Exam 14: The Personal and Social Impact of Computers
Exam 1: An Introduction to Information Systems85 Questions
Exam 2: Information Systems in Organizations85 Questions
Exam 3: Hardware: Input, Processing, and Output Devices85 Questions
Exam 4: Software: Systems and Application Software85 Questions
Exam 5: Database Systems, Data Centers, and Business Intelligence85 Questions
Exam 6: Telecommunications and Networks82 Questions
Exam 7: The Internet, Web, Intranets, and Extranets85 Questions
Exam 8: Electronic and Mobile Commerce85 Questions
Exam 9: Enterprise Systems85 Questions
Exam 10: Information and Decision Support Systems85 Questions
Exam 11: Knowledge Management and Specialized Information Systems85 Questions
Exam 12: Systems Development: Investigation and Analysis85 Questions
Exam 13: Systems Development: Design, Implementation, and Review85 Questions
Exam 14: The Personal and Social Impact of Computers89 Questions
Select questions type
A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against, computers, networks, and the information stored on them.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
____________________ is software installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Spyware
Just over 300,000 crimes were reported to the Internet Crime Computer Center in 2010 and this represents the majority of computer-related crimes.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
Just because an act is defined as legal does not mean that it is ____________________.
(Short Answer)
4.9/5
(31)
______ is a small program hidden in a network or computer system that records identification numbers and passwords.
(Multiple Choice)
4.8/5
(40)
Patent laws protect processes, machines, and compositions of matter.
(True/False)
4.8/5
(35)
Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
(True/False)
4.8/5
(35)
A useful guideline to protect corporate computers from criminal hackers is to ____.
(Multiple Choice)
4.8/5
(32)
Software is considered intellectual property and may be protected by copyright or ____________________ law.
(Short Answer)
4.8/5
(32)
If a court determines that a patent infringement is intentional, it can award up to _____ to the patent holder.
(Multiple Choice)
4.8/5
(27)
The use of e-mail among public officials might violate "open meeting" laws.
(True/False)
4.7/5
(26)
The federal agency to which identity theft complaints are made is the ______.
(Multiple Choice)
4.7/5
(30)
Both SOPA and PIPA are two bills proposed by congress that aim to __________________.
(Multiple Choice)
4.8/5
(28)
To obtain a patent or to determine if a patent exists in an area a company seeks to exploit requires a search by the U.S. Patent Office; these can last longer than 25 months.
(True/False)
4.8/5
(26)
Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication, Reporting, and Conformance group to provide improved e-mail security and protection from phishing.
(True/False)
4.8/5
(32)
The FBI's Domestic Investigations and Operations Guide encourages agents to consider dumpster diving as a technique to gain information.
(True/False)
4.7/5
(41)
Multinational companies face an extremely difficult challenge in implementing data collection and dissemination processes and policies because of the multitude of differing country and regional statutes.
(True/False)
5.0/5
(35)
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
(True/False)
4.9/5
(28)
Showing 1 - 20 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)