Connect Ch 9

Your page rank:

Total word count: 854
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

Privacy mode

The most significant concerns for implementation of computer technology involve _______, security, and ethics.

privacy

A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.

True

Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.

True

Identity theft and mistaken identity are the same.

False

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

True

`This type of computer criminal creates and distributes malicious programs.

Cracker

Which of the following is the most widely used wireless network encryption for home wireless networks?

WPA2

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

True

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Encryption

Spy removal programs are designed to detect and remove various types of privacy threats.

True

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

Digital Millennium Copyright Act

People that collect and sell personal data are called _______.

Information reseller

The essential element that controls how computers are used is a law.

False

Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.

True

If copyright-protected music is uploaded to a website, it is legal to download it.

False

The archiving and search features of the web make your online identity available indefinitely.

True

The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

Cyberbullying

This is a legal concept that gives content creators the right to control use and distribution of their work.

Copyright

Computer criminals that create and spread viruses are punished under this law.

Computer Fraud and Abuse Act

Which of the following is not malware?

Ad-Aware

Programs used to secretly record an individual’s activities on the Internet are called _______.

Spyware

Biometric scanning devices are used to scan employee identification cards.

False

Corporations often use this to prevent copyright violations.

Digital rights management (DRM)

nformation systems consist of people, procedures, software, hardware, data, and the Internet.

True

A program that replicates itself and clogs computers and networks.

Worm

A _______ acts as a security buffer between a corporation’s private network and all external networks.

firewall

This law gives you the right to look at your personal records held by government agencies.

freedom of information act

Small data files that are deposited on a user’s hard disk when they visit a website are called _______.

cookies

true

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

Rogue

These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.

Employee-monitoring software

Free computer games and free screen saver programs are typical carriers of _______.

Trojan horses

Which type of program would likely be used by investigators to record a potential suspects’ Internet activities?

keystroke logger

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites

True

Privacy concerns the collection and use of data about individuals.

True

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

False

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Internet Scam

These are used by advertisers to keep track of your web activity as you move from one site to the next.

Third party cookies

Which among the following is a way to shut down an ISP or website?

Denial of service attack

It is highly likely that each one of us has an electronic profile created by information resellers.

True

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.

Dictionary Attack

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).

True

Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.

False

Which of the following is not a measure to protect computer security?

Keeping the same password on all systems consistently

_______ is concerned with protecting software and data from unauthorized tampering or damage.

Data security

A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user’s account.

False

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending