Deck 12: Security and Privacy in an Electronic Age

Full screen (f)
exit full mode
Question
____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.

A)Adware
B)Trackware
C)Spyware
D)Keyware
Use Space or
up arrow
down arrow
to flip the card.
Question
A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.
Question
____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.
Question
The first federal legislation protecting the privacy of medical records is _______________.
Question
The ___________________________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
Question
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ______________ Act.
Question
_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.
Question
A ______________ is a program that attaches itself to another program and replicates itself.

A)disease
B)cold
C)spyglass
D)virus
Question
____________ theft involves someone using someone's private information to assume his or her identity.

A)Personal
B)Identity
C)Car
D)None of the above
Question
The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
Question
A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.
Question
_________________ is software that can be installed without the user's knowledge to track their actions on a computer.

A)Adware
B)Trackware
C)Spyware
D)Keyware
Question
Privacy includes the right to _____________________.

A)control personal information
B)own a computer
C)own a printer
D)use a computer
Question
____________________ is the unauthorized copying of software protected by copyright.
Question
The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.
Question
_______________ is the scrambling of data so that it does NOT make sense.
Question
The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
Question
________________ includes attempts to protect computer systems and the privacy of computerized data.

A)Security
B)SafeComputer
C)Both A and B
D)None of the above
Question
Under the __________ part of the American Recovery and Reinvestment Act of 2009,the privacy protections of HIPAA are strengthened and expanded significantly to,for example,businesses who work with your health care provider.

A)HITECH Act
B)Americans with Disabilities Act
C)Health Insurance Act
D)None of the above
Question
The unauthorized copying of software protected by copyright is a crime called _______________.

A)software stealth
B)software carbon
C)software piracy
D)None of the above
Question
The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.
Question
_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.
Question
_______________ are small files that a Web site may put on your hard drive when you visit.
Question
Electronic blocks (called __________________)can be used to limit access to networks.
Question
The _______________ has been interpreted to allow employers access to employees' e-mail.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Security and Privacy in an Electronic Age
1
____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.

A)Adware
B)Trackware
C)Spyware
D)Keyware
Adware
2
A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.
virus
3
____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.
Phishing
4
The first federal legislation protecting the privacy of medical records is _______________.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
The ___________________________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ______________ Act.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
A ______________ is a program that attaches itself to another program and replicates itself.

A)disease
B)cold
C)spyglass
D)virus
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
____________ theft involves someone using someone's private information to assume his or her identity.

A)Personal
B)Identity
C)Car
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
_________________ is software that can be installed without the user's knowledge to track their actions on a computer.

A)Adware
B)Trackware
C)Spyware
D)Keyware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Privacy includes the right to _____________________.

A)control personal information
B)own a computer
C)own a printer
D)use a computer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ is the unauthorized copying of software protected by copyright.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
_______________ is the scrambling of data so that it does NOT make sense.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
________________ includes attempts to protect computer systems and the privacy of computerized data.

A)Security
B)SafeComputer
C)Both A and B
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Under the __________ part of the American Recovery and Reinvestment Act of 2009,the privacy protections of HIPAA are strengthened and expanded significantly to,for example,businesses who work with your health care provider.

A)HITECH Act
B)Americans with Disabilities Act
C)Health Insurance Act
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The unauthorized copying of software protected by copyright is a crime called _______________.

A)software stealth
B)software carbon
C)software piracy
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
_______________ are small files that a Web site may put on your hard drive when you visit.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Electronic blocks (called __________________)can be used to limit access to networks.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
The _______________ has been interpreted to allow employers access to employees' e-mail.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.