Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How do firewalls work?

(Essay)
4.7/5
(40)

This law gives you the right to look at your personal records held by government agencies.

(Multiple Choice)
4.8/5
(33)

This is a legal concept that gives content creators the right to control use and distribution of their work.

(Multiple Choice)
4.9/5
(30)

A program that replicates itself and clogs computers and networks.

(Multiple Choice)
4.9/5
(29)

Describe the three most common types of malware, including viruses, worms, and Trojan horses.

(Essay)
4.8/5
(38)

This type of computer criminal creates and distributes malicious programs.

(Multiple Choice)
4.8/5
(36)

The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

(Multiple Choice)
4.8/5
(42)

People that collect and sell personal data are called _______.

(Multiple Choice)
4.8/5
(37)

_______ (2 words) is the illegal assumption of someone's identity for the purposes of economic gain.

(Short Answer)
4.9/5
(43)

Most browsers offer a privacy mode that ensures that your browsing activity is not recorded on your hard disk.

(True/False)
4.9/5
(40)

These are used by advertisers to keep track of your web activity as you move from one site to the next.

(Multiple Choice)
4.7/5
(38)

_______ security is concerned with protecting software and data from unauthorized tampering or damage.

(Short Answer)
4.8/5
(33)

_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.

(Short Answer)
4.9/5
(35)

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

(Multiple Choice)
4.8/5
(37)

What are computer ethics?

(Essay)
4.9/5
(40)

The archiving and search features of the web make your online identity available indefinitely.

(True/False)
4.8/5
(39)

Using publically available databases, information resellers create electronic _______ and sell them to direct marketers, fundraisers, and others.

(Short Answer)
4.8/5
(36)

Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.

(True/False)
5.0/5
(34)

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

(Multiple Choice)
4.7/5
(34)

_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)