Deck 10: Security and Privacy in an Electronic Age

ملء الشاشة (f)
exit full mode
سؤال
________ includes attempts to protect computer systems and the privacy of computerized data.

A) Security
B) SafeComputer
C) Both A and B
D) None of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ is the scrambling of data so that it does not make sense.
سؤال
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ________ Act.
سؤال
The ________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
سؤال
________ has many aspects. Among them is the ability to control personal information and the right to keep it from misuse.
سؤال
________ theft involves someone using someone's private information to assume his or her identity.

A) Personal
B) Identity
C) Car
D) None of the above
سؤال
________ involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator. The user is directed to a fake website and asked to enter information.
سؤال
A ________ can connect the user with numbers without the user's knowledge; the dialer may connect the user's computer to an expensive 900 number.
سؤال
Privacy includes the right to ________.

A) control personal information
B) own a computer
C) own a printer
D) use a computer
سؤال
________ is the unauthorized copying of software protected by copyright.
سؤال
The unauthorized copying of software protected by copyright is a crime called ________.

A) software stealth
B) software carbon
C) software piracy
D) None of the above
سؤال
Under the ________ part of the American Recovery and Reinvestment Act of 2009, the privacy protections of HIPAA are strengthened and expanded significantly to, for example, businesses who work with your health care provider.

A) HITECH Act
B) Americans with Disabilities Act
C) Health Insurance Act
D) None of the above
سؤال
The ________ gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
سؤال
The first federal legislation protecting the privacy of medical records is ________.
سؤال
A ________ is a program that attaches itself to another program and replicates itself. It may do damage to your hardware or destroy your data.
سؤال
The ________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
سؤال
A ________ is a program that attaches itself to another program and replicates itself.

A) disease
B) cold
C) spyglass
D) virus
سؤال
________ is software that can be installed without the user's knowledge to track their actions on a computer.

A) Adware
B) Trackware
C) Spyware
D) Keyware
سؤال
________ may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the Web or even the content of your e-mail.

A) Adware
B) Trackware
C) Spyware
D) Keyware
سؤال
The ________ Act gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.
سؤال
________ are small files that a website may put on your hard drive when you visit.
سؤال
Electronic blocks (called ________) can be used to limit access to networks.
سؤال
The ________ has been interpreted to allow employers access to employees' e-mail.
سؤال
The ________ is composed of 470 insurance companies. Its database contains the health information on 15 million people.
سؤال
________ of restricting access to computer systems include fingerprints, handprints, retina or iris scans, lip prints, and facial thermography.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Security and Privacy in an Electronic Age
1
________ includes attempts to protect computer systems and the privacy of computerized data.

A) Security
B) SafeComputer
C) Both A and B
D) None of the above
Security
2
________ is the scrambling of data so that it does not make sense.
Encryption
3
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ________ Act.
Homeland Security
4
The ________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
________ has many aspects. Among them is the ability to control personal information and the right to keep it from misuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ theft involves someone using someone's private information to assume his or her identity.

A) Personal
B) Identity
C) Car
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
________ involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator. The user is directed to a fake website and asked to enter information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ________ can connect the user with numbers without the user's knowledge; the dialer may connect the user's computer to an expensive 900 number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Privacy includes the right to ________.

A) control personal information
B) own a computer
C) own a printer
D) use a computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ is the unauthorized copying of software protected by copyright.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
The unauthorized copying of software protected by copyright is a crime called ________.

A) software stealth
B) software carbon
C) software piracy
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Under the ________ part of the American Recovery and Reinvestment Act of 2009, the privacy protections of HIPAA are strengthened and expanded significantly to, for example, businesses who work with your health care provider.

A) HITECH Act
B) Americans with Disabilities Act
C) Health Insurance Act
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ________ gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
The first federal legislation protecting the privacy of medical records is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ________ is a program that attaches itself to another program and replicates itself. It may do damage to your hardware or destroy your data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A) Health Insurance Portability and Accountability Act
B) Americans with Disabilities Act
C) USA PATRIOT Act
D) Welfare Reform Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
A ________ is a program that attaches itself to another program and replicates itself.

A) disease
B) cold
C) spyglass
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
________ is software that can be installed without the user's knowledge to track their actions on a computer.

A) Adware
B) Trackware
C) Spyware
D) Keyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
________ may display unwanted pop-up advertisements on your monitor; it may be related to the sites you search on the Web or even the content of your e-mail.

A) Adware
B) Trackware
C) Spyware
D) Keyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ________ Act gives law enforcement agencies greater power to monitor electronic and other communications, with fewer checks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
________ are small files that a website may put on your hard drive when you visit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Electronic blocks (called ________) can be used to limit access to networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
The ________ has been interpreted to allow employers access to employees' e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
The ________ is composed of 470 insurance companies. Its database contains the health information on 15 million people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ of restricting access to computer systems include fingerprints, handprints, retina or iris scans, lip prints, and facial thermography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.