Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.

(Short Answer)
4.9/5
(33)

Small data files that are deposited on a user's hard drive when they visit a Web site are called:

(Multiple Choice)
4.8/5
(39)

Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.

(True/False)
4.8/5
(36)

Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

(True/False)
5.0/5
(42)

A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

(True/False)
4.8/5
(28)

_____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.

(Short Answer)
4.9/5
(45)

_____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.

(Short Answer)
4.9/5
(40)

_____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

(Short Answer)
4.8/5
(35)

The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).

(True/False)
4.8/5
(33)

A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.

(Short Answer)
4.9/5
(36)

Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

(True/False)
4.9/5
(35)

The archiving and search features of the Web make your online identity available indefinitely.

(True/False)
4.7/5
(41)

Explain how a Web bug works.

(Essay)
4.8/5
(35)

_____ security is concerned with protecting software and data from unauthorized tampering or damage.

(Short Answer)
4.8/5
(39)

_____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

(Short Answer)
4.9/5
(37)

_____ scanning devices use fingerprints and iris scanners to identify individuals.

(Short Answer)
4.9/5
(39)

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

(Multiple Choice)
4.9/5
(42)

What is plagiarism, and why is it a particular concern today?

(Essay)
4.9/5
(40)

This law gives you the right to look at your personal records held by government agencies.

(Multiple Choice)
4.8/5
(36)

A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.

(True/False)
4.9/5
(31)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)