Filters
Question type

Study Flashcards

This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.


A) Encryption
B) Firewall
C) Password
D) Dictionary attack

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.


A) Illusion of anonymity
B) Browser cache
C) History files
D) Privacy mode

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.

Correct Answer

verifed

verified

Copyright is a legal concept that gives ...

View Answer

This law gives you the right to look at your personal records held by government agencies.


A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A(n) _______ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.

Correct Answer

verifed

verified

Explain cookies and identify the difference between first-party cookies and third-party cookies.

Correct Answer

verifed

verified

Cookies are small data files that are de...

View Answer

Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A) True
B) False

Correct Answer

verifed

verified

_______ security is concerned with protecting software and data from unauthorized tampering or damage.

Correct Answer

verifed

verified

People that collect and sell personal data are called _______.


A) direct marketers
B) fund-raisers
C) information resellers
D) government agencies

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

_______, a privacy issue, relates to the responsibility of controlling who is able to use data.

Correct Answer

verifed

verified

The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).

A) True
B) False

Correct Answer

verifed

verified

What are computer ethics?

Correct Answer

verifed

verified

The essential element that controls how ...

View Answer

_______ is representing some other person's work and ideas as your own without giving credit to the original source.

Correct Answer

verifed

verified

Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A) True
B) False

Correct Answer

verifed

verified

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

A) True
B) False

Correct Answer

verifed

verified

Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.

A) True
B) False

Correct Answer

verifed

verified

If copyright-protected music is uploaded to a website, it is legal to download it.

A) True
B) False

Correct Answer

verifed

verified

These are used by advertisers to keep track of your web activity as you move from one site to the next.


A) Web bugs
B) History files
C) First-party cookies
D) Third-party cookies

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The most significant concerns for implementation of computer technology involve _______, security, and ethics.


A) accuracy
B) property
C) privacy
D) access

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Explain how a web bug works.

Correct Answer

verifed

verified

Web bugs are invisible images or HTML co...

View Answer

Showing 21 - 40 of 78

Related Exams

Show Answer