Exam 9: Privacy, Security, and Ethics
Exam 1: Information Technology, the Internet, and You76 Questions
Exam 2: The Internet, the Web, and Electronic Commerce76 Questions
Exam 3: Basic Application Software70 Questions
Exam 4: System Software74 Questions
Exam 5: The System Unit76 Questions
Exam 6: Input and Output79 Questions
Exam 7: Secondary Storage74 Questions
Exam 8: Communications and Networks75 Questions
Exam 9: Privacy, Security, and Ethics78 Questions
Exam 10: Information Systems75 Questions
Exam 11: Databases78 Questions
Exam 12: Systems Analysis and Design75 Questions
Exam 13: Programming and Languages75 Questions
Select questions type
_____-party cookies store information about the current session, your general preferences, and your activity on one Web site.
(Short Answer)
4.8/5
(49)
_____, a privacy issue, relates to the responsibility of controlling who is able to use data.
(Short Answer)
4.9/5
(39)
Corporations often use this to prevent copyright violations.
(Multiple Choice)
4.9/5
(45)
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _____.
(Short Answer)
4.8/5
(47)
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
(Multiple Choice)
4.8/5
(41)
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
(Multiple Choice)
4.8/5
(44)
These are used by advertisers to keep track of your Web activity as you move from one site to the next.
(Multiple Choice)
4.8/5
(29)
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.
(Multiple Choice)
4.7/5
(40)
It is highly likely that each one of us has an electronic profile created by information resellers.
(True/False)
4.8/5
(38)
Spy removal programs are designed to detect and remove various types of privacy threats.
(True/False)
4.8/5
(41)
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
(True/False)
5.0/5
(37)
_____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.
(Short Answer)
4.8/5
(45)
These crimes include the theft of data in the form of confidential information.
(Multiple Choice)
4.8/5
(34)
Explain cookies and identify the difference between first-party cookies and third-party cookies.
(Essay)
4.8/5
(33)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)