Filters
Question type

Study Flashcards

Critics contend that the information in an electronic profile reveals more about an individual than anyone has the right to know.

A) True
B) False

Correct Answer

verifed

verified

True

Thieves often target notebook computers of company executives, so they can use the stolen computer to access confidential company information illegally.

A) True
B) False

Correct Answer

verifed

verified

The National Photographers Association believes that allowing even the slightest alteration could lead to misrepresentations in photographs.

A) True
B) False

Correct Answer

verifed

verified

  Figure 11-4 Biometric objects, like the one shown in Figure 11-4, often are used in combination with personal identification numbers. Figure 11-4 Biometric objects, like the one shown in Figure 11-4, often are used in combination with personal identification numbers.

A) True
B) False

Correct Answer

verifed

verified

Identify the letter of the choice that best matches the phrase or definition.

Premises
A kind of backup policy used to preserve multiple copies of important files.
The act of defacing or destroying computer equipment.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
By far the most common form of software theft.
The discovery, collection, and analysis of evidence found on computers and networks.
A common infringement of copyright.
Often, this links to a cookie stored on the hard disk.
Can include plug-ins for telephone lines and other cables.
Protects any tangible form of expression.
Protects minors from inappropriate content when accessing the Internet in schools and libraries.
Symptoms include extreme pain that extends from the forearm to the hand, along with tingling in the fingers.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
Can protect against worms and Trojan horses.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
Usually does not have advanced computer and technical skills.
It fails to define a legitimate business need.
In the encryption process, the unencrypted, readable data.
Provides specific conditions for use of software, which a user must accept before using the software.
Responses
CAN-SPAM Act
surge protector
plaintext
virus hoax
hardware vandalism
script kiddie
computer forensics
software piracy
password
CTS
antivirus programs
Children's Internet Protection Act
tendonitis
copyright
third-generation
Web bug
license agreement
piracy
Fair Credit Reporting Act
ciphertext

Correct Answer

A kind of backup policy used to preserve multiple copies of important files.
The act of defacing or destroying computer equipment.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
By far the most common form of software theft.
The discovery, collection, and analysis of evidence found on computers and networks.
A common infringement of copyright.
Often, this links to a cookie stored on the hard disk.
Can include plug-ins for telephone lines and other cables.
Protects any tangible form of expression.
Protects minors from inappropriate content when accessing the Internet in schools and libraries.
Symptoms include extreme pain that extends from the forearm to the hand, along with tingling in the fingers.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
Can protect against worms and Trojan horses.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
Usually does not have advanced computer and technical skills.
It fails to define a legitimate business need.
In the encryption process, the unencrypted, readable data.
Provides specific conditions for use of software, which a user must accept before using the software.

An employee using an organization's computer to track his or her child's soccer league scores is an example of unauthorized access.

A) True
B) False

Correct Answer

verifed

verified

S-HTTP is easier to use than SSL, but it is less secure.

A) True
B) False

Correct Answer

verifed

verified

One suggestion to safeguard personal information is to avoid shopping clubs and buyer cards.

A) True
B) False

Correct Answer

verifed

verified

  Figure 11-1 Spim is messages like those in Figure 11-1, but sent via Internet telephony. Figure 11-1 Spim is messages like those in Figure 11-1, but sent via Internet telephony.

A) True
B) False

Correct Answer

verifed

verified

False

  Figure 11-1 To avoid items like that shown in Figure 11-1, users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources. A)  an anti-spam program B)  e-mail encryption C)  an antivirus program D)  e-mail filtering Figure 11-1 To avoid items like that shown in Figure 11-1, users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources.


A) an anti-spam program
B) e-mail encryption
C) an antivirus program
D) e-mail filtering

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

  Figure 11-1 ____, like that shown in Figure 11-1, is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. A)  Hash B)  Spam C)  Worm D)  Spike Figure 11-1 ____, like that shown in Figure 11-1, is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.


A) Hash
B) Spam
C) Worm
D) Spike

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

____________________ is a program that restricts access to specified Web sites.

Correct Answer

verifed

verified

Web filtering software

____________________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Correct Answer

verifed

verified

A(n) ____ gives authors and artists exclusive rights to duplicate, publish, and sell their materials.


A) intellectual property deed
B) content license
C) access right
D) copyright

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Software piracy continues for all of the following reasons except ____.


A) software piracy drives down the price of software for all users
B) in some countries, legal protection for software does not exist
C) software piracy is a fairly simple crime to commit
D) many buyers believe they have the right to copy software they have paid for

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

In the case of system failure or the discovery of corrupted files, users ____________________ the files by copying the backed up files to their original location on a computer.

Correct Answer

verifed

verified

To prevent repetitive strain injury, take all of the following precautions except ____.


A) place a wrist rest between the keyboard and the edge of the desk
B) use the heel of the hand as a pivot point while typing or using the mouse
C) place the mouse at least six inches from the edge of the desk
D) minimize the number of switches between the mouse and the keyboard

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

A surge protector absorbs small overvoltages - generally without damage to the computer or equipment.

A) True
B) False

Correct Answer

verifed

verified

A UPS connects between a computer and a ____.


A) peripheral device
B) disk drive
C) communications device
D) power source

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

During product ____, which is conducted either online or by telephone, users provide a software product's 25-character identification number to receive an installation identification number unique to the computer on which the software is installed.


A) concatenation
B) activation
C) termination
D) encryption

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 191

Related Exams

Show Answer