Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Principles of Information Systems
Quiz 2: The Personal and Social Impact of Computers
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Who has extra knowledge of logon IDs, passwords, and company procedures that helps them evade detection and makes them especially dangerous?
Question 2
Multiple Choice
Arash realized recently that someone has been withdrawing money from his account and is making purchases using his credit card.What type of computer crime is this?
Question 3
Multiple Choice
What type of malware is triggered by a set of preconditions?
Question 4
Multiple Choice
Which of the following is a useful policy for minimizing waste and mistake?
Question 5
Multiple Choice
People who enjoyed computer technology and spent time learning and using computer systems were originally referred to by what name?
Question 6
Multiple Choice
What set of programs enables its user to gain administrator-level access to a computer or network?
Question 7
Multiple Choice
Which of the following is an effective way of protecting computer systems against hackers?
Question 8
Multiple Choice
What small program, hidden in a network or computer system, records identification numbers and passwords?
Question 9
Multiple Choice
What is the practice of disguising illegally gained funds so that they seem legal?
Question 10
Multiple Choice
Which of the following should organizations do to protect their corporate computers from criminal hackers?
Question 11
Multiple Choice
Peter is a smart hacker.He talks people into sharing important information about the system they are using and then uses what he learns to hack into their system.What term refers to this type of crime?