Deck 30: Computer Safety and Ethics

ملء الشاشة (f)
exit full mode
سؤال
Surge protectors help protect computers from ____.

A) hackers
B) sniffers
C) power spikes
D) hard disk crashes
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.
سؤال
A software firewall is more secure and easier to monitor than a hardware firewall.
سؤال
It is the responsibility of a company or individual to protect their data.
سؤال
A(n) public key deciphers the encrypted information in a transmission.
سؤال
When communicating on a forum, blog, or social network or other similar Internet-related sites, use a(n) alias to protect your privacy.
سؤال
Computer phishing involves invading someone else's computer, usually for personal gain or the satisfaction of a security system.
سؤال
Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.
سؤال
One easy way to avoid data loss is to ____.

A) plug the computer into a grounded outlet
B) save frequently
C) install a firewall
D) turn on some form of encryption
سؤال
It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.

A) hacking
B) encryption
C) spying
D) eavesdropping
سؤال
Sniffer attacks use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
سؤال
Some spyware disguises itself as antispyware to gain access to your system.
سؤال
Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.
سؤال
If a network is large, a software firewall that controls the computers from one point should be implemented.
سؤال
Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.
سؤال
Using a notebook computer introduces risks not associated with desktop computers.
سؤال
What can result from making too many of the same motions over a long period of time?

A) Browser hijacking
B) Brute force attacks
C) Repetitive strain injury
D) Relaxed eye muscles
سؤال
What action might obstruct the air vents in your notebook computer and cause it to overheat?

A) Leaving it in the same position on the desk for too long
B) Using a cooling pad
C) Setting it directly on your lap
D) Plugging it into a grounded outlet
سؤال
If you work for a company that provides e-mail services, the information that you send is your property.
سؤال
Firewalls help prevent employees from tampering with or deleting data.
سؤال
The goal of ____ is to collect information about the user, the user's browsing habits, and other personal information.

A) a sniffer
B) worms
C) a virus
D) spyware
سؤال
TSL and SSL technology enables ____.

A) data to be backed up securely
B) companies to monitor unauthorized computer activity
C) system administrators to restrict access to files
D) sensitive information to be encrypted
سؤال
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?

A) Her Internet access could be slower
B) She could be charged additional costs
C) She could be held responsible for any illegal activity
D) Any of the above
سؤال
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. What is the first step Molly should take when setting up her wireless network?

A) Download eavesdropping software
B) Change the default password
C) Turn off the default encryption
D) Configure a hardware firewall
سؤال
FIGURE 30-1 <strong>FIGURE 30-1   The message in Figure 30-1 above shows an example of ____.</strong> A) hacking B) phishing C) sniffing D) browser hijacking <div style=padding-top: 35px> The message in Figure 30-1 above shows an example of ____.

A) hacking
B) phishing
C) sniffing
D) browser hijacking
سؤال
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?

A) Expensive
B) Light-weight
C) Ergonomic
D) Soft
سؤال
A(n) ____________________ is a program that hackers use to capture IDs and passwords on a network.
سؤال
Which of the following would be considered the strongest password?

A) JeR3My
B) tHund3r$t0rM
C) SouTHWeST!
D) #1fusion
سؤال
External hard drives can be used to help ____.

A) prevent computer hacking
B) avoid data loss
C) safeguard against software threats
D) protect your system against spyware
سؤال
If non-copyrighted information is published on a Web site, ____.

A) it is true
B) it cannot be copied and used as your own
C) it is false
D) the author is relieved of any responsibility
سؤال
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What can Nelson do to help avoid or minimize eyestrain?

A) Use a low-resolution monitor to increase visibility
B) Stay in the same position so his eyes become more comfortable
C) Avoid using extra lighting so the monitor is more easily visible
D) Take regular breaks to allow the eye muscles to relax
سؤال
Any information stored on a computer in an educational facility is the property of the ____.

A) person using the computer
B) school
C) person who created the information
D) none of the above
سؤال
When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations?

A) When you use a secure site
B) Only if you don't have a firewall
C) When the data is encrypted
D) Any time
سؤال
To make sure your e-commerce transactions are secure and to protect your private information, you should ____.

A) use a secure browser
B) check privacy policies
C) keep personal information private
D) all of the above
سؤال
Which of the following is not true about spyware?

A) It tracks your Web habits
B) It can take over control of your computer
C) It has redeeming qualities
D) It can direct you to Web sites you have not chosen to visit
سؤال
Often, you can inadvertently run a virus program by ____.

A) installing a security update
B) backing up data
C) opening an e-mail message or attachment
D) using a surge protector
سؤال
What is another term for brute force attacks?

A) Browser hijacking
B) Spyware attacks
C) Keylogger attacks
D) Dictionary attacks
سؤال
When you use a computer in a public place, you should ____.

A) verify that you have logged off
B) install antivirus software
C) use cookies to track your computer use
D) use a code name
سؤال
FIGURE 30-2 <strong>FIGURE 30-2   You could use the program shown in Figure 30-2 above to ____.</strong> A) protect your system against spyware B) back up files C) configure a hardware firewall D) password protect your wireless network <div style=padding-top: 35px> You could use the program shown in Figure 30-2 above to ____.

A) protect your system against spyware
B) back up files
C) configure a hardware firewall
D) password protect your wireless network
سؤال
What should you do before donating a computer?

A) Remove the antivirus software
B) Password-protect the operating system
C) Delete data from the hard drive
D) Turn off any encryption technologies
سؤال
A(n) ____________________ is a malicious program that records keystrokes.
سؤال
Match between columns
Where could you back up data?
FBI site
Where could you back up data?
Backup and Restore Center window
Where could you back up data?
VeriSign site
Where could you back up data?
Occupational Safety and Health Administration site
Where could you back up data?
Federal Trade Commission site
Where could you find resources for Internet safety?
FBI site
Where could you find resources for Internet safety?
Backup and Restore Center window
Where could you find resources for Internet safety?
VeriSign site
Where could you find resources for Internet safety?
Occupational Safety and Health Administration site
Where could you find resources for Internet safety?
Federal Trade Commission site
Where could you purchase an SSL certificate?
FBI site
Where could you purchase an SSL certificate?
Backup and Restore Center window
Where could you purchase an SSL certificate?
VeriSign site
Where could you purchase an SSL certificate?
Occupational Safety and Health Administration site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Where could you find guidelines to make sure your e-commerce transactions are secure?
FBI site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Backup and Restore Center window
Where could you find guidelines to make sure your e-commerce transactions are secure?
VeriSign site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Occupational Safety and Health Administration site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Federal Trade Commission site
Where would you find guidelines for using and purchasing computer equipment?
FBI site
Where would you find guidelines for using and purchasing computer equipment?
Backup and Restore Center window
Where would you find guidelines for using and purchasing computer equipment?
VeriSign site
Where would you find guidelines for using and purchasing computer equipment?
Occupational Safety and Health Administration site
Where would you find guidelines for using and purchasing computer equipment?
Federal Trade Commission site
سؤال
Why are passwords important? How do you maintain passwords and keep them secure? How do you create a strong password?
سؤال
____________________ are small files that are created when you visit a Web site and are stored on your computer, then accessed again the next time you visit the same site.
سؤال
A(n) ____________________ encrypts the information in a data transmission.
سؤال
Hackers often use spyware to control your browser, a practice called ____________________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 30: Computer Safety and Ethics
1
Surge protectors help protect computers from ____.

A) hackers
B) sniffers
C) power spikes
D) hard disk crashes
C
2
Before providing personal information or credit card information on an e-commerce site, first verify that the site is secure.
True
3
A software firewall is more secure and easier to monitor than a hardware firewall.
False
4
It is the responsibility of a company or individual to protect their data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
5
A(n) public key deciphers the encrypted information in a transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
6
When communicating on a forum, blog, or social network or other similar Internet-related sites, use a(n) alias to protect your privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
7
Computer phishing involves invading someone else's computer, usually for personal gain or the satisfaction of a security system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
8
Data that has been saved cannot be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
9
One easy way to avoid data loss is to ____.

A) plug the computer into a grounded outlet
B) save frequently
C) install a firewall
D) turn on some form of encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
10
It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data.

A) hacking
B) encryption
C) spying
D) eavesdropping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
11
Sniffer attacks use a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
12
Some spyware disguises itself as antispyware to gain access to your system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
13
Eavesdropping software can be downloaded free from the Internet and used by a hacker to access an unsecured wireless connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
14
If a network is large, a software firewall that controls the computers from one point should be implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
15
Old computer hardware such as monitors can create an environmental hazard if disposed of improperly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
16
Using a notebook computer introduces risks not associated with desktop computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
17
What can result from making too many of the same motions over a long period of time?

A) Browser hijacking
B) Brute force attacks
C) Repetitive strain injury
D) Relaxed eye muscles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
18
What action might obstruct the air vents in your notebook computer and cause it to overheat?

A) Leaving it in the same position on the desk for too long
B) Using a cooling pad
C) Setting it directly on your lap
D) Plugging it into a grounded outlet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
19
If you work for a company that provides e-mail services, the information that you send is your property.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
20
Firewalls help prevent employees from tampering with or deleting data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
21
The goal of ____ is to collect information about the user, the user's browsing habits, and other personal information.

A) a sniffer
B) worms
C) a virus
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
22
TSL and SSL technology enables ____.

A) data to be backed up securely
B) companies to monitor unauthorized computer activity
C) system administrators to restrict access to files
D) sensitive information to be encrypted
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
23
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection?

A) Her Internet access could be slower
B) She could be charged additional costs
C) She could be held responsible for any illegal activity
D) Any of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
24
Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. What is the first step Molly should take when setting up her wireless network?

A) Download eavesdropping software
B) Change the default password
C) Turn off the default encryption
D) Configure a hardware firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
25
FIGURE 30-1 <strong>FIGURE 30-1   The message in Figure 30-1 above shows an example of ____.</strong> A) hacking B) phishing C) sniffing D) browser hijacking The message in Figure 30-1 above shows an example of ____.

A) hacking
B) phishing
C) sniffing
D) browser hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
26
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?

A) Expensive
B) Light-weight
C) Ergonomic
D) Soft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ____________________ is a program that hackers use to capture IDs and passwords on a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following would be considered the strongest password?

A) JeR3My
B) tHund3r$t0rM
C) SouTHWeST!
D) #1fusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
29
External hard drives can be used to help ____.

A) prevent computer hacking
B) avoid data loss
C) safeguard against software threats
D) protect your system against spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
30
If non-copyrighted information is published on a Web site, ____.

A) it is true
B) it cannot be copied and used as your own
C) it is false
D) the author is relieved of any responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
31
Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. What can Nelson do to help avoid or minimize eyestrain?

A) Use a low-resolution monitor to increase visibility
B) Stay in the same position so his eyes become more comfortable
C) Avoid using extra lighting so the monitor is more easily visible
D) Take regular breaks to allow the eye muscles to relax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
32
Any information stored on a computer in an educational facility is the property of the ____.

A) person using the computer
B) school
C) person who created the information
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
33
When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations?

A) When you use a secure site
B) Only if you don't have a firewall
C) When the data is encrypted
D) Any time
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
34
To make sure your e-commerce transactions are secure and to protect your private information, you should ____.

A) use a secure browser
B) check privacy policies
C) keep personal information private
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is not true about spyware?

A) It tracks your Web habits
B) It can take over control of your computer
C) It has redeeming qualities
D) It can direct you to Web sites you have not chosen to visit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
36
Often, you can inadvertently run a virus program by ____.

A) installing a security update
B) backing up data
C) opening an e-mail message or attachment
D) using a surge protector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
37
What is another term for brute force attacks?

A) Browser hijacking
B) Spyware attacks
C) Keylogger attacks
D) Dictionary attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
38
When you use a computer in a public place, you should ____.

A) verify that you have logged off
B) install antivirus software
C) use cookies to track your computer use
D) use a code name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
39
FIGURE 30-2 <strong>FIGURE 30-2   You could use the program shown in Figure 30-2 above to ____.</strong> A) protect your system against spyware B) back up files C) configure a hardware firewall D) password protect your wireless network You could use the program shown in Figure 30-2 above to ____.

A) protect your system against spyware
B) back up files
C) configure a hardware firewall
D) password protect your wireless network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
40
What should you do before donating a computer?

A) Remove the antivirus software
B) Password-protect the operating system
C) Delete data from the hard drive
D) Turn off any encryption technologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) ____________________ is a malicious program that records keystrokes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Where could you back up data?
FBI site
Where could you back up data?
Backup and Restore Center window
Where could you back up data?
VeriSign site
Where could you back up data?
Occupational Safety and Health Administration site
Where could you back up data?
Federal Trade Commission site
Where could you find resources for Internet safety?
FBI site
Where could you find resources for Internet safety?
Backup and Restore Center window
Where could you find resources for Internet safety?
VeriSign site
Where could you find resources for Internet safety?
Occupational Safety and Health Administration site
Where could you find resources for Internet safety?
Federal Trade Commission site
Where could you purchase an SSL certificate?
FBI site
Where could you purchase an SSL certificate?
Backup and Restore Center window
Where could you purchase an SSL certificate?
VeriSign site
Where could you purchase an SSL certificate?
Occupational Safety and Health Administration site
Where could you purchase an SSL certificate?
Federal Trade Commission site
Where could you find guidelines to make sure your e-commerce transactions are secure?
FBI site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Backup and Restore Center window
Where could you find guidelines to make sure your e-commerce transactions are secure?
VeriSign site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Occupational Safety and Health Administration site
Where could you find guidelines to make sure your e-commerce transactions are secure?
Federal Trade Commission site
Where would you find guidelines for using and purchasing computer equipment?
FBI site
Where would you find guidelines for using and purchasing computer equipment?
Backup and Restore Center window
Where would you find guidelines for using and purchasing computer equipment?
VeriSign site
Where would you find guidelines for using and purchasing computer equipment?
Occupational Safety and Health Administration site
Where would you find guidelines for using and purchasing computer equipment?
Federal Trade Commission site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
43
Why are passwords important? How do you maintain passwords and keep them secure? How do you create a strong password?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
44
____________________ are small files that are created when you visit a Web site and are stored on your computer, then accessed again the next time you visit the same site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
45
A(n) ____________________ encrypts the information in a data transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
46
Hackers often use spyware to control your browser, a practice called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 46 في هذه المجموعة.