Deck 10: Security and Privacy in an Electronic Age

Full screen (f)
exit full mode
Question
________ includes attempts to protect computer systems and the privacy of computerized data.

A) Security
B) SafeComputer
C) Both A and B
D) None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
________ is the scrambling of data so that it does not make sense.
Question
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ________ Act.
Question
The ________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
Question
________ has many aspects. Among them is the ability to control personal information and the right to keep it from misuse.
Question
________ theft involves someone using someone's private information to assume his or her identity.

A) Personal
B) Identity
C) Car
D) None of the above
Question
________ involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator. The user is directed to a fake website and asked to enter information.
Question
A ________ can connect the user with numbers without the user's knowledge; the dialer may connect the user's computer to an expensive 900 number.
Question
Privacy includes the right to ________.

A) control personal information
B) own a computer
C) own a printer
D) use a computer
Question
________ is the unauthorized copying of software protected by copyright.
Question
The unauthorized copying of software protected by copyright is a crime called ________.

A) software stealth
B) software carbon
C) software piracy
D) None of the above
Question
Under the ________ part of the American Recovery and Reinvestment Act of 2009, the privacy protections of HIPAA are strengthened and expanded significantly to, for example, businesses who work with your health care provider.

A) HITECH Act
B) Americans with Disabilities Act
C) Health Insurance Act
D) None of the above
Question
The ________ gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
Question
The first federal legislation protecting the privacy of medical records is ________.
Question
A ________ is a program that attaches itself to another program and replicates itself. It may do damage to your hardware or destroy your data.
Question
The ________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
Question
A ________ is a program that attaches itself to another program and replicates itself.

A) disease
B) cold
C) spyglass
D) virus
Question
________ is software that can be installed without the user's knowledge to track their actions on a computer.

A) Adware
B) Trackware
C) Spyware
D) Keyware
Question
________ may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the Web or even the content of your e-mail.

A) Adware
B) Trackware
C) Spyware
D) Keyware
Question
The ________ Act gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.
Question
________ are small files that a website may put on your hard drive when you visit.
Question
Electronic blocks (called ________) can be used to limit access to networks.
Question
The ________ has been interpreted to allow employers access to employees' e-mail.
Question
The ________ is composed of 470 insurance companies. Its database contains the health information on 15 million people.
Question
________ of restricting access to computer systems include fingerprints, handprints, retina or iris scans, lip prints, and facial thermography.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Security and Privacy in an Electronic Age
1
________ includes attempts to protect computer systems and the privacy of computerized data.

A) Security
B) SafeComputer
C) Both A and B
D) None of the above
Security
2
________ is the scrambling of data so that it does not make sense.
Encryption
3
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ________ Act.
Homeland Security
4
The ________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
________ has many aspects. Among them is the ability to control personal information and the right to keep it from misuse.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
________ theft involves someone using someone's private information to assume his or her identity.

A) Personal
B) Identity
C) Car
D) None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
________ involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator. The user is directed to a fake website and asked to enter information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
A ________ can connect the user with numbers without the user's knowledge; the dialer may connect the user's computer to an expensive 900 number.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Privacy includes the right to ________.

A) control personal information
B) own a computer
C) own a printer
D) use a computer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
________ is the unauthorized copying of software protected by copyright.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
The unauthorized copying of software protected by copyright is a crime called ________.

A) software stealth
B) software carbon
C) software piracy
D) None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Under the ________ part of the American Recovery and Reinvestment Act of 2009, the privacy protections of HIPAA are strengthened and expanded significantly to, for example, businesses who work with your health care provider.

A) HITECH Act
B) Americans with Disabilities Act
C) Health Insurance Act
D) None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The ________ gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The first federal legislation protecting the privacy of medical records is ________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
A ________ is a program that attaches itself to another program and replicates itself. It may do damage to your hardware or destroy your data.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
A ________ is a program that attaches itself to another program and replicates itself.

A) disease
B) cold
C) spyglass
D) virus
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
________ is software that can be installed without the user's knowledge to track their actions on a computer.

A) Adware
B) Trackware
C) Spyware
D) Keyware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
________ may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the Web or even the content of your e-mail.

A) Adware
B) Trackware
C) Spyware
D) Keyware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The ________ Act gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
________ are small files that a website may put on your hard drive when you visit.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Electronic blocks (called ________) can be used to limit access to networks.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
The ________ has been interpreted to allow employers access to employees' e-mail.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The ________ is composed of 470 insurance companies. Its database contains the health information on 15 million people.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
________ of restricting access to computer systems include fingerprints, handprints, retina or iris scans, lip prints, and facial thermography.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.