E. Technology 5

True or False

True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it's lost.

Displays unwanted advertisements in banners or pop-up windows on your computer

Adware

Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission
Internet advertising firms often use which of the following to collect information about users web browsing habits

Spyware

Used by commercial Web site vendors to identify users and customize Web pages

Cookie

Common forms include computer viruses, Trojan horses, and worms

Malware

Computer taken over by hackers to perform malicious tasks across a network
What is the term for a program that performs a repetitive task on a network

Bot

Computer Generation

First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer

Type of power supply/battery backup device that can prevent some forms of data loss

uninterruptible

Type of hacker who intends serious harm through espionage, theft, or disruption of a network

Black Hat

Events that account for almost half of total catastrophic data losses

hurricanes and storms

Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people

cyberterrorism

Type of hacker who wants to show off their skills and doesn't intend any serious damage

White Hat

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

worm

Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information

phishing

Type of malware that collects bits of data, like your surfing habits

spyware

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

virus

A slowed down Wi-Fi connection can be the result of this

piggybacking

Indication that a Web site is secure for shopping

https://

Indication that a Web site is not secure

misspelled company name

Online payment method to avoid

money transfer

One secure method of online payment

electronic wallet

The nation's fastest growing crime, where victims are unaware it's being committed until the damage is done

Identity theft

Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons

Components of an online profile

A set of online communication practices and rules

Netiquette

First step to take when being cyberbullied or cyberstalked

Report abuse quickly

Items an identity thief can obtain to impersonate you

Driver's license, birth certificate

True or False

True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive

Legal or Illegal

Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source

What occurs when someone steals personal or confidential information

Information theft

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following

ethical

In order to safeguard your personal information, which of the following is recommended

Clear your history file when you are finished browsing

The term back door, as it refers to computer crime, is

a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network

Unless you want to allow others to follow your locations throughout the day, disable the

GPS

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks

digital forensics

Which of the following does your college use to verify your identity

hand geometry system

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service

voice verification system

Which of the following statements is not true about intellectual property rights

The term fair use refers to the rights which creators are entitled for their work

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts

an audit trail

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network

a worm

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer

a rootkit

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program

clickjacking

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender

a digital signature

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action

cracker

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process

product activation

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited

employee monitoring

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

Backup

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Spoofing

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

Digital Security risk

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate

Digital

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them

information privacy

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages

False

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development

...

...

...

...

...

...

E. Technology 5 - Subjecto.com

E. Technology 5

Your page rank:

Total word count: 1389
Pages: 5

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

True or False

True: Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. With cloud storage, you can retrieve your data from anywhere in the world. Your computer should be password protected. False: A thief must physically steal your computer to gain access to its files and data. Your best protection against losing data is to backup your files to your hard drive. There is no way to track our smartphone once it’s lost.

Displays unwanted advertisements in banners or pop-up windows on your computer

Adware

Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission
Internet advertising firms often use which of the following to collect information about users web browsing habits

Spyware

Used by commercial Web site vendors to identify users and customize Web pages

Cookie

Common forms include computer viruses, Trojan horses, and worms

Malware

Computer taken over by hackers to perform malicious tasks across a network
What is the term for a program that performs a repetitive task on a network

Bot

Computer Generation

First- COLOSSUS Second- IBM 1401 Third- DEC minicomputer Fourth- Personal computer

Type of power supply/battery backup device that can prevent some forms of data loss

uninterruptible

Type of hacker who intends serious harm through espionage, theft, or disruption of a network

Black Hat

Events that account for almost half of total catastrophic data losses

hurricanes and storms

Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people

cyberterrorism

Type of hacker who wants to show off their skills and doesn’t intend any serious damage

White Hat

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

worm

Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information

phishing

Type of malware that collects bits of data, like your surfing habits

spyware

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

virus

A slowed down Wi-Fi connection can be the result of this

piggybacking

Indication that a Web site is secure for shopping

https://

Indication that a Web site is not secure

misspelled company name

Online payment method to avoid

money transfer

One secure method of online payment

electronic wallet

The nation’s fastest growing crime, where victims are unaware it’s being committed until the damage is done

Identity theft

Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons

Components of an online profile

A set of online communication practices and rules

Netiquette

First step to take when being cyberbullied or cyberstalked

Report abuse quickly

Items an identity thief can obtain to impersonate you

Driver’s license, birth certificate

True or False

True: Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging. before donating a computer, you should use a program to wipe the hard disk to remove all of its data energy vampire devices draw power even when they are turned off or in standby mode False: Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones. one reason to move to a paperless society is that printers are becoming expensive

Legal or Illegal

Legal: Receiving permission from a photographer to use one of his photos. Copying a quote from a website and citing the source. Downloading a video in the public domain and using it in a presentation. Illegal: Copying a photo from a website and then using it without requesting permission. Copying content from a Wikipedia article, changing the words and using the text without citing the source

What occurs when someone steals personal or confidential information

Information theft

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following

ethical

In order to safeguard your personal information, which of the following is recommended

Clear your history file when you are finished browsing

The term back door, as it refers to computer crime, is

a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network

Unless you want to allow others to follow your locations throughout the day, disable the

GPS

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks

digital forensics

Which of the following does your college use to verify your identity

hand geometry system

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service

voice verification system

Which of the following statements is not true about intellectual property rights

The term fair use refers to the rights which creators are entitled for their work

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts

an audit trail

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network

a worm

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer

a rootkit

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program

clickjacking

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender

a digital signature

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action

cracker

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process

product activation

Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited

employee monitoring

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

Backup

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Spoofing

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

Digital Security risk

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate

Digital

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them

information privacy

True

A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer The PATRIOT Act gives law enforcement the right to monitor people’s activities, including web and email habits To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA To remove spyware, users need to obtain a special program that can detect and delete it Websites often collect data about you so that they can customize advertisements and send you personalized email messages

False

Cybercrime laws are consistent between states and countries, making it easy to reach a consensus as to what is illegal Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure PINs are not the same as passwords Programmers often build trapdoors into programs during system development

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending