Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe spyware and computer monitoring software.

Free
(Essay)
4.7/5
(41)
Correct Answer:
Verified

The most dangerous type of privacy threat comes in the form of spyware. The term spyware is used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet. Some of these programs can even make changes to your browser in order to deceive you and manipulate what you see online. Computer monitoring software, also known as keystroke loggers, is perhaps the most invasive and dangerous type of spyware. These programs record every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages. Computer monitoring software can be deposited onto your hard drive without your knowledge by a malicious website or by someone installing the program directly onto your computer. While such software is deadly in the hands of criminals, it can be legally used by companies monitoring employees or law enforcement officials who are collecting evidence.

Spy removal programs are designed to detect and remove various types of privacy threats.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

Encryption, Encrypting

Small data files that are deposited on a user's hard disk when they visit a website are called _______.

(Multiple Choice)
4.9/5
(37)

Which type of program would likely be used by investigators to record a potential suspects' Internet activities?

(Multiple Choice)
4.8/5
(31)

_______, a privacy issue, relates to the responsibility of controlling who is able to use data.

(Short Answer)
4.9/5
(33)

A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

(Short Answer)
4.9/5
(34)

_______-party cookies store information about the current session, your general preferences, and your activity on the website.

(Short Answer)
4.8/5
(28)

What is plagiarism, and why is it a particular concern today?

(Essay)
4.9/5
(28)

It is highly likely that each one of us has an electronic profile created by information resellers.

(True/False)
4.8/5
(34)

Which among the following is a way to shut down an ISP or website?

(Multiple Choice)
4.9/5
(28)

_______ is representing some other person's work and ideas as your own without giving credit to the original source.

(Short Answer)
4.7/5
(38)

_______ bugs are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.

(Short Answer)
4.7/5
(33)

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.

(Short Answer)
4.8/5
(39)

A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

(Short Answer)
4.8/5
(25)

The most significant concerns for implementation of computer technology involve _______, security, and ethics.

(Multiple Choice)
4.9/5
(36)

Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.

(True/False)
4.9/5
(43)

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

(Short Answer)
4.9/5
(31)

Corporations often use this to prevent copyright violations.

(Multiple Choice)
4.8/5
(30)

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)