Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit79 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
(Short Answer)
4.9/5
(42)
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
(Multiple Choice)
4.9/5
(41)
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
(Short Answer)
4.8/5
(38)
_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
(Short Answer)
4.9/5
(38)
Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.
(True/False)
4.8/5
(36)
Privacy concerns the collection and use of data about individuals.
(True/False)
4.8/5
(43)
_______-party cookies store information about the current session, your general preferences, and your activity on the website.
(Short Answer)
4.9/5
(36)
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
(Multiple Choice)
4.8/5
(39)
The essential element that controls how computers are used is a law.
(True/False)
4.8/5
(32)
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
(Short Answer)
4.8/5
(40)
_______ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.
(Short Answer)
4.9/5
(32)
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
(True/False)
4.7/5
(36)
Corporations often use this to prevent copyright violations.
(Multiple Choice)
4.9/5
(33)
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
(Multiple Choice)
4.9/5
(43)
A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
(Short Answer)
4.9/5
(34)
_______ is concerned with protecting software and data from unauthorized tampering or damage.
(Multiple Choice)
4.8/5
(42)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)