Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is plagiarism, and why is it a particular concern today?

(Essay)
4.9/5
(34)

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

(Short Answer)
4.9/5
(42)

Describe spyware and computer monitoring software.

(Essay)
4.8/5
(33)

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

(Multiple Choice)
4.9/5
(41)

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

(Short Answer)
4.8/5
(38)

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

(Short Answer)
4.9/5
(38)

Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.

(True/False)
4.8/5
(36)

Privacy concerns the collection and use of data about individuals.

(True/False)
4.8/5
(43)

_______-party cookies store information about the current session, your general preferences, and your activity on the website.

(Short Answer)
4.9/5
(36)

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

(Multiple Choice)
4.8/5
(39)

The essential element that controls how computers are used is a law.

(True/False)
4.8/5
(32)

_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

(Short Answer)
4.8/5
(40)

_______ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

(Short Answer)
4.9/5
(32)

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

(True/False)
4.7/5
(36)

Corporations often use this to prevent copyright violations.

(Multiple Choice)
4.9/5
(33)

According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?

(Multiple Choice)
4.9/5
(43)

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

(Short Answer)
4.9/5
(34)

_______ is concerned with protecting software and data from unauthorized tampering or damage.

(Multiple Choice)
4.8/5
(42)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)