Deck 15: Computer Security and Privacy

Full screen (f)
exit full mode
Question
Information such as birth records, marriage certificates, and divorce information, as well as property purchases, assessments, liens, and tax values is confidential and can legally be seen only by authorized individuals.
Use Space or
up arrow
down arrow
to flip the card.
Question
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
Question
There are many options for protecting yourself against computer monitoring by your employer or the government.
Question
Phish refers to unsolicited e-mail sent to a large group of individuals at one time.
Question
According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.
Question
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
Question
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
Question
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
Question
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
Question
A government database is a collection of data about people that is collected and maintained by private industry.
Question
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
Question
System failure can occur because of a hardware problem, software problem, or a computer virus.
Question
The disaster recovery plan is also called a business continuity plan.
Question
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
Question
Read a Web site's piracy rules (if they exist) before providing any personal information.
Question
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
Question
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
Question
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
Question
Cookies and spyware are possible privacy risks.
Question
At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.
Question
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
Question
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) cable anchor
C) security opening
D) user lock
Question
Our networked society has raised a number of ____ concerns.

A) privacy
B) patent
C) hardware theft
D) software quality
Question
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
Question
Chain locks can be used to secure computers and other hardware. _________________________
Question
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
Question
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
Question
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and / or play a sound to help the owner locate the phone if it is nearby. _________________________
Question
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers) that cannot afford to be without power for any period of time, generators can be used. _________________________
Question
A(n) head crash occurs when a hard drive's read / write heads actually touch the surface of a hard disk. _________________________
Question
Spam sent via IM is called sim. _________________________
Question
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
Question
Although many of us may prefer not to think about it, ____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.

A) software piracy
B) interrupted power
C) spikes
D) system failure
Question
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
Question
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer, record the activities taking place, take screen shots of the screen at specified intervals, and more. _________________________
Question
One of the most obvious types of hardware loss is hardware theft. _________________________
Question
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

A) Surge suppressors
B) Password locks
C) Spike suppressors
D) Cable locks
Question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.

A) 50 feet
B) 1,000 feet
C) 100 feet
D) 2 miles
Question
C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________
Question
Often used in conjunction with face recognition technology, public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________
Question
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
Question
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.

A) USB
B) RFID
C) IDC
D) FDE
Question
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

A) 7 to 10 years
B) 10 years
C) 10 to 12 years
D) 12 years
Question
<strong>  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.</strong> A) encrypted B) locked C) registered D) indexed <div style=padding-top: 35px>
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

A) encrypted
B) locked
C) registered
D) indexed
Question
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

A) pads
B) sleeves
C) pillows
D) cushions
Question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
Question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
Question
____ devices are designed to withstand much more physical abuse than conventional devices.

A) Secured
B) Ruggedized
C) Malleable
D) Flexible
Question
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
Question
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

A) filter
B) opt in
C) opt out
D) share accept
Question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

A) Government databases
B) Marketing databases
C) Educational databases
D) Research databases
Question
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.

A) Malleable
B) Rugged
C) Semirugged
D) Flexible
Question
<strong>  Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.</strong> A) UPS B) surge suppressor C) voltage controller D) voltage meter <div style=padding-top: 35px>
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
Question
When spam is sent via IM it is called ____.

A) spoof
B) phish
C) spim
D) junk
Question
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) spam e-mail address
C) encryption scheme
D) hot site
Question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) junkie e-mail address
B) throw-away e-mail address
C) one-use e-mail address
D) second-hand e-mail address
Question
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
Question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
Question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
Question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
Question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
Question
By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
Question
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.

A) Presence technology
B) Computer monitoring
C) Digital surveillance
D) Detection technology
Question
Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.
Question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

A) Computer monitoring
B) Computer surveillance
C) Multimedia surveillance
D) Video surveillance
Question
____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.
Question
____________________ labels change their appearance if someone (such as a thief) tries to remove them.
Question
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

A) Computer monitoring
B) Computer surveillance
C) Multimedia surveillance
D) Video surveillance
Question
____________________ databases contain marketing and demographic data about people, such as where they live and what products they buy.
Question
____ refers to companies recording or observing the actions of employees while on the job.

A) Computer monitoring
B) Video surveillance
C) Employee monitoring
D) Identity theft
Question
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.
Question
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.
Question
The 2013 Secure Our Smartphones (SOS) Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.
Question
One antipiracy tool is requiring a unique ____ code.
Question
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

A) Antivirus software
B) Antispyware software
C) Antispoof software
D) Antiphish software
Question
____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
Question
A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.
Question
For users who need more protection than a protective case can provide, ____________________ devices (such as portable computers and mobile phones) are available.
Question
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.
Question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.

A) Sarbanes-Oxley Act
B) USA Patriot Act
C) CAN-SPAM act
D) Junk Fax Prevention Act
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/88
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Computer Security and Privacy
1
Information such as birth records, marriage certificates, and divorce information, as well as property purchases, assessments, liens, and tax values is confidential and can legally be seen only by authorized individuals.
False
2
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
True
3
There are many options for protecting yourself against computer monitoring by your employer or the government.
False
4
Phish refers to unsolicited e-mail sent to a large group of individuals at one time.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
5
According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
6
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
7
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
8
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
9
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
10
A government database is a collection of data about people that is collected and maintained by private industry.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
11
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
12
System failure can occur because of a hardware problem, software problem, or a computer virus.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
13
The disaster recovery plan is also called a business continuity plan.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
14
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
15
Read a Web site's piracy rules (if they exist) before providing any personal information.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
16
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
17
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
18
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
19
Cookies and spyware are possible privacy risks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
20
At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
21
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
22
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A) security slot
B) cable anchor
C) security opening
D) user lock
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
23
Our networked society has raised a number of ____ concerns.

A) privacy
B) patent
C) hardware theft
D) software quality
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
24
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
25
Chain locks can be used to secure computers and other hardware. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
26
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
27
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
28
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and / or play a sound to help the owner locate the phone if it is nearby. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
29
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers) that cannot afford to be without power for any period of time, generators can be used. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
30
A(n) head crash occurs when a hard drive's read / write heads actually touch the surface of a hard disk. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
31
Spam sent via IM is called sim. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
32
To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
33
Although many of us may prefer not to think about it, ____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.

A) software piracy
B) interrupted power
C) spikes
D) system failure
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
34
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
35
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer, record the activities taking place, take screen shots of the screen at specified intervals, and more. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
36
One of the most obvious types of hardware loss is hardware theft. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
37
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

A) Surge suppressors
B) Password locks
C) Spike suppressors
D) Cable locks
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
38
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.

A) 50 feet
B) 1,000 feet
C) 100 feet
D) 2 miles
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
39
C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
40
Often used in conjunction with face recognition technology, public video surveillance systems are used to try to identify known terrorists and other criminals, to identify criminals whose crimes are caught on tape, and to prevent crimes from occurring. _________________________
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
41
To supplement backup procedures, businesses and other organizations should have a(n) ____.

A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
42
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.

A) USB
B) RFID
C) IDC
D) FDE
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
43
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

A) 7 to 10 years
B) 10 years
C) 10 to 12 years
D) 12 years
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
44
<strong>  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.</strong> A) encrypted B) locked C) registered D) indexed
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

A) encrypted
B) locked
C) registered
D) indexed
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
45
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

A) pads
B) sleeves
C) pillows
D) cushions
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
46
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

A) buddy site
B) alternate pad
C) hot site
D) white room
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
48
____ devices are designed to withstand much more physical abuse than conventional devices.

A) Secured
B) Ruggedized
C) Malleable
D) Flexible
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
49
A marketing activity that can be considered a privacy risk is ____.

A) security threads
B) watermarking
C) electronic profiling
D) microprinting
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
50
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

A) filter
B) opt in
C) opt out
D) share accept
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
51
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

A) Government databases
B) Marketing databases
C) Educational databases
D) Research databases
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
52
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.

A) Malleable
B) Rugged
C) Semirugged
D) Flexible
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
53
<strong>  Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.</strong> A) UPS B) surge suppressor C) voltage controller D) voltage meter
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
54
When spam is sent via IM it is called ____.

A) spoof
B) phish
C) spim
D) junk
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
55
One common way to deal with spam that makes it to your computer is to use a(n) ____.

A) e-mail filter
B) spam e-mail address
C) encryption scheme
D) hot site
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
56
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

A) junkie e-mail address
B) throw-away e-mail address
C) one-use e-mail address
D) second-hand e-mail address
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
57
Collecting in-depth information about an individual is known as ____.

A) personal databasing
B) identity theft
C) information piracy
D) electronic profiling
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
58
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

A) piracy policy
B) security policy
C) identity policy
D) privacy policy
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
59
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

A) signing piracy agreements
B) opting out
C) contracting legal help
D) e-mailing them
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
60
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
61
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

A) proximity cards
B) presence technology
C) face recognition
D) video cards
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
62
By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
63
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.

A) Presence technology
B) Computer monitoring
C) Digital surveillance
D) Detection technology
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
64
Laptop ____________________ software emits a very loud noise if the computer is unplugged, if USB devices are removed, or if the computer is shut down without the owner's permission.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
65
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

A) Computer monitoring
B) Computer surveillance
C) Multimedia surveillance
D) Video surveillance
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
66
____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
67
____________________ labels change their appearance if someone (such as a thief) tries to remove them.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
68
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

A) Computer monitoring
B) Computer surveillance
C) Multimedia surveillance
D) Video surveillance
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ databases contain marketing and demographic data about people, such as where they live and what products they buy.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
70
____ refers to companies recording or observing the actions of employees while on the job.

A) Computer monitoring
B) Video surveillance
C) Employee monitoring
D) Identity theft
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
71
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
72
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
73
The 2013 Secure Our Smartphones (SOS) Initiative is technology that would make all stolen smartphones inoperable, on any network, anywhere in the world, even if the ____________________ card is removed.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
74
One antipiracy tool is requiring a unique ____ code.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
75
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

A) Antivirus software
B) Antispyware software
C) Antispoof software
D) Antiphish software
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
76
____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
77
A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
78
For users who need more protection than a protective case can provide, ____________________ devices (such as portable computers and mobile phones) are available.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
79
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
80
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.

A) Sarbanes-Oxley Act
B) USA Patriot Act
C) CAN-SPAM act
D) Junk Fax Prevention Act
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 88 flashcards in this deck.