Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit79 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
This law gives you the right to look at your personal records held by government agencies.
(Multiple Choice)
4.9/5
(44)
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.
(True/False)
4.9/5
(36)
_______ is representing some other person's work and ideas as your own without giving credit to the original source.
(Short Answer)
4.7/5
(37)
If copyright-protected music is uploaded to a website, it is legal to download it.
(True/False)
4.7/5
(32)
_______ security is concerned with protecting software and data from unauthorized tampering or damage.
(Short Answer)
4.8/5
(36)
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
(True/False)
4.9/5
(33)
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
(Multiple Choice)
4.8/5
(35)
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
(Multiple Choice)
4.7/5
(37)
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
4.9/5
(39)
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
(Multiple Choice)
4.7/5
(30)
Explain cookies and identify the difference between first-party cookies and third-party cookies.
(Essay)
4.8/5
(38)
Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
4.9/5
(36)
_______, a privacy issue, relates to the responsibility of controlling who is able to use data.
(Short Answer)
4.9/5
(35)
People that collect and sell personal data are called _______.
(Multiple Choice)
4.7/5
(45)
These are used by advertisers to keep track of your web activity as you move from one site to the next.
(Multiple Choice)
4.8/5
(31)
The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).
(True/False)
4.9/5
(42)
A(n) _______ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.
(Short Answer)
4.7/5
(34)
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.
(Essay)
4.8/5
(34)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)