Deck 9: Privacy, Security, and Ethics

ملء الشاشة (f)
exit full mode
سؤال
These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.

A) Spyware
B) Freeware
C) Employee-monitoring software
D) Cookies
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Corporations often use this to prevent copyright violations.

A) Digital Millennium Copyright Act
B) Website encryption
C) Digital rights management (DRM)
D) Keystroke loggers
سؤال
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A) Worm
B) Fake
C) Virus
D) Rogue
سؤال
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation
سؤال
This type of computer criminal creates and distributes malicious programs.

A) Employee
B) Hacker
C) Cracker
D) Keystroke logger
سؤال
Which of the following is not malware?

A) Trojan horses
B) Viruses
C) Worms
D) Ad-Aware
سؤال
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?

A) Cookie
B) Global positioning system
C) Keystroke logger
D) Web bug
سؤال
Free computer games and free screen saver programs are typical carriers of _______.

A) DoS
B) worms
C) viruses
D) Trojan horses
سؤال
People that collect and sell personal data are called _______.

A) direct marketers
B) fund-raisers
C) information resellers
D) government agencies
سؤال
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

A) Digital Millennium Copyright Act
B) Computer Abuse Amendments Act
C) The Gramm-Leach-Bliley Act
D) Computer Fraud and Abuse Act
سؤال
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

A) Identity theft
B) Auction fraud
C) Cyberbullying
D) Snoopware
سؤال
Small data files that are deposited on a user's hard disk when they visit a website are called _______.

A) cookies
B) codes
C) cache
D) proxies
سؤال
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

A) Illusion of anonymity
B) Browser cache
C) History files
D) Privacy mode
سؤال
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A) Restriction
B) Security
C) Protection
D) Encryption
سؤال
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A) Encryption
B) Firewall
C) Password
D) Dictionary attack
سؤال
These are used by advertisers to keep track of your web activity as you move from one site to the next.

A) Web bugs
B) History files
C) First-party cookies
D) Third-party cookies
سؤال
Which among the following is a way to shut down an ISP or website?

A) Denial of service attack
B) Viruses
C) Trojan horses
D) Worms
سؤال
The most significant concerns for implementation of computer technology involve _______, security, and ethics.

A) accuracy
B) property
C) privacy
D) access
سؤال
Programs used to secretly record an individual's activities on the Internet are called _______.

A) spyware
B) cookies
C) sniffer programs
D) keystroke loggers
سؤال
A program that replicates itself and clogs computers and networks.

A) Virus
B) Worm
C) Denial-of-service attack
D) Trojan horse
سؤال
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.
سؤال
Which of the following is not a measure to protect computer security?

A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently
سؤال
Computer criminals that create and spread viruses are punished under this law.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act
سؤال
The essential element that controls how computers are used is a law.
سؤال
Privacy concerns the collection and use of data about individuals.
سؤال
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.
سؤال
The archiving and search features of the web make your online identity available indefinitely.
سؤال
Which of the following is the most widely used wireless network encryption for home wireless networks?

A) WEP
B) WPE
C) WPA
D) WPA2
سؤال
Information systems consist of people, procedures, software, hardware, data, and the Internet.
سؤال
Spy removal programs are designed to detect and remove various types of privacy threats.
سؤال
This law gives you the right to look at your personal records held by government agencies.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act
سؤال
_______ is concerned with protecting software and data from unauthorized tampering or damage.

A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security
سؤال
Most browsers offer a privacy mode that ensures that your browsing activity is not recorded on your hard disk.
سؤال
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
سؤال
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
سؤال
Identity theft and mistaken identity are the same.
سؤال
A _______ acts as a security buffer between a corporation's private network and all external networks.

A) firewall
B) password
C) disaster recovery plan
D) virus checker
سؤال
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
سؤال
This is a legal concept that gives content creators the right to control use and distribution of their work.

A) Piracy
B) Ethics
C) Copyright
D) Privacy
سؤال
It is highly likely that each one of us has an electronic profile created by information resellers.
سؤال
_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
سؤال
_______-party cookies store information about the current session, your general preferences, and your activity on the website.
سؤال
Using publically available databases, information resellers create electronic _______ and sell them to direct marketers, fundraisers, and others.
سؤال
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
سؤال
If copyright-protected music is uploaded to a website, it is legal to download it.
سؤال
_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.
سؤال
A _______ (acronym or 3 words) attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.
سؤال
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
سؤال
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
سؤال
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
سؤال
_______ (2 words) is the illegal assumption of someone's identity for the purposes of economic gain.
سؤال
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
سؤال
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
سؤال
_______ bugs are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
سؤال
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
سؤال
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
سؤال
Biometric scanning devices are used to scan employee identification cards.
سؤال
A _______ is someone who gains unauthorized access to computer systems.
سؤال
_______, a privacy issue, relates to the responsibility of controlling who is able to use data.
سؤال
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
سؤال
What are computer ethics?
سؤال
Describe how information about individuals is collected and compiled.
سؤال
_______ scanning devices use fingerprints and iris scanners to identify individuals.
سؤال
Explain cookies and identify the difference between first-party cookies and third-party cookies.
سؤال
Describe spyware and computer monitoring software.
سؤال
_______ security is concerned with protecting software and data from unauthorized tampering or damage.
سؤال
_______ is representing some other person's work and ideas as your own without giving credit to the original source.
سؤال
_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
سؤال
_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
سؤال
What is plagiarism, and why is it a particular concern today?
سؤال
Describe the three most common types of malware, including viruses, worms, and Trojan horses.
سؤال
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.
سؤال
A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
سؤال
Explain how a web bug works.
سؤال
_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
سؤال
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
سؤال
How do firewalls work?
سؤال
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Privacy, Security, and Ethics
1
These programs record virtually everything you do on your computer and are used by employers to search employee e-mail and computer files.

A) Spyware
B) Freeware
C) Employee-monitoring software
D) Cookies
C
2
Corporations often use this to prevent copyright violations.

A) Digital Millennium Copyright Act
B) Website encryption
C) Digital rights management (DRM)
D) Keystroke loggers
C
3
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A) Worm
B) Fake
C) Virus
D) Rogue
D
4
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

A) Malicious program
B) Internet scam
C) Theft
D) Data manipulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
5
This type of computer criminal creates and distributes malicious programs.

A) Employee
B) Hacker
C) Cracker
D) Keystroke logger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is not malware?

A) Trojan horses
B) Viruses
C) Worms
D) Ad-Aware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?

A) Cookie
B) Global positioning system
C) Keystroke logger
D) Web bug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
8
Free computer games and free screen saver programs are typical carriers of _______.

A) DoS
B) worms
C) viruses
D) Trojan horses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
9
People that collect and sell personal data are called _______.

A) direct marketers
B) fund-raisers
C) information resellers
D) government agencies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
10
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

A) Digital Millennium Copyright Act
B) Computer Abuse Amendments Act
C) The Gramm-Leach-Bliley Act
D) Computer Fraud and Abuse Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
11
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

A) Identity theft
B) Auction fraud
C) Cyberbullying
D) Snoopware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
12
Small data files that are deposited on a user's hard disk when they visit a website are called _______.

A) cookies
B) codes
C) cache
D) proxies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
13
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

A) Illusion of anonymity
B) Browser cache
C) History files
D) Privacy mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
14
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A) Restriction
B) Security
C) Protection
D) Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
15
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A) Encryption
B) Firewall
C) Password
D) Dictionary attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
16
These are used by advertisers to keep track of your web activity as you move from one site to the next.

A) Web bugs
B) History files
C) First-party cookies
D) Third-party cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which among the following is a way to shut down an ISP or website?

A) Denial of service attack
B) Viruses
C) Trojan horses
D) Worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
18
The most significant concerns for implementation of computer technology involve _______, security, and ethics.

A) accuracy
B) property
C) privacy
D) access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
19
Programs used to secretly record an individual's activities on the Internet are called _______.

A) spyware
B) cookies
C) sniffer programs
D) keystroke loggers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
20
A program that replicates itself and clogs computers and networks.

A) Virus
B) Worm
C) Denial-of-service attack
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
21
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is not a measure to protect computer security?

A) Restricting access
B) Encrypting data
C) Copying data and storing it at a remote location
D) Keeping the same password on all systems consistently
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
23
Computer criminals that create and spread viruses are punished under this law.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
24
The essential element that controls how computers are used is a law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
25
Privacy concerns the collection and use of data about individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
26
Posting personal information such as your birth date, family member names, and home address, does not increase your risk of identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
27
The archiving and search features of the web make your online identity available indefinitely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is the most widely used wireless network encryption for home wireless networks?

A) WEP
B) WPE
C) WPA
D) WPA2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
29
Information systems consist of people, procedures, software, hardware, data, and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
30
Spy removal programs are designed to detect and remove various types of privacy threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
31
This law gives you the right to look at your personal records held by government agencies.

A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
32
_______ is concerned with protecting software and data from unauthorized tampering or damage.

A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
33
Most browsers offer a privacy mode that ensures that your browsing activity is not recorded on your hard disk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
34
Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
35
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
36
Identity theft and mistaken identity are the same.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
37
A _______ acts as a security buffer between a corporation's private network and all external networks.

A) firewall
B) password
C) disaster recovery plan
D) virus checker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
38
It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
39
This is a legal concept that gives content creators the right to control use and distribution of their work.

A) Piracy
B) Ethics
C) Copyright
D) Privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
40
It is highly likely that each one of us has an electronic profile created by information resellers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
41
_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
42
_______-party cookies store information about the current session, your general preferences, and your activity on the website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
43
Using publically available databases, information resellers create electronic _______ and sell them to direct marketers, fundraisers, and others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
44
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
45
If copyright-protected music is uploaded to a website, it is legal to download it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
46
_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
47
A _______ (acronym or 3 words) attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
48
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
49
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
50
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
51
_______ (2 words) is the illegal assumption of someone's identity for the purposes of economic gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
52
Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
53
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
54
_______ bugs are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
55
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
56
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
57
Biometric scanning devices are used to scan employee identification cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
58
A _______ is someone who gains unauthorized access to computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
59
_______, a privacy issue, relates to the responsibility of controlling who is able to use data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
60
Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
61
What are computer ethics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
62
Describe how information about individuals is collected and compiled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
63
_______ scanning devices use fingerprints and iris scanners to identify individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
64
Explain cookies and identify the difference between first-party cookies and third-party cookies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
65
Describe spyware and computer monitoring software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
66
_______ security is concerned with protecting software and data from unauthorized tampering or damage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
67
_______ is representing some other person's work and ideas as your own without giving credit to the original source.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
68
_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
69
_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
70
What is plagiarism, and why is it a particular concern today?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
71
Describe the three most common types of malware, including viruses, worms, and Trojan horses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
72
Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
73
A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
74
Explain how a web bug works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
75
_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
76
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
77
How do firewalls work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
78
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 78 في هذه المجموعة.