Exam 8: Protecting People and Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the term that refers to people who break into the computer systems of others?

(Multiple Choice)
4.9/5
(43)

What type of software should you install to protect yourself from identify theft?

(Multiple Choice)
4.7/5
(26)

_____ applies to the implementation of an idea.

(Short Answer)
4.8/5
(37)

A worm hides your identity from the Web sites you visit.

(True/False)
4.7/5
(28)

We lose more money to white-collar crime than we spend on the Federal defense budget.Which of the following statistics is not true about employees and their potential to commit crime?

(Multiple Choice)
4.8/5
(32)

A(n)_____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.

(Short Answer)
4.7/5
(32)

_____ is software you do not want hidden inside software you do want.

(Short Answer)
4.7/5
(40)

What county experiences the greatest revenue losses from pirated software?

(Multiple Choice)
4.8/5
(47)

Which of the following protects the intangible creative work that is embodied in physical form?

(Multiple Choice)
4.8/5
(37)

Can you make a copy of software that you buy?

(Multiple Choice)
4.7/5
(32)

What program records every keystroke and mouse click executed on a computer?

(Multiple Choice)
4.8/5
(44)

A(n)_____ is a type of virus that spreads itself,not just from file to file,but from computer to computer via e-mail and other Internet traffic.

(Short Answer)
5.0/5
(38)

Downloading a song or album from the Internet is usually not a violation of intellectual property laws.

(True/False)
4.7/5
(31)

With respect to the circumstances that surround making an ethical decision,your perception of what society thinks of your intended action is called _____.

(Short Answer)
4.7/5
(46)

What is phishing?

(Multiple Choice)
5.0/5
(36)

The only factor involved in ethical decisions is the person's basic ethical structure developed since childhood.

(True/False)
4.9/5
(37)

_____ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.

(Short Answer)
4.9/5
(32)

A Web log is a file stored on your computer showing a history of sites you have visited.

(True/False)
4.8/5
(41)

There are two fundamental factors that determine you're your ethical reaction to dilemmas.What is the other one?

(Multiple Choice)
4.7/5
(43)

Ethical decisions are always easy and straightforward.

(True/False)
4.8/5
(32)
Showing 41 - 60 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)