Exam 8: Protecting People and Information
Exam 1: The Information Age in Which You Live: Changing184 Questions
Exam 2: Major Business Initiatives: Gaining Competitive137 Questions
Exam 3: Databases and Data Warehouses: Building Business158 Questions
Exam 4: Decision Support and Artificial Intelligence136 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy175 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques181 Questions
Exam 7: Enterprise Infrastructure, Metrics, and Business138 Questions
Exam 8: Protecting People and Information170 Questions
Exam 9: Emerging Trends and Technology152 Questions
Exam 10: Computer Hardware and Software170 Questions
Exam 11: Network Basics144 Questions
Exam 12: Careers in Business105 Questions
Select questions type
What is the term that refers to people who break into the computer systems of others?
(Multiple Choice)
4.9/5
(43)
What type of software should you install to protect yourself from identify theft?
(Multiple Choice)
4.7/5
(26)
We lose more money to white-collar crime than we spend on the Federal defense budget.Which of the following statistics is not true about employees and their potential to commit crime?
(Multiple Choice)
4.8/5
(32)
A(n)_____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.
(Short Answer)
4.7/5
(32)
_____ is software you do not want hidden inside software you do want.
(Short Answer)
4.7/5
(40)
What county experiences the greatest revenue losses from pirated software?
(Multiple Choice)
4.8/5
(47)
Which of the following protects the intangible creative work that is embodied in physical form?
(Multiple Choice)
4.8/5
(37)
What program records every keystroke and mouse click executed on a computer?
(Multiple Choice)
4.8/5
(44)
A(n)_____ is a type of virus that spreads itself,not just from file to file,but from computer to computer via e-mail and other Internet traffic.
(Short Answer)
5.0/5
(38)
Downloading a song or album from the Internet is usually not a violation of intellectual property laws.
(True/False)
4.7/5
(31)
With respect to the circumstances that surround making an ethical decision,your perception of what society thinks of your intended action is called _____.
(Short Answer)
4.7/5
(46)
The only factor involved in ethical decisions is the person's basic ethical structure developed since childhood.
(True/False)
4.9/5
(37)
_____ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
(Short Answer)
4.9/5
(32)
A Web log is a file stored on your computer showing a history of sites you have visited.
(True/False)
4.8/5
(41)
There are two fundamental factors that determine you're your ethical reaction to dilemmas.What is the other one?
(Multiple Choice)
4.7/5
(43)
Showing 41 - 60 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)