Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Basic Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit76 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
Which of the following is not a measure to protect computer security?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
What are computer ethics?
Free
(Essay)
4.8/5
(42)
Correct Answer:
The essential element that controls how computers are used today is ethics.Ethics are standards of moral conduct.Computer ethics are guidelines for morally acceptable use of computers in our society.We are all entitled to ethical treatment, including the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.
The essential elements that control how computers are used are laws.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
Programs used to secretly record an individual's activities on the Internet are called:
(Multiple Choice)
4.8/5
(34)
Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.
(Short Answer)
5.0/5
(43)
Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.
(True/False)
4.8/5
(26)
_____ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
(Short Answer)
4.8/5
(42)
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
(Multiple Choice)
4.8/5
(28)
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
(Multiple Choice)
4.8/5
(40)
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
(Multiple Choice)
4.9/5
(38)
_____ is the illegal assumption of someone's identity for the purposes of economic gain.
(Short Answer)
5.0/5
(31)
A(n) _____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
(Short Answer)
4.8/5
(33)
This is a legal concept that gives content creators the right to control use and distribution of their work.
(Multiple Choice)
4.9/5
(40)
Which among the following is a way to shut down an ISP or Web site?
(Multiple Choice)
4.9/5
(40)
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
(Multiple Choice)
4.7/5
(31)
The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.
(True/False)
4.9/5
(34)
_____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
(Short Answer)
4.8/5
(29)
A(n) _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
(Short Answer)
4.9/5
(36)
_____ is representing some other person's work and ideas as your own without giving credit to the original source.
(Short Answer)
4.9/5
(33)
This type of computer criminal creates and distributes malicious programs.
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)