Deck 12: Security and Privacy in an Electronic Age

ملء الشاشة (f)
exit full mode
سؤال
____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.

A)Adware
B)Trackware
C)Spyware
D)Keyware
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.
سؤال
____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.
سؤال
The first federal legislation protecting the privacy of medical records is _______________.
سؤال
The ___________________________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
سؤال
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ______________ Act.
سؤال
_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.
سؤال
A ______________ is a program that attaches itself to another program and replicates itself.

A)disease
B)cold
C)spyglass
D)virus
سؤال
____________ theft involves someone using someone's private information to assume his or her identity.

A)Personal
B)Identity
C)Car
D)None of the above
سؤال
The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
سؤال
A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.
سؤال
_________________ is software that can be installed without the user's knowledge to track their actions on a computer.

A)Adware
B)Trackware
C)Spyware
D)Keyware
سؤال
Privacy includes the right to _____________________.

A)control personal information
B)own a computer
C)own a printer
D)use a computer
سؤال
____________________ is the unauthorized copying of software protected by copyright.
سؤال
The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.
سؤال
_______________ is the scrambling of data so that it does NOT make sense.
سؤال
The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
سؤال
________________ includes attempts to protect computer systems and the privacy of computerized data.

A)Security
B)SafeComputer
C)Both A and B
D)None of the above
سؤال
Under the __________ part of the American Recovery and Reinvestment Act of 2009,the privacy protections of HIPAA are strengthened and expanded significantly to,for example,businesses who work with your health care provider.

A)HITECH Act
B)Americans with Disabilities Act
C)Health Insurance Act
D)None of the above
سؤال
The unauthorized copying of software protected by copyright is a crime called _______________.

A)software stealth
B)software carbon
C)software piracy
D)None of the above
سؤال
The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.
سؤال
_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.
سؤال
_______________ are small files that a Web site may put on your hard drive when you visit.
سؤال
Electronic blocks (called __________________)can be used to limit access to networks.
سؤال
The _______________ has been interpreted to allow employers access to employees' e-mail.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Security and Privacy in an Electronic Age
1
____________ may display unwanted pop-up advertisements on your monitor;it may be related to the sites you search on the Web or even the content of your e-mail.

A)Adware
B)Trackware
C)Spyware
D)Keyware
Adware
2
A _______________ is a program that attaches itself to another program and replicates itself.It may do damage to your hardware or destroy your data.
virus
3
____________involves sending fraudulent messages via email or instant message that purport to be from a legitimate source such as a social network or IT administrator.The user is directed to a fake website and asked to enter information.
Phishing
4
The first federal legislation protecting the privacy of medical records is _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ___________________________ encourages the use of electronic medical records and requires health care facilities to have privacy policies.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
The penalties for damaging computer systems have been severely increased by the USA PATRIOT Act and the ______________ Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
_______________ has many aspects.Among them is the ability to control personal information and the right to keep it from misuse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ______________ is a program that attaches itself to another program and replicates itself.

A)disease
B)cold
C)spyglass
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
____________ theft involves someone using someone's private information to assume his or her identity.

A)Personal
B)Identity
C)Car
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The __________________ gives law enforcement agencies greater power to monitor electronic and other communications,with fewer checks.

A)Health Insurance Portability and Accountability Act
B)Americans with Disabilities Act
C)USA PATRIOT Act
D)Welfare Reform Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ___________ can connect the user with numbers without the user's knowledge;the dialer may connect the user's computer to an expensive 900 number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
_________________ is software that can be installed without the user's knowledge to track their actions on a computer.

A)Adware
B)Trackware
C)Spyware
D)Keyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Privacy includes the right to _____________________.

A)control personal information
B)own a computer
C)own a printer
D)use a computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
____________________ is the unauthorized copying of software protected by copyright.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
The _______________ Act gives lawenforcement agencies greater power to monitor electronic and other communications,with fewer checks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
_______________ is the scrambling of data so that it does NOT make sense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
The _______________ Act expands and centralizes the data gathering allowed under the USA PATRIOT Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
________________ includes attempts to protect computer systems and the privacy of computerized data.

A)Security
B)SafeComputer
C)Both A and B
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Under the __________ part of the American Recovery and Reinvestment Act of 2009,the privacy protections of HIPAA are strengthened and expanded significantly to,for example,businesses who work with your health care provider.

A)HITECH Act
B)Americans with Disabilities Act
C)Health Insurance Act
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
The unauthorized copying of software protected by copyright is a crime called _______________.

A)software stealth
B)software carbon
C)software piracy
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
The _______________ is composed of 470 insurance companies.Its database contains the health information on 15 million people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
_______________ of restricting access to computer systems includes fingerprints,handprints,retina or iris scans,lip prints,and facial thermography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
_______________ are small files that a Web site may put on your hard drive when you visit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Electronic blocks (called __________________)can be used to limit access to networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
The _______________ has been interpreted to allow employers access to employees' e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.