Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Basic Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit76 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.
(Short Answer)
4.9/5
(33)
Small data files that are deposited on a user's hard drive when they visit a Web site are called:
(Multiple Choice)
4.8/5
(39)
Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.
(True/False)
4.8/5
(36)
Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
(True/False)
5.0/5
(42)
A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
(True/False)
4.8/5
(28)
_____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.
(Short Answer)
4.9/5
(45)
_____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.
(Short Answer)
4.9/5
(40)
_____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.
(Short Answer)
4.8/5
(35)
The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).
(True/False)
4.8/5
(33)
A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.
(Short Answer)
4.9/5
(36)
Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
4.9/5
(35)
The archiving and search features of the Web make your online identity available indefinitely.
(True/False)
4.7/5
(41)
_____ security is concerned with protecting software and data from unauthorized tampering or damage.
(Short Answer)
4.8/5
(39)
_____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
(Short Answer)
4.9/5
(37)
_____ scanning devices use fingerprints and iris scanners to identify individuals.
(Short Answer)
4.9/5
(39)
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
(Multiple Choice)
4.9/5
(42)
This law gives you the right to look at your personal records held by government agencies.
(Multiple Choice)
4.8/5
(36)
A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.
(True/False)
4.9/5
(31)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)