Filters
Question type

Study Flashcards

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?


A) software deployment
B) software decryption
C) app installation
D) product activation

Correct Answer

verifed

verified

Internet advertising firms often use which of the following to collect information about users web browsing habits?


A) comware
B) postware
C) spyware
D) billware

Correct Answer

verifed

verified

Which term is used to describe software used by cybercriminals?


A) cyberware
B) conware
C) criminalware
D) crimeware

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following is NOT permissible under a single-user license agreement?


A) Jamie installs Quark Xpress on a single computer.
B) Christine leases her copy of Dreamweaver.
C) Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
D) Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.

Correct Answer

verifed

verified

Proximity sharing gives websites access to your current location.

Correct Answer

verifed

verified

  A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks. A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

Correct Answer

verifed

verified

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is not a frequently discussed area of computer ethics?


A) green computing
B) information accuracy
C) information authorship
D) codes of conduct

Correct Answer

verifed

verified

What term is used to describe the process of restricting access to certain material on the web?


A) content filtering
B) information monitoring
C) data mining
D) social profiling

Correct Answer

verifed

verified

In order to safeguard your personal information, which of the following is recommended?


A) Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
B) Clear your history file when you are finished browsing.
C) Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
D) Use shopping club and buying cards when shopping to remain anonymous.

Correct Answer

verifed

verified

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?


A) spam
B) spit
C) phishing
D) spyware

Correct Answer

verifed

verified

Which of the following is not a security product developer?


A) Adobe
B) AVG
C) McAfee
D) Symantec

Correct Answer

verifed

verified

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?


A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist

Correct Answer

verifed

verified

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

Correct Answer

verifed

verified

The term, payload, as it pertains to computer crime, is defined as _____________.


A) the money a criminal receives from extortion or other computer crimes
B) the amount of data loss to a company or individual who is a victim of a computer crime
C) the destructive event or prank the program is intended to deliver
D) the financial burden computer crime places on its victims

Correct Answer

verifed

verified

Social engineering, as it pertains to computers, is _____________.


A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Correct Answer

verifed

verified

Which kind of license is a legal agreement that permits users to install the software on multiple computers, usually at a volume discount?


A) network
B) distributed
C) site
D) multipurpose

Correct Answer

verifed

verified

A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

Correct Answer

verifed

verified

online sec...

View Answer

Which of the following does your college use to verify your identity?


A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system

Correct Answer

verifed

verified

A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

Correct Answer

verifed

verified

Showing 121 - 140 of 200

Related Exams

Show Answer