Exam 19: Legal and Ethical Aspects

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______ or cybercrime,is a term used broadly to describe criminal activity in which computers or computer networks are a tool,a target,or a place of criminal activity.

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

Computer crime

Personal effects,moveable property and goods,such as cars,bank accounts,wages,securities,a small business,furniture,insurance policies,jewelry,patents,and pets are all examples of _________.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

C

The three types of patents are: utility patents,design patents,and ________.

Free
(Short Answer)
4.7/5
(29)
Correct Answer:
Verified

plant patents

The success of cybercriminals,and the relative lack of success of law enforcement,influence the behavior of _______.

(Multiple Choice)
4.8/5
(34)

The Common Criteria specification is primarily concerned with the privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.

(True/False)
4.9/5
(37)

_____ strengthens the protection of copyrighted materials in digital format.

(Multiple Choice)
4.9/5
(42)

_____ can be copyrighted.

(Multiple Choice)
4.8/5
(37)

________ is a function that removes specific identifying information from query results,such as last name and telephone number,but creates some sort of unique identifier so that analysts can detect connections between queries.

(Multiple Choice)
4.8/5
(35)

The successful use of law enforcement depends much more on technical skills than on people skills.

(True/False)
4.8/5
(35)

Computers as targets is a form of crime that involves an attack on data integrity,system integrity,data confidentiality,privacy,or availability.

(True/False)
4.7/5
(30)

________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.

(Multiple Choice)
4.8/5
(30)

The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.

(True/False)
4.9/5
(28)

Concerns about the extent to which personal privacy has been and may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.

(True/False)
4.7/5
(33)

Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.

(Short Answer)
4.8/5
(32)

________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

(Multiple Choice)
4.9/5
(47)

A ______ is a word,name,symbol,or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.

(Multiple Choice)
4.9/5
(40)

Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.

(Multiple Choice)
4.9/5
(37)

The legal and ethical aspects of computer security encompass a broad range of topics.

(True/False)
4.9/5
(37)

Any intangible asset that consists of human knowledge and ideas is _______.

(Multiple Choice)
4.8/5
(36)

An example of a patent from the computer security realm is the RSA public-key cryptosystem.

(True/False)
4.8/5
(40)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)