Exam 8: Protecting People and Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A Web log consists of one line of information for every visitor to a Web site and is usually stored on a Web server.

(True/False)
4.8/5
(27)

What hardware device captures keystrokes moving from the keyboard to the motherboard?

(Multiple Choice)
5.0/5
(33)

A cookie a small file created by a Web page and stored on your computer.

(True/False)
4.9/5
(40)

A hacker who has been stealing credit card number would be considered a _____ hacker.

(Short Answer)
4.9/5
(35)

Biometrics identifies individuals based on physiological characteristics.

(True/False)
4.8/5
(33)

There are two fundamental factors that determine your ethical reaction to dilemmas.What is one of them?

(Multiple Choice)
4.8/5
(35)

Which of the following do viruses harm?

(Multiple Choice)
4.9/5
(30)

Spyware is one example of Trojan horse software.

(True/False)
4.9/5
(41)

Hardware and/or software that protects computers from outsides is called a(n)_____.

(Short Answer)
4.9/5
(29)

Your decisions regarding ethics are influenced by a number of factors.Which is not one of these factors?

(Multiple Choice)
4.7/5
(30)

What technology hides your identity from the Web sites you visit?

(Multiple Choice)
4.9/5
(37)

What type of device can be installed on a vehicle that collects information about a person's reckless driving?

(Multiple Choice)
4.8/5
(31)

The _____ says that you may use copyrighted material in certain situations - for example,in the creation of new work or,within certain limits,for teaching purposes.

(Short Answer)
4.9/5
(35)

Pirated software is the unauthorized use,duplication,distribution or sale of copyrighted software.

(True/False)
4.8/5
(35)

A clickstream will record information about you during a Web surfing session such as what Web sites you visited,how long you were there,what ads you looked at,and what you bought.

(True/False)
4.9/5
(35)

Are ethical dilemmas easy to understand?

(Multiple Choice)
4.8/5
(35)

What is a common Web activity that is geared towards stealing your identity?

(Multiple Choice)
4.9/5
(39)

With respect to the circumstances that surround making an ethical decision,_____ is the length of time will it take for the benefit or harm to take effect.

(Short Answer)
4.8/5
(37)

Can a company that you work for monitor your personal email?

(Multiple Choice)
4.8/5
(42)

Which of the following captures screen images?

(Multiple Choice)
4.7/5
(41)
Showing 21 - 40 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)