Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce92 Questions
Exam 3: Application Software69 Questions
Exam 4: System Software69 Questions
Exam 5: The System Unit77 Questions
Exam 6: Input and Output81 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
(Short Answer)
4.8/5
(32)
_______ is concerned with protecting software and data from unauthorized tampering or damage.
(Multiple Choice)
4.8/5
(36)
Explain cookies and identify the difference between first-party cookies and third-party cookies.
(Essay)
4.9/5
(42)
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
(True/False)
5.0/5
(36)
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
(True/False)
5.0/5
(33)
Privacy concerns the collection and use of data about individuals.
(True/False)
4.8/5
(39)
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
4.7/5
(31)
A _______ (acronym or 3 words) attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.
(Short Answer)
4.8/5
(33)
Information systems consist of people, procedures, software, hardware, data, and the Internet.
(True/False)
4.9/5
(43)
The essential element that controls how computers are used is a law.
(True/False)
4.7/5
(45)
These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.
(Multiple Choice)
4.9/5
(31)
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
(Multiple Choice)
4.8/5
(43)
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.
(Essay)
4.9/5
(37)
_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
(Short Answer)
4.9/5
(32)
Which of the following is the most widely used wireless network encryption for home wireless networks?
(Multiple Choice)
4.7/5
(41)
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
(Multiple Choice)
4.8/5
(39)
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
4.8/5
(46)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)