Filters
Question type

Study Flashcards

Although many of us may prefer not to think about it,____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.


A) software piracy
B) interrupted power
C) spikes
D) system failure

Correct Answer

verifed

verified

  -Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____,as shown in the accompanying figure. A) UPS B) surge suppressor C) voltage controller D) voltage meter -Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____,as shown in the accompanying figure.


A) UPS
B) surge suppressor
C) voltage controller
D) voltage meter

Correct Answer

verifed

verified

For online shopping,signing up for free offers,discussion groups,product registration,and other activities that typically lead to junk e-mail,use a disposable or ____.


A) junkie e-mail address
B) throw-away e-mail address
C) one-use e-mail address
D) second-hand e-mail address

Correct Answer

verifed

verified

____ are small programs that take care of software-specific problems,or bugs,such as security holes.


A) Backups
B) Applets
C) Scripts
D) Patches

Correct Answer

verifed

verified

By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws,the industry hopes to reduce the known use of illegal software significantly.

Correct Answer

verifed

verified

To prevent pop-up ads from disturbing your Internet sessions,use a(n)antipop-up cookie-such as the one built-into the Google toolbar or the ones that can be enabled through many Web browsers.

Correct Answer

verifed

verified

Law enforcement agencies contend that ____________________ systems and public video surveillance are no different than the many private video surveillance systems in place today.

Correct Answer

verifed

verified

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.


A) information privacy
B) information security
C) information piracy
D) digital Counterfeiting

Correct Answer

verifed

verified

To supplement backup procedures,businesses and other organizations should have a(n) ____.


A) insurance plan
B) continuation rule
C) disaster recovery plan
D) survival guide

Correct Answer

verifed

verified

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.


A) Surveillance software
B) Video software
C) Computer monitoring software
D) Audio software

Correct Answer

verifed

verified

To prevent the counterfeiting of U.S.currency,the Treasury Department releases new currency designs every ____.


A) 7 to 10 years
B) 10 years
C) 10 to 12 years
D) 12 years

Correct Answer

verifed

verified

Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.

Correct Answer

verifed

verified

Semirugged PCs are designed to withstand drops of three feet or more onto concrete,extreme temperature ranges,wet conditions,and use while being bounced around over rough terrain in a vehicle.

Correct Answer

verifed

verified

Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time,even just a few minutes ago,when needed.

Correct Answer

verifed

verified

For users who need more protection than a protective case can provide,____________________ devices (such as portable computers and mobile phones)are available.

Correct Answer

verifed

verified

To facilitate using a computer lock,nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.


A) security slot
B) cable anchor
C) security opening
D) user lock

Correct Answer

verifed

verified

Scam refers to unsolicited e-mail sent to a large group of individuals at one time.

Correct Answer

verifed

verified

The U.S.____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam,spyware,and Internet fraud and deception.

Correct Answer

verifed

verified

You can surf anonymously,opt out of some marketing activities,and use filters and other tools to limit your exposure to spam.

Correct Answer

verifed

verified

____________________ occurs when hardware is stolen from an individual or from a business,school,or other organization.

Correct Answer

verifed

verified

Showing 21 - 40 of 100

Related Exams

Show Answer