Exam 8: Protecting People and Information
Exam 1: The Information Age in Which You Live: Changing184 Questions
Exam 2: Major Business Initiatives: Gaining Competitive137 Questions
Exam 3: Databases and Data Warehouses: Building Business158 Questions
Exam 4: Decision Support and Artificial Intelligence136 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy175 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques181 Questions
Exam 7: Enterprise Infrastructure, Metrics, and Business138 Questions
Exam 8: Protecting People and Information170 Questions
Exam 9: Emerging Trends and Technology152 Questions
Exam 10: Computer Hardware and Software170 Questions
Exam 11: Network Basics144 Questions
Exam 12: Careers in Business105 Questions
Select questions type
What is the most prevalent type of computer virus?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
D
Copyright is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
Identity theft occurs when someone forges your identity for fraudulent purposes.
(True/False)
4.9/5
(33)
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
(Multiple Choice)
4.9/5
(34)
Intellectual property is tangible creative work that is embodied in physical form.
(True/False)
4.9/5
(22)
Which of the following examines information passing through network switches,hubs,or routers?
(Multiple Choice)
4.7/5
(30)
Ethics are the principles and standards that guide our behavior toward other people.
(True/False)
4.9/5
(34)
_____ occurs when someone forges your identity for fraudulent purposes.
(Short Answer)
4.7/5
(22)
If you were trying to access your campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus,what type of attack would you be experiencing?
(Multiple Choice)
4.8/5
(33)
Which of the following is a small file that contains information about you and your Web activities?
(Multiple Choice)
4.8/5
(32)
Denial-of-service means not being able to log on because of an invalid password.
(True/False)
4.7/5
(33)
What says that you may use copyrighted material in certain situations - for example,in the creation of new work or,within certain limits,for teaching purposes?
(Multiple Choice)
4.8/5
(28)
What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?
(Multiple Choice)
4.8/5
(30)
A(n)_____ examines information passing through switches,hubs,or routers.
(Short Answer)
4.9/5
(34)
Which of the following is the unauthorized use,duplication,distribution,or sale of copyrighted software?
(Multiple Choice)
4.8/5
(29)
Security-auditing software presents a false target for hackers,then logs their key strokes.
(True/False)
4.9/5
(36)
Showing 1 - 20 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)