - 20 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)