Exam 12: Security and Privacy in an Electronic Age
Exam 1: Introduction to Information Technologyhardware, Software, and Telecommunications25 Questions
Exam 2: Medical Informatics: the American Recovery and Reinvestment Act, Hitech, and the Health Information Technology Decade24 Questions
Exam 3: An Introduction to the Administrative Applications of Computers: Practice Management: Scheduling and Accounting25 Questions
Exam 4: Telemedicine25 Questions
Exam 5: Information Technology in Public Health30 Questions
Exam 6: Information Technology in Radiology30 Questions
Exam 7: Information Technology in Surgerythe Cutting Edge30 Questions
Exam 8: Information Technology in Pharmacy30 Questions
Exam 9: Information Technology in Dentistry25 Questions
Exam 10: Informational Resources: Computer-Assisted Instruction, Expert Systems, Health Information Online25 Questions
Exam 11: Information Technology in Rehabilitative Therapies: Computerized Medical Devices, Assistive Technology, and Prosthetic Devices35 Questions
Exam 12: Security and Privacy in an Electronic Age25 Questions
Select questions type
____________ theft involves someone using someone's private information to assume his or her identity.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
________________ includes attempts to protect computer systems and the privacy of computerized data.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
A
_______________ is the scrambling of data so that it does NOT make sense.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Encryption
The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
(Short Answer)
4.9/5
(28)
____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.
(Multiple Choice)
4.8/5
(39)
The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.
(Short Answer)
4.8/5
(30)
The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.
(Multiple Choice)
4.9/5
(26)
____________________ is the unauthorized copying of software protected by copyright.
(Short Answer)
4.8/5
(46)
_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.
(Short Answer)
4.8/5
(38)
A ______________ is a program that attaches itself to another program and replicates itself.
(Multiple Choice)
4.7/5
(34)
____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.
(Short Answer)
4.8/5
(36)
The unauthorized copying of software protected by copyright is a crime called _______________.
(Multiple Choice)
4.8/5
(41)
A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.
(Short Answer)
4.8/5
(34)
The first federal legislation protecting the privacy of medical records is _______________.
(Short Answer)
4.8/5
(30)
The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.
(Short Answer)
4.8/5
(29)
A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.
(Short Answer)
4.8/5
(34)
_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.
(Short Answer)
4.8/5
(38)
The _______________ has been interpreted to allow employers access to employees' e-mail.
(Short Answer)
4.8/5
(37)
Electronic blocks (called __________________)can be used to limit access to networks.
(Short Answer)
4.7/5
(40)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)