Exam 8: Protecting People and Information
Exam 1: The Information Age in Which You Live: Changing184 Questions
Exam 2: Major Business Initiatives: Gaining Competitive137 Questions
Exam 3: Databases and Data Warehouses: Building Business158 Questions
Exam 4: Decision Support and Artificial Intelligence136 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy175 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques181 Questions
Exam 7: Enterprise Infrastructure, Metrics, and Business138 Questions
Exam 8: Protecting People and Information170 Questions
Exam 9: Emerging Trends and Technology152 Questions
Exam 10: Computer Hardware and Software170 Questions
Exam 11: Network Basics144 Questions
Exam 12: Careers in Business105 Questions
Select questions type
A Web log consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
(True/False)
4.8/5
(27)
What hardware device captures keystrokes moving from the keyboard to the motherboard?
(Multiple Choice)
5.0/5
(33)
A cookie a small file created by a Web page and stored on your computer.
(True/False)
4.9/5
(40)
A hacker who has been stealing credit card number would be considered a _____ hacker.
(Short Answer)
4.9/5
(35)
Biometrics identifies individuals based on physiological characteristics.
(True/False)
4.8/5
(33)
There are two fundamental factors that determine your ethical reaction to dilemmas.What is one of them?
(Multiple Choice)
4.8/5
(35)
Hardware and/or software that protects computers from outsides is called a(n)_____.
(Short Answer)
4.9/5
(29)
Your decisions regarding ethics are influenced by a number of factors.Which is not one of these factors?
(Multiple Choice)
4.7/5
(30)
What technology hides your identity from the Web sites you visit?
(Multiple Choice)
4.9/5
(37)
What type of device can be installed on a vehicle that collects information about a person's reckless driving?
(Multiple Choice)
4.8/5
(31)
The _____ says that you may use copyrighted material in certain situations - for example,in the creation of new work or,within certain limits,for teaching purposes.
(Short Answer)
4.9/5
(35)
Pirated software is the unauthorized use,duplication,distribution or sale of copyrighted software.
(True/False)
4.8/5
(35)
A clickstream will record information about you during a Web surfing session such as what Web sites you visited,how long you were there,what ads you looked at,and what you bought.
(True/False)
4.9/5
(35)
What is a common Web activity that is geared towards stealing your identity?
(Multiple Choice)
4.9/5
(39)
With respect to the circumstances that surround making an ethical decision,_____ is the length of time will it take for the benefit or harm to take effect.
(Short Answer)
4.8/5
(37)
Can a company that you work for monitor your personal email?
(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)