Exam 9: The Personal and Social Impact of Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Carpal tunnel syndrome (CTS)is the formation of blood clots in the legs or lungs.

Free
(True/False)
4.7/5
(33)
Correct Answer:
Verified

False

Practitioners in many professions subscribe to a(n)_____ that states the principles and core values that are essential to their work,and,therefore,govern their behavior.

Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Verified

code of ethics

Under the Identity Theft and Assumption Deterrence Act of 1998,the _____ is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

The monitor should be about one arm's length away from a user.

(True/False)
4.9/5
(34)

The act of going through the trash of an organization to find secret or confidential information,including information needed to access an information system or its data is known as _____.

(Short Answer)
4.9/5
(33)

Phishing has become such a serious problem that several companies have formed the Domain-based Message Authentication,Reporting,and Conformance (DMARC)group to provide improved e-mail security and protection from phishing.

(True/False)
5.0/5
(36)

_____ is the practice of using social skills to get computer users to provide information that allows a hacker to access an information system or its data.

(Short Answer)
4.8/5
(38)

The Department of Homeland Security Department's Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment,warning,investigation,and response to cyberterrorism threats or attacks against the country's critical infrastructure.

(True/False)
4.9/5
(32)

A _____ is a small program hidden in a network or computer system that records identification numbers.

(Multiple Choice)
4.7/5
(38)

The public cannot gain online access to information about registered sex offenders online because of various privacy laws.

(True/False)
4.8/5
(32)

A useful guideline to protect corporate computers from criminal hackers is to:

(Multiple Choice)
4.7/5
(32)

As information technology becomes faster,more complex,and more powerful,the risk of computer-related mistakes decreases tremendously.

(True/False)
4.8/5
(35)

If convicted for copyright infringement,software pirates could be sentenced to jail for up to _____ years.

(Multiple Choice)
4.9/5
(32)

_____ is the careful division of the tasks and responsibilities associated with a key process so that they must be performed by more than one person to prevent collusion.

(Short Answer)
4.9/5
(44)

_____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.

(Short Answer)
4.9/5
(36)

Relaxing controls for changes to critical tables,HTML,and URLs is a useful policy to minimize computer-related waste and mistakes.

(True/False)
4.8/5
(27)

A job that requires sitting at a desk and using a computer for many hours a day doubles the risk of seated immobility thromboembolism (SIT).

(True/False)
4.8/5
(35)

A party offended by a libel can file what is known as a(n)_____ lawsuit and use the subpoena power it grants to force the Internet service provider (ISP)to provide whatever information it has about the anonymous poster,including Internet Protocol (IP)address,name,and street address.

(Short Answer)
4.8/5
(34)

Smartphones-especially ones running the popular Android operating system-can run applications that are impervious to malware.

(True/False)
4.8/5
(31)

Inexperienced hackers can download programs called _____ that automate the job of breaking into computers.

(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)