Exam 5: Digital Security, Ethics, and Privacy
Exam 1: Introducing Todays Technologies200 Questions
Exam 2: Connecting and Communicating Online199 Questions
Exam 3: Computers and Mobile Devices200 Questions
Exam 4: Programs and Apps199 Questions
Exam 5: Digital Security, Ethics, and Privacy197 Questions
Exam 6: Computing Components200 Questions
Exam 7: Input and Output200 Questions
Exam 8: Digital Storage200 Questions
Exam 9: Operating Systems200 Questions
Exam 10: Communicating Digital Content200 Questions
Exam 11: Building Solutions199 Questions
Exam 12: Working in the Enterprise200 Questions
Select questions type
COPPA protects minors from inappropriate content when accessing the Internet in schools and libraries.
Free
(True/False)
4.8/5
(28)
Correct Answer:
False
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
Which of the following statements is not true about Internet and network attacks?
(Multiple Choice)
4.9/5
(39)
Which of the following statements is not true about software theft?
(Multiple Choice)
4.8/5
(34)
A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.
(Short Answer)
4.8/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
-A notice that guarantees a user or a website is legitimate.
(Multiple Choice)
4.8/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
-Most systems require that a user selects this on his or her own.
(Multiple Choice)
4.9/5
(36)
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
(True/False)
4.9/5
(28)
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
(True/False)
4.8/5
(37)
Which of the following terms is used to describe a small text file that a web server stores on your computer?
(Multiple Choice)
4.9/5
(42)
Your browsing history is a list of all websites you have visited over a period of time.
(True/False)
4.8/5
(31)
____________________ occurs when someone steals personal or confidential information.
(Short Answer)
4.9/5
(31)
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
(Multiple Choice)
4.8/5
(37)
-Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

(True/False)
4.9/5
(32)
What term is used to describe the process of restricting access to certain material on the web?
(Multiple Choice)
4.9/5
(34)
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
(Multiple Choice)
4.9/5
(34)
A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.
(Short Answer)
4.7/5
(28)
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
(True/False)
4.8/5
(30)
Showing 1 - 20 of 197
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)