Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This law gives you the right to look at your personal records held by government agencies.

(Multiple Choice)
4.9/5
(44)

Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.

(True/False)
4.9/5
(36)

_______ is representing some other person's work and ideas as your own without giving credit to the original source.

(Short Answer)
4.7/5
(37)

If copyright-protected music is uploaded to a website, it is legal to download it.

(True/False)
4.7/5
(32)

_______ security is concerned with protecting software and data from unauthorized tampering or damage.

(Short Answer)
4.8/5
(36)

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

(True/False)
4.9/5
(33)

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

(Multiple Choice)
4.8/5
(35)

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

(Multiple Choice)
4.7/5
(37)

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
4.9/5
(39)

The most significant concerns for implementation of computer technology involve _______, security, and ethics.

(Multiple Choice)
4.7/5
(30)

What are computer ethics?

(Essay)
4.9/5
(38)

Explain cookies and identify the difference between first-party cookies and third-party cookies.

(Essay)
4.8/5
(38)

Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
4.9/5
(36)

_______, a privacy issue, relates to the responsibility of controlling who is able to use data.

(Short Answer)
4.9/5
(35)

People that collect and sell personal data are called _______.

(Multiple Choice)
4.7/5
(45)

These are used by advertisers to keep track of your web activity as you move from one site to the next.

(Multiple Choice)
4.8/5
(31)

Explain how a web bug works.

(Essay)
4.7/5
(43)

The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).

(True/False)
4.9/5
(42)

A(n) _______ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.

(Short Answer)
4.7/5
(34)

Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.

(Essay)
4.8/5
(34)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)