Deck 15: Computer Security and Privacy

ملء الشاشة (f)
exit full mode
سؤال
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Scam refers to unsolicited e-mail sent to a large group of individuals at one time.
سؤال
Semirugged PCs are designed to withstand drops of three feet or more onto concrete,extreme temperature ranges,wet conditions,and use while being bounced around over rough terrain in a vehicle.
سؤال
At the present time,opting-out procedures are confusing and time-consuming,and they do not always work well.
سؤال
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
سؤال
Information such as birth records,marriage certificates,and divorce information,as well as property purchases,assessments,liens,and tax values is confidential and can legally be seen only by authorized individuals.
سؤال
Read the Web site's piracy rules (if they exist)before providing any personal information.
سؤال
You can surf anonymously,opt out of some marketing activities,and use filters and other tools to limit your exposure to spam.
سؤال
The disaster recovery plan is also called a business continuity plan.
سؤال
In response to the increased occurrence of identity theft,some local governments have removed birth and death information from their available online records.
سؤال
There are many options for protecting yourself against computer monitoring by your employer or the government.
سؤال
Hardware theft can take many forms,including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
سؤال
It is not a good idea to turn off your computer before moving it.
سؤال
Some states permit searches for property located in that state,such as displaying the owner's name,address,and a link to additional information including property value for the supplied owner name.
سؤال
Some electronic tools,such as computer monitoring software and video surveillance equipment,can be used legally by individuals,businesses,and law enforcement agencies.
سؤال
The video card is worn by an employee for continuous access and monitoring purposes.
سؤال
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
سؤال
Information about individuals is not available in government databases.
سؤال
System failure can occur because of a hardware problem,software problem,or a computer virus.
سؤال
Cookies and spyware are possible privacy risks.
سؤال
Computer tracking software sends identifying information to the computer tracking company on a regular basis.
سؤال
Hardware loss,as well as other security issues,can result from hardware damage (both intentional and accidental)and ____.

A)spikes
B)interrupted power
C)system failure
D)all of the above
سؤال
One of the most obvious types of hardware loss is hardware theft.
سؤال
Our networked society has raised a number of ____ concerns.

A)privacy
B)patent
C)hardware theft
D)software quality
سؤال
Although many of us may prefer not to think about it,____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.

A)software piracy
B)interrupted power
C)spikes
D)system failure
سؤال
____ can be used to secure portable computers,external hard drives,and other portable pieces of hardware to a table or other object.

A)Surge suppressors
B)Password locks
C)Spike suppressors
D)Cable locks
سؤال
To facilitate using a computer lock,nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A)security slot
B)cable anchor
C)security opening
D)user lock
سؤال
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting,watermarks,and other difficult-to-reproduce content.
سؤال
Mobile protection software can remotely lock down a lost or stolen phone,display a message on the phone containing instructions for returning the device,and/or play a sound to help the owner locate the phone if it is nearby.
سؤال
To provide continuous power to facilities (such as hospitals,nuclear power plants,and business data centers)that cannot afford to be without power for any period of time,generators can be used.
سؤال
Chain locks can be used to secure computers and other hardware.
سؤال
To comply with truth-in-advertising laws,a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address.
سؤال
Software piracy can occur because of a natural disaster (such as a tornado,fire,flood,or hurricane),sabotage,or terrorist attack.
سؤال
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer,record the activities taking place,take screen shots of the screen at specified intervals,and more.
سؤال
Often used in conjunction with face recognition technology,public video surveillance systems are used to try to identify known terrorists and other criminals,to identify criminals whose crimes are caught on tape,and to prevent crimes from occurring.
سؤال
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled.
سؤال
It is illegal to use computer monitoring software on your own computer or on the computers of your employees.
سؤال
To prevent pop-up ads from disturbing your Internet sessions,use a(n)antipop-up cookie-such as the one built-into the Google toolbar or the ones that can be enabled through many Web browsers.
سؤال
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time,even just a few minutes ago,when needed.
سؤال
A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk.
سؤال
One common way to deal with spam that makes it to your computer is to use a(n)____.

A)e-mail filter
B)spam e-mail address
C)encryption scheme
D)hot site
سؤال
Some software tools are not designed to prevent hardware from being stolen;instead,they are designed to aid in its ____.

A)recycle
B)recovery
C)repair
D)running
سؤال
____ systems encrypt everything stored on the drive (the operating system,application programs,data,temporary files,and so forth)automatically without any user interaction.

A)USB
B)RFID
C)IDC
D)FDE
سؤال
When spam is sent via IM it is called ____.

A)spoof
B)phish
C)spim
D)junk
سؤال
For online shopping,signing up for free offers,discussion groups,product registration,and other activities that typically lead to junk e-mail,use a disposable or ____.

A)junkie e-mail address
B)throw-away e-mail address
C)one-use e-mail address
D)second-hand e-mail address
سؤال
Creating a ____ means making a duplicate copy of important files so that when a problem occurs,you can restore those files using the copy.

A)mirror
B)hotspot
C)hot file
D)backup
سؤال
A(n)____ is an alternate location equipped with the computers,cabling,desks,and other equipment necessary to keep a business's operations going.

A)buddy site
B)alternate pad
C)hot site
D)white room
سؤال
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

A)pads
B)sleeves
C)pillows
D)cushions
سؤال
Collecting in-depth information about an individual is known as ____.

A)personal databasing
B)identity theft
C)information piracy
D)electronic profiling
سؤال
Most businesses and Web sites that collect personal information have a(n)____ that discloses how the personal information you provide will be used.

A)piracy policy
B)security policy
C)identity policy
D)privacy policy
سؤال
<strong>  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.</strong> A)encrypted B)locked C)registered D)indexed <div style=padding-top: 35px>
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

A)encrypted
B)locked
C)registered
D)indexed
سؤال
To prevent the counterfeiting of U.S.currency,the Treasury Department releases new currency designs every ____.

A)7 to 10 years
B)10 years
C)10 to 12 years
D)12 years
سؤال
____ are used for marketing purposes,such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

A)Government databases
B)Marketing databases
C)Educational databases
D)Research databases
سؤال
A marketing activity that can be considered a privacy risk is ____.

A)security threads
B)watermarking
C)electronic profiling
D)microprinting
سؤال
<strong>  Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____,as shown in the accompanying figure.</strong> A)UPS B)surge suppressor C)voltage controller D)voltage meter <div style=padding-top: 35px>
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____,as shown in the accompanying figure.

A)UPS
B)surge suppressor
C)voltage controller
D)voltage meter
سؤال
To supplement backup procedures,businesses and other organizations should have a(n)____.

A)insurance plan
B)continuation rule
C)disaster recovery plan
D)survival guide
سؤال
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A)information privacy
B)information security
C)information piracy
D)digital Counterfeiting
سؤال
____ devices typically have a durable case and are spill-resistant,but may not withstand falls from three feet or more onto concrete.

A)Malleable
B)Rugged
C)Semirugged
D)Ultrarugged
سؤال
____ devices are designed to withstand much more physical abuse than conventional devices.

A)Secured
B)Ruggedized
C)Malleable
D)Flexible
سؤال
____ are small programs that take care of software-specific problems,or bugs,such as security holes.

A)Backups
B)Applets
C)Scripts
D)Patches
سؤال
____ refers to the ability of one computing device on a network (such as the Internet)to locate and identify another device on the same network and determine its status.

A)Presence technology
B)Computer monitoring
C)Digital surveillance
D)Detection technology
سؤال
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.
سؤال
For monitoring the physical locations of employees,video cameras can be used,but another possibility is the use of ____.

A)proximity cards
B)presence technology
C)face recognition
D)video cards
سؤال
Case 15-1
IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions.
One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised.Which of the following technologies would be useful in this case?

A)kill switch hard drives
B)surge suppressors
C)DataDots
D)keylogging software
سؤال
____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

A)Computer monitoring
B)Computer surveillance
C)Multimedia surveillance
D)Video surveillance
سؤال
Often any sign that computer tracking software is running on the computer or is sending information via the Internet is hidden from the user;this type of software is sometimes called ____________________ software.
سؤال
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

A)filter
B)opt in
C)opt out
D)share accept
سؤال
____________________ fluctuations,heat,dust,and static can all damage computer hardware.
سؤال
____________________ occurs when hardware is stolen from an individual or from a business,school,or other organization.
سؤال
The high level of concern regarding computer security and personal privacy has led state and federal legislators to pass a variety of laws since the ____.

A)1950s
B)1960s
C)1970s
D)1980s
سؤال
____ refers to companies recording or observing the actions of employees while on the job.

A)Computer monitoring
B)Video surveillance
C)Employee monitoring
D)Identity theft
سؤال
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
In order to lessen the chances of his main e-mail address getting spam,he uses a ____ e-mail address when shopping online.

A)kill switch
B)throw-away
C)permanent
D)keylogging
سؤال
____ is the use of video cameras to monitor activities of individuals,such as employees or individuals in public locations,for work-related or crime-prevention purposes.

A)Computer monitoring
B)Computer surveillance
C)Multimedia surveillance
D)Video surveillance
سؤال
Laptop ____________________ software emits a very loud noise if the computer is unplugged,if USB devices are removed,or if the computer is shut down without the owner's permission.
سؤال
Case 15-1
IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions.
Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft.IBF advises her to attach ____ to these devices.

A)kill switches
B)surge suppressors
C)asset tags
D)keyloggers
سؤال
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

A)Antivirus software
B)Antispyware software
C)Antispoof software
D)Antiphish software
سؤال
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
To further protect his privacy,Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A)opt out
B)disengage
C)build filters
D)block contact
سؤال
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
Before providing any personal information on a shopping site,Samuel always reads the Web site's ____.

A)protection history
B)consumer policy
C)privacy record
D)privacy policy
سؤال
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

A)Surveillance software
B)Video software
C)Computer monitoring software
D)Audio software
سؤال
By ____,you instruct companies you do business with that they cannot share your personal data with third parties.

A)signing piracy agreements
B)opting out
C)contracting legal help
D)e-mailing them
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Computer Security and Privacy
1
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
True
2
Scam refers to unsolicited e-mail sent to a large group of individuals at one time.
False
3
Semirugged PCs are designed to withstand drops of three feet or more onto concrete,extreme temperature ranges,wet conditions,and use while being bounced around over rough terrain in a vehicle.
False
4
At the present time,opting-out procedures are confusing and time-consuming,and they do not always work well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
Information such as birth records,marriage certificates,and divorce information,as well as property purchases,assessments,liens,and tax values is confidential and can legally be seen only by authorized individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
Read the Web site's piracy rules (if they exist)before providing any personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
You can surf anonymously,opt out of some marketing activities,and use filters and other tools to limit your exposure to spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
The disaster recovery plan is also called a business continuity plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
In response to the increased occurrence of identity theft,some local governments have removed birth and death information from their available online records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
There are many options for protecting yourself against computer monitoring by your employer or the government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
Hardware theft can take many forms,including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
It is not a good idea to turn off your computer before moving it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Some states permit searches for property located in that state,such as displaying the owner's name,address,and a link to additional information including property value for the supplied owner name.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
Some electronic tools,such as computer monitoring software and video surveillance equipment,can be used legally by individuals,businesses,and law enforcement agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
The video card is worn by an employee for continuous access and monitoring purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
Information about individuals is not available in government databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
System failure can occur because of a hardware problem,software problem,or a computer virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
Cookies and spyware are possible privacy risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
Computer tracking software sends identifying information to the computer tracking company on a regular basis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Hardware loss,as well as other security issues,can result from hardware damage (both intentional and accidental)and ____.

A)spikes
B)interrupted power
C)system failure
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
One of the most obvious types of hardware loss is hardware theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
Our networked society has raised a number of ____ concerns.

A)privacy
B)patent
C)hardware theft
D)software quality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
Although many of us may prefer not to think about it,____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.

A)software piracy
B)interrupted power
C)spikes
D)system failure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
____ can be used to secure portable computers,external hard drives,and other portable pieces of hardware to a table or other object.

A)Surge suppressors
B)Password locks
C)Spike suppressors
D)Cable locks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
To facilitate using a computer lock,nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.

A)security slot
B)cable anchor
C)security opening
D)user lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting,watermarks,and other difficult-to-reproduce content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
Mobile protection software can remotely lock down a lost or stolen phone,display a message on the phone containing instructions for returning the device,and/or play a sound to help the owner locate the phone if it is nearby.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
To provide continuous power to facilities (such as hospitals,nuclear power plants,and business data centers)that cannot afford to be without power for any period of time,generators can be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
Chain locks can be used to secure computers and other hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
To comply with truth-in-advertising laws,a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
Software piracy can occur because of a natural disaster (such as a tornado,fire,flood,or hurricane),sabotage,or terrorist attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
Computer monitoring programs can keep a log of all computer keystrokes performed on a computer,record the activities taking place,take screen shots of the screen at specified intervals,and more.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Often used in conjunction with face recognition technology,public video surveillance systems are used to try to identify known terrorists and other criminals,to identify criminals whose crimes are caught on tape,and to prevent crimes from occurring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
It is illegal to use computer monitoring software on your own computer or on the computers of your employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
To prevent pop-up ads from disturbing your Internet sessions,use a(n)antipop-up cookie-such as the one built-into the Google toolbar or the ones that can be enabled through many Web browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time,even just a few minutes ago,when needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
One common way to deal with spam that makes it to your computer is to use a(n)____.

A)e-mail filter
B)spam e-mail address
C)encryption scheme
D)hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
Some software tools are not designed to prevent hardware from being stolen;instead,they are designed to aid in its ____.

A)recycle
B)recovery
C)repair
D)running
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
____ systems encrypt everything stored on the drive (the operating system,application programs,data,temporary files,and so forth)automatically without any user interaction.

A)USB
B)RFID
C)IDC
D)FDE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
When spam is sent via IM it is called ____.

A)spoof
B)phish
C)spim
D)junk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
For online shopping,signing up for free offers,discussion groups,product registration,and other activities that typically lead to junk e-mail,use a disposable or ____.

A)junkie e-mail address
B)throw-away e-mail address
C)one-use e-mail address
D)second-hand e-mail address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
Creating a ____ means making a duplicate copy of important files so that when a problem occurs,you can restore those files using the copy.

A)mirror
B)hotspot
C)hot file
D)backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
A(n)____ is an alternate location equipped with the computers,cabling,desks,and other equipment necessary to keep a business's operations going.

A)buddy site
B)alternate pad
C)hot site
D)white room
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

A)pads
B)sleeves
C)pillows
D)cushions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
Collecting in-depth information about an individual is known as ____.

A)personal databasing
B)identity theft
C)information piracy
D)electronic profiling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
Most businesses and Web sites that collect personal information have a(n)____ that discloses how the personal information you provide will be used.

A)piracy policy
B)security policy
C)identity policy
D)privacy policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
<strong>  The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.</strong> A)encrypted B)locked C)registered D)indexed
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

A)encrypted
B)locked
C)registered
D)indexed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
To prevent the counterfeiting of U.S.currency,the Treasury Department releases new currency designs every ____.

A)7 to 10 years
B)10 years
C)10 to 12 years
D)12 years
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
____ are used for marketing purposes,such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.

A)Government databases
B)Marketing databases
C)Educational databases
D)Research databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
A marketing activity that can be considered a privacy risk is ____.

A)security threads
B)watermarking
C)electronic profiling
D)microprinting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
<strong>  Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____,as shown in the accompanying figure.</strong> A)UPS B)surge suppressor C)voltage controller D)voltage meter
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n)____,as shown in the accompanying figure.

A)UPS
B)surge suppressor
C)voltage controller
D)voltage meter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
To supplement backup procedures,businesses and other organizations should have a(n)____.

A)insurance plan
B)continuation rule
C)disaster recovery plan
D)survival guide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

A)information privacy
B)information security
C)information piracy
D)digital Counterfeiting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
____ devices typically have a durable case and are spill-resistant,but may not withstand falls from three feet or more onto concrete.

A)Malleable
B)Rugged
C)Semirugged
D)Ultrarugged
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
____ devices are designed to withstand much more physical abuse than conventional devices.

A)Secured
B)Ruggedized
C)Malleable
D)Flexible
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
____ are small programs that take care of software-specific problems,or bugs,such as security holes.

A)Backups
B)Applets
C)Scripts
D)Patches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
____ refers to the ability of one computing device on a network (such as the Internet)to locate and identify another device on the same network and determine its status.

A)Presence technology
B)Computer monitoring
C)Digital surveillance
D)Detection technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
One software tool that can be used to help increase the chance of a stolen or lost computer being recovered is computer ____________________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
For monitoring the physical locations of employees,video cameras can be used,but another possibility is the use of ____.

A)proximity cards
B)presence technology
C)face recognition
D)video cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
Case 15-1
IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions.
One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised.Which of the following technologies would be useful in this case?

A)kill switch hard drives
B)surge suppressors
C)DataDots
D)keylogging software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

A)Computer monitoring
B)Computer surveillance
C)Multimedia surveillance
D)Video surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
Often any sign that computer tracking software is running on the computer or is sending information via the Internet is hidden from the user;this type of software is sometimes called ____________________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.

A)filter
B)opt in
C)opt out
D)share accept
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
____________________ fluctuations,heat,dust,and static can all damage computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
____________________ occurs when hardware is stolen from an individual or from a business,school,or other organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
The high level of concern regarding computer security and personal privacy has led state and federal legislators to pass a variety of laws since the ____.

A)1950s
B)1960s
C)1970s
D)1980s
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
____ refers to companies recording or observing the actions of employees while on the job.

A)Computer monitoring
B)Video surveillance
C)Employee monitoring
D)Identity theft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
In order to lessen the chances of his main e-mail address getting spam,he uses a ____ e-mail address when shopping online.

A)kill switch
B)throw-away
C)permanent
D)keylogging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
____ is the use of video cameras to monitor activities of individuals,such as employees or individuals in public locations,for work-related or crime-prevention purposes.

A)Computer monitoring
B)Computer surveillance
C)Multimedia surveillance
D)Video surveillance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
Laptop ____________________ software emits a very loud noise if the computer is unplugged,if USB devices are removed,or if the computer is shut down without the owner's permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
Case 15-1
IBF Consultants,LLC provides consulting services in privacy and theft deterrence solutions.
Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft.IBF advises her to attach ____ to these devices.

A)kill switches
B)surge suppressors
C)asset tags
D)keyloggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

A)Antivirus software
B)Antispyware software
C)Antispoof software
D)Antiphish software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
To further protect his privacy,Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

A)opt out
B)disengage
C)build filters
D)block contact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
Case 15-2
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product.However,Samuel is also concerned about protecting his personal information.
Before providing any personal information on a shopping site,Samuel always reads the Web site's ____.

A)protection history
B)consumer policy
C)privacy record
D)privacy policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.

A)Surveillance software
B)Video software
C)Computer monitoring software
D)Audio software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
By ____,you instruct companies you do business with that they cannot share your personal data with third parties.

A)signing piracy agreements
B)opting out
C)contracting legal help
D)e-mailing them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.