Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce92 Questions
Exam 3: Application Software69 Questions
Exam 4: System Software69 Questions
Exam 5: The System Unit77 Questions
Exam 6: Input and Output81 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
This law gives you the right to look at your personal records held by government agencies.
(Multiple Choice)
4.8/5
(33)
This is a legal concept that gives content creators the right to control use and distribution of their work.
(Multiple Choice)
4.9/5
(30)
A program that replicates itself and clogs computers and networks.
(Multiple Choice)
4.9/5
(29)
Describe the three most common types of malware, including viruses, worms, and Trojan horses.
(Essay)
4.8/5
(38)
This type of computer criminal creates and distributes malicious programs.
(Multiple Choice)
4.8/5
(36)
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
(Multiple Choice)
4.8/5
(42)
People that collect and sell personal data are called _______.
(Multiple Choice)
4.8/5
(37)
_______ (2 words) is the illegal assumption of someone's identity for the purposes of economic gain.
(Short Answer)
4.9/5
(43)
Most browsers offer a privacy mode that ensures that your browsing activity is not recorded on your hard disk.
(True/False)
4.9/5
(40)
These are used by advertisers to keep track of your web activity as you move from one site to the next.
(Multiple Choice)
4.7/5
(38)
_______ security is concerned with protecting software and data from unauthorized tampering or damage.
(Short Answer)
4.8/5
(33)
_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.
(Short Answer)
4.9/5
(35)
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
(Multiple Choice)
4.8/5
(37)
The archiving and search features of the web make your online identity available indefinitely.
(True/False)
4.8/5
(39)
Using publically available databases, information resellers create electronic _______ and sell them to direct marketers, fundraisers, and others.
(Short Answer)
4.8/5
(36)
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.
(True/False)
5.0/5
(34)
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
(Multiple Choice)
4.7/5
(34)
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)