Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Basic Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit76 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
_____ bugs are invisible images or HTML code hidden within a Web page or e-mail message and are used to transmit information without your knowledge.
(Short Answer)
4.8/5
(33)
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____.
(Short Answer)
4.8/5
(37)
A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.
(Short Answer)
4.7/5
(35)
_____ is concerned with protecting software and data from unauthorized tampering or damage.
(Multiple Choice)
4.9/5
(33)
Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.
(True/False)
4.8/5
(36)
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
(Multiple Choice)
4.9/5
(40)
Biometric scanning devices are used to scan employee identification cards.
(True/False)
5.0/5
(44)
Free computer games and free screen saver programs are typical carriers of:
(Multiple Choice)
4.8/5
(37)
A program that replicates itself and clogs computers and networks.
(Multiple Choice)
4.9/5
(36)
Computer criminals that create and spread viruses are punished under this law.
(Multiple Choice)
4.8/5
(34)
Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.
(True/False)
4.7/5
(22)
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.
(Essay)
4.8/5
(49)
Which of the following is the most widely used wireless network encryption for home wireless networks?
(Multiple Choice)
4.7/5
(37)
If copyright-protected music is uploaded to a Web site, it is legal to download it.
(True/False)
4.8/5
(31)
Describe the three most common types of malware, including viruses, worms, and Trojan horses.
(Essay)
4.8/5
(31)
Describe how information about individuals is collected and compiled.
(Essay)
4.8/5
(30)
A(n) _____ acts as a security buffer between a corporation's private network and all external networks.
(Multiple Choice)
4.7/5
(31)
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
(True/False)
4.8/5
(28)
A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.
(True/False)
4.8/5
(37)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)