Exam 5: Organizational Structures That Support Strategic Initiatives

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Ransomware is a form of malicious software that infects your computer and asks for money.

(True/False)
4.8/5
(37)

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

(Multiple Choice)
4.9/5
(41)

What is the Child Online Protection Act?

(Multiple Choice)
4.8/5
(41)

Which of the following is not an example of unplanned downtime?

(Multiple Choice)
4.8/5
(34)

What is a form of malicious software that infects your computer and asks for money?

(Multiple Choice)
4.8/5
(32)

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

(True/False)
4.9/5
(39)

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

(Multiple Choice)
4.9/5
(28)

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

(Multiple Choice)
4.9/5
(50)

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?

(Multiple Choice)
4.7/5
(28)

Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.

(Multiple Choice)
4.9/5
(35)

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(True/False)
4.7/5
(30)

What is adware?

(Multiple Choice)
4.8/5
(34)

A worm spreads itself not only from file to file but also from computer to computer.

(True/False)
4.8/5
(43)

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(True/False)
5.0/5
(36)

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

(True/False)
4.8/5
(49)

What is the primary difference between a worm and a virus?

(Multiple Choice)
4.9/5
(37)

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

(Multiple Choice)
4.8/5
(29)

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

(True/False)
4.9/5
(33)

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(True/False)
4.8/5
(37)

What is drive-by hacking?

(Multiple Choice)
4.8/5
(43)
Showing 41 - 60 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)