Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. |
Privacy mode |
The most significant concerns for implementation of computer technology involve _______, security, and ethics. |
privacy |
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next. |
True |
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image. |
True |
Identity theft and mistaken identity are the same. |
False |
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. |
True |
`This type of computer criminal creates and distributes malicious programs. |
Cracker |
Which of the following is the most widely used wireless network encryption for home wireless networks? |
WPA2 |
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters. |
True |
The process of coding information to make it unreadable except to those who have a special piece of information known as a key. |
Encryption |
Spy removal programs are designed to detect and remove various types of privacy threats. |
True |
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away? |
Digital Millennium Copyright Act |
People that collect and sell personal data are called _______. |
Information reseller |
The essential element that controls how computers are used is a law. |
False |
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical. |
True |
If copyright-protected music is uploaded to a website, it is legal to download it. |
False |
The archiving and search features of the web make your online identity available indefinitely. |
True |
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person. |
Cyberbullying |
This is a legal concept that gives content creators the right to control use and distribution of their work. |
Copyright |
Computer criminals that create and spread viruses are punished under this law. |
Computer Fraud and Abuse Act |
Which of the following is not malware? |
Ad-Aware |
Programs used to secretly record an individual’s activities on the Internet are called _______. |
Spyware |
Biometric scanning devices are used to scan employee identification cards. |
False |
Corporations often use this to prevent copyright violations. |
Digital rights management (DRM) |
nformation systems consist of people, procedures, software, hardware, data, and the Internet. |
True |
A program that replicates itself and clogs computers and networks. |
Worm |
A _______ acts as a security buffer between a corporation’s private network and all external networks. |
firewall |
This law gives you the right to look at your personal records held by government agencies. |
freedom of information act |
Small data files that are deposited on a user’s hard disk when they visit a website are called _______. |
cookies |
… |
true |
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. |
Rogue |
These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files. |
Employee-monitoring software |
Free computer games and free screen saver programs are typical carriers of _______. |
Trojan horses |
Which type of program would likely be used by investigators to record a potential suspects’ Internet activities? |
keystroke logger |
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites |
True |
Privacy concerns the collection and use of data about individuals. |
True |
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for. |
False |
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return? |
Internet Scam |
These are used by advertisers to keep track of your web activity as you move from one site to the next. |
Third party cookies |
Which among the following is a way to shut down an ISP or website? |
Denial of service attack |
It is highly likely that each one of us has an electronic profile created by information resellers. |
True |
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. |
Dictionary Attack |
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure). |
True |
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft. |
False |
Which of the following is not a measure to protect computer security? |
Keeping the same password on all systems consistently |
_______ is concerned with protecting software and data from unauthorized tampering or damage. |
Data security |
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user’s account. |
False |
Connect Ch 9
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price