Connect Ch 9

3 August 2023
4.6 (201 reviews)
46 test answers

Unlock all answers in this set

Unlock answers (42)
question
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
answer
Privacy mode
question
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
answer
privacy
question
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
answer
True
question
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.
answer
True
question
Identity theft and mistaken identity are the same.
answer
False
question
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
answer
True
question
`This type of computer criminal creates and distributes malicious programs.
answer
Cracker
question
Which of the following is the most widely used wireless network encryption for home wireless networks?
answer
WPA2
question
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
answer
True
question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
answer
Encryption
question
Spy removal programs are designed to detect and remove various types of privacy threats.
answer
True
question
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
answer
Digital Millennium Copyright Act
question
People that collect and sell personal data are called _______.
answer
Information reseller
question
The essential element that controls how computers are used is a law.
answer
False
question
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
answer
True
question
If copyright-protected music is uploaded to a website, it is legal to download it.
answer
False
question
The archiving and search features of the web make your online identity available indefinitely.
answer
True
question
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
answer
Cyberbullying
question
This is a legal concept that gives content creators the right to control use and distribution of their work.
answer
Copyright
question
Computer criminals that create and spread viruses are punished under this law.
answer
Computer Fraud and Abuse Act
question
Which of the following is not malware?
answer
Ad-Aware
question
Programs used to secretly record an individual's activities on the Internet are called _______.
answer
Spyware
question
Biometric scanning devices are used to scan employee identification cards.
answer
False
question
Corporations often use this to prevent copyright violations.
answer
Digital rights management (DRM)
question
nformation systems consist of people, procedures, software, hardware, data, and the Internet.
answer
True
question
A program that replicates itself and clogs computers and networks.
answer
Worm
question
A _______ acts as a security buffer between a corporation's private network and all external networks.
answer
firewall
question
This law gives you the right to look at your personal records held by government agencies.
answer
freedom of information act
question
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
answer
cookies
question
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
answer
Rogue
question
These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.
answer
Employee-monitoring software
question
Free computer games and free screen saver programs are typical carriers of _______.
answer
Trojan horses
question
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
answer
keystroke logger
question
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites
answer
True
question
Privacy concerns the collection and use of data about individuals.
answer
True
question
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
answer
False
question
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
answer
Internet Scam
question
These are used by advertisers to keep track of your web activity as you move from one site to the next.
answer
Third party cookies
question
Which among the following is a way to shut down an ISP or website?
answer
Denial of service attack
question
It is highly likely that each one of us has an electronic profile created by information resellers.
answer
True
question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
answer
Dictionary Attack
question
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
answer
True
question
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.
answer
False
question
Which of the following is not a measure to protect computer security?
answer
Keeping the same password on all systems consistently
question
_______ is concerned with protecting software and data from unauthorized tampering or damage.
answer
Data security
question
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
answer
False