Exam 5: Digital Security, Ethics, and Privacy
Exam 1: Introducing Todays Technologies197 Questions
Exam 2: Connecting and Communicating Online200 Questions
Exam 3: Computers and Mobile Devices200 Questions
Exam 4: Programs and Apps203 Questions
Exam 5: Digital Security, Ethics, and Privacy200 Questions
Exam 6: Access_Module_175 Questions
Exam 7: Access_Module_275 Questions
Exam 8: Excel_Module_175 Questions
Exam 9: Excel_Module_275 Questions
Exam 10: Excel_Module_375 Questions
Exam 11: PowerPoint_Module_175 Questions
Exam 12: PowerPoint_Module_275 Questions
Exam 13: PowerPoint_Module_375 Questions
Exam 14: Word_Module_175 Questions
Exam 15: Word_Module_275 Questions
Exam 16: Word_Module_375 Questions
Exam 17: Intro to Office 2016 and Windows 10 Module75 Questions
Exam 18: Productivity App/Productivity Apps for School and Work75 Questions
Select questions type
Which of the following is the process of restricting access to certain material on the web?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
In order to safeguard your personal information, which of the following is recommended?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
A(n) ____________________ agreement is the right to use software.
Free
(Short Answer)
4.9/5
(32)
Correct Answer:
license
What is the term for a website that uses encryption techniques to protect its data?
(Multiple Choice)
4.8/5
(37)
Which of the following is the least likely motive for a DDoS?
(Multiple Choice)
4.9/5
(33)
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
(Multiple Choice)
4.9/5
(35)
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
(Multiple Choice)
4.9/5
(40)
One way to reduce electrical waste is for organizations to use outside air to cool data centers and computer facilities.
(True/False)
4.9/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
a. digital signature
b. digital certificate
c. CA
d. digital security risk
e. firewall
f. botnet
g. zombie
h. clickjacking
i. Digital Millennium Copyright Act (DCMA)
j. DoS attack
k. AUP
l. iris recognition system
m. web filtering software
n. password
o. script kiddie
p. ciphertext
q. plaintext
r. bot
s. piracy
t. copyright
-A program that performs a repetitive task on a network.
(Short Answer)
4.9/5
(43)
In your introductory course on computers, your professor has decided to dedicate a lecture to technology ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.
Which of the following is NOT a question of technology ethics?


(Short Answer)
4.9/5
(36)
Which term is used to describe software used by cybercriminals?
(Multiple Choice)
4.8/5
(30)
According to some estimates, ____ mobile phones are lost or stolen in the United States every minute.
(Multiple Choice)
4.7/5
(35)
Internet advertising firms often use which of the following to collect information about users web browsing habits?
(Multiple Choice)
4.7/5
(34)
Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal.
(True/False)
4.9/5
(40)
Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
(True/False)
4.8/5
(32)
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
(Multiple Choice)
4.8/5
(36)
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
(True/False)
4.8/5
(30)
Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.
(Essay)
4.8/5
(40)
What type of software restricts access to specified websites?
(Multiple Choice)
4.9/5
(35)
The most common type of license included with software purchased by individual users is a(n) ____________________.
(Essay)
4.9/5
(35)
Showing 1 - 20 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)