Filters
Question type

Study Flashcards

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.


A) Restriction
B) Security
C) Protection
D) Encryption

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) _____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

Correct Answer

verifed

verified

Programs used to secretly record an individual's activities on the Internet are called:


A) spyware
B) cookies
C) sniffer programs
D) keystroke loggers

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What are computer ethics?

Correct Answer

verifed

verified

The essential element that controls how computers are used today is ethics.Ethics are standards of moral conduct.Computer ethics are guidelines for morally acceptable use of computers in our society.We are all entitled to ethical treatment, including the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.

This type of computer criminal creates and distributes malicious programs.


A) Employee
B) Hacker
C) Cracker
D) Keystroke logger

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

_____ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Correct Answer

verifed

verified

_____ is representing some other person's work and ideas as your own without giving credit to the original source.

Correct Answer

verifed

verified

A(n) _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Correct Answer

verifed

verified

Which among the following is a way to shut down an ISP or Web site?


A) Denial of service attack
B) Viruses
C) Trojan horses
D) Worms

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The essential elements that control how computers are used are laws.

A) True
B) False

Correct Answer

verifed

verified

False

_____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

Correct Answer

verifed

verified

Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.

A) True
B) False

Correct Answer

verifed

verified

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.


A) Illusion of anonymity
B) Browser cache
C) History files
D) Privacy mode

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?


A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which type of program would likely be used by investigators to record a potential suspects' Internet activities?


A) Cookie
B) Global positioning system
C) Keystroke logger
D) Web bug

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.

A) True
B) False

Correct Answer

verifed

verified

Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.

Correct Answer

verifed

verified

_____ is the illegal assumption of someone's identity for the purposes of economic gain.

Correct Answer

verifed

verified

Which of the following is not a measure to protect computer security?


A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

D

This is a legal concept that gives content creators the right to control use and distribution of their work.


A) Piracy
B) Ethics
C) Copyright
D) Privacy

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 78

Related Exams

Show Answer