Deck 2: The Personal and Social Impact of Computers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/92
Play
Full screen (f)
Deck 2: The Personal and Social Impact of Computers
1
Who has extra knowledge of logon IDs, passwords, and company procedures that helps them evade detection and makes them especially dangerous?
A)crackers
B)hackers
C)insiders
D)script bunnies
A)crackers
B)hackers
C)insiders
D)script bunnies
C
2
Arash realized recently that someone has been withdrawing money from his account and is making purchases using his credit card.What type of computer crime is this?
A)identity fraud
B)identity theft
C)security fraud
D)security theft
A)identity fraud
B)identity theft
C)security fraud
D)security theft
B
3
What type of malware is triggered by a set of preconditions?
A)a virus
B)a worm
C)a logic bomb
D)a Trojan horse
A)a virus
B)a worm
C)a logic bomb
D)a Trojan horse
C
4
Which of the following is a useful policy for minimizing waste and mistake?
A)Keep tight control over all data tables.
B)Keep system report titles as brief as possible and simply indicate the report number.
C)Users should implement proper procedures to ensure correct input data.
D)Create error reports on a regular basis.
A)Keep tight control over all data tables.
B)Keep system report titles as brief as possible and simply indicate the report number.
C)Users should implement proper procedures to ensure correct input data.
D)Create error reports on a regular basis.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
5
People who enjoyed computer technology and spent time learning and using computer systems were originally referred to by what name?
A)cracker
B)insider
C)hacker
D)script bunny
A)cracker
B)insider
C)hacker
D)script bunny
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
6
What set of programs enables its user to gain administrator-level access to a computer or network?
A)a virus
B)a Trojan horse
C)a rootkit
D)a worm
A)a virus
B)a Trojan horse
C)a rootkit
D)a worm
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is an effective way of protecting computer systems against hackers?
A)develop policies and standards
B)implement a single password system
C)eliminate all guests accounts
D)install strong authentication and encryption
A)develop policies and standards
B)implement a single password system
C)eliminate all guests accounts
D)install strong authentication and encryption
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
8
What small program, hidden in a network or computer system, records identification numbers and passwords?
A)a rootkit
B)a logic bomb
C)a Trojan horse
D)a sniffer
A)a rootkit
B)a logic bomb
C)a Trojan horse
D)a sniffer
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
9
What is the practice of disguising illegally gained funds so that they seem legal?
A)identity theft
B)phishing
C)spoofing
D)money laundering
A)identity theft
B)phishing
C)spoofing
D)money laundering
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following should organizations do to protect their corporate computers from criminal hackers?
A)Install antivirus software on all computers.
B)Avoid creating frequent backups of critical data.
C)Remove any firewall that may have been installed between your corporate network and the Internet.
D)Enable several guest accounts.
A)Install antivirus software on all computers.
B)Avoid creating frequent backups of critical data.
C)Remove any firewall that may have been installed between your corporate network and the Internet.
D)Enable several guest accounts.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
11
Peter is a smart hacker.He talks people into sharing important information about the system they are using and then uses what he learns to hack into their system.What term refers to this type of crime?
A)dumpster diving
B)war driving
C)social engineering
D)intelligent probing
A)dumpster diving
B)war driving
C)social engineering
D)intelligent probing
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
12
What variable value is applied, using an algorithm, to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text?
A)a code
B)a key
C)a rootkit
D)a password
A)a code
B)a key
C)a rootkit
D)a password
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
13
Ian was recently laid off from the company and, with the help of his cousin who works for the competitor; he got into the company's file system and installed a virus.What term is used to refer to Ian in relation to the computer crime he committed?
A)a disgruntled employee
B)an insider
C)a professional hacker
D)a script bunny
A)a disgruntled employee
B)an insider
C)a professional hacker
D)a script bunny
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
14
The European Union has a data-protection directive that requires firms to have certain privacy procedures in place if they do which of the following?
A)transport data across a network
B)transport data between servers
C)transport data across national boundaries
D)transport data to anyone outside a company
A)transport data across a network
B)transport data between servers
C)transport data across national boundaries
D)transport data to anyone outside a company
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is an example of a company policy regarding the acquisition of computer systems and equipment?"
A)require an informal justification statement before purchase
B)require a definition of standard computing platforms
C)require the use of new vendors for all acquisitions
D)require complete design documentation
A)require an informal justification statement before purchase
B)require a definition of standard computing platforms
C)require the use of new vendors for all acquisitions
D)require complete design documentation
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
16
Kelsey is a new immigrant to Canada and she has shared her personal information with many institutions and is concerned that they may share her personal information with unauthorized parties without her consent.What type of concern does she have?
A)privacy
B)security
C)identity management
D)information management
A)privacy
B)security
C)identity management
D)information management
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
17
Victor was working on his computer when suddenly someone took control and began installing and retrieving files.What is the term used to refer to this situation?
A)spyware
B)password sniffer
C)keystroke loggers
D)malware
A)spyware
B)password sniffer
C)keystroke loggers
D)malware
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
18
You just bought the latest Call of Duty video game and Larry asks you to make a copy for him and he will pay you for it.Under what issue would this situation fall?
A)privacy
B)security
C)ethical
D)piracy
A)privacy
B)security
C)ethical
D)piracy
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
19
What is the main reason that one would use antivirus software?
A)to enable the computer to run faster
B)to prevent unauthorized access
C)to detect malware
D)to use as a firewall
A)to enable the computer to run faster
B)to prevent unauthorized access
C)to detect malware
D)to use as a firewall
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
20
If a court determines that a patent infringement is intentional and the patent holder claims $5 million in damages, up to what amount can the patent holder be awarded?
A)$150,000
B)$250,000 per infringement
C)$ 15 million
D)$10 million
A)$150,000
B)$250,000 per infringement
C)$ 15 million
D)$10 million
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
21
What Canadian legislation protects businesses against anti-spam and malware law?
A)PIPEDA
B)Sarbanes-Oxley
C)ECPA
D)CRTC
A)PIPEDA
B)Sarbanes-Oxley
C)ECPA
D)CRTC
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
22
What is the term used to denote the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them?
A)systems development
B)personal protection
C)ergonomics
D)ethics
A)systems development
B)personal protection
C)ergonomics
D)ethics
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
23
What condition can result from a job that involves sitting at a desk and using a computer all day?
A)formation of blood clots in the legs or lungs
B)severe chronic fatigue all over the body
C)permanent blindness and deafness
D)sleeping disorders
A)formation of blood clots in the legs or lungs
B)severe chronic fatigue all over the body
C)permanent blindness and deafness
D)sleeping disorders
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
24
The vast majority of computer-related crimes are reported to authorities.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is TRUE about e-mails?
A)E-mails that have been erased by the user cannot be retrieved.
B)E-mails are secure.
C)E-mails are protected and can never be used for discovery.
D)E-mails can be monitored by employers.
A)E-mails that have been erased by the user cannot be retrieved.
B)E-mails are secure.
C)E-mails are protected and can never be used for discovery.
D)E-mails can be monitored by employers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
26
Company YU recently added a paragraph on its website outlining how the information requested from its clients would be used and disclosed to third parties or vendors.Under which legislation would YU be convicted if it failed to comply to the rules governing management of personal information?
A)Electronic Commerce Protection Act
B)Information Act
C)Personal Information Protection and Electronic Documents Act
D)Privacy Act
A)Electronic Commerce Protection Act
B)Information Act
C)Personal Information Protection and Electronic Documents Act
D)Privacy Act
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
27
What act prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause?
A)the Electronic Communications Privacy Act
B)the Gramm-Leach-Bliley Act
C)the Freedom of Information Act
D)The Personal Information Protection and Electronic Documents Act
A)the Electronic Communications Privacy Act
B)the Gramm-Leach-Bliley Act
C)the Freedom of Information Act
D)The Personal Information Protection and Electronic Documents Act
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
28
The CAN-SPAM Act allows most e-mail spam to be sent as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
29
A rejected e-mail automatically goes to the junk e-mail folder provided by your e-mail service.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
30
What condition is an aggravation of the pathway for the nerves that travel through the wrist?
A)chronic idiopathic mylofibrosis
B)seated immobility thromboembolism
C)carpal tunnel syndrome
D)involuntary shaking of the hand
A)chronic idiopathic mylofibrosis
B)seated immobility thromboembolism
C)carpal tunnel syndrome
D)involuntary shaking of the hand
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
31
Because it is important to maintain accurate data and ensure that people understand their responsibilities, companies converting to ERP and e-commerce systems invest weeks of training for key users of the system's various modules.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is FALSE about the Electronic Commerce Protection Act (ECPA)?
A)ECPA is Canada's anti-spam and malware law.
B)ECPA replaces the e-commerce legislation enacted by the provinces and territories.
C)ECPA has penalties up to $1 million for individuals and up to $10 million for organizations.
D)ECPA forbids the installation of a program on the computer that could send an electronic message without the consent of the user.
A)ECPA is Canada's anti-spam and malware law.
B)ECPA replaces the e-commerce legislation enacted by the provinces and territories.
C)ECPA has penalties up to $1 million for individuals and up to $10 million for organizations.
D)ECPA forbids the installation of a program on the computer that could send an electronic message without the consent of the user.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
33
What should computer users do if they work at their machines for several hours a day?
A)use an ergonomic chair
B)change the resolution of the computers
C)change the orientation of the computer
D)use artificial tears
A)use an ergonomic chair
B)change the resolution of the computers
C)change the orientation of the computer
D)use artificial tears
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
34
Many organizations have established best practices to govern and guide employees' moral behaviour and establish a healthy workplace.Into what type of system would these guidelines fall?
A)rules and regulations
B)staff handbook
C)health and safety
D)code of ethics
A)rules and regulations
B)staff handbook
C)health and safety
D)code of ethics
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
35
Following an investigation by the Privacy Commissioner of Canada, what was Facebook forced to change in order to comply with PIPEDA?
A)its profit margin
B)its security policies
C)its privacy policies
D)its standards
A)its profit margin
B)its security policies
C)its privacy policies
D)its standards
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
36
What is the essence of the PIPEDA Act (The Personal Information Protection and Electronic Documents Act) in Canada?
A)it applies only to individuals' need to protect their identity
B)it deals with the protection of communications while in transit from sender to receiver
C)it covers how private-sector organizations can collect, use, and dispose personal information
D)it sanctions the use of personal information over the Internet
A)it applies only to individuals' need to protect their identity
B)it deals with the protection of communications while in transit from sender to receiver
C)it covers how private-sector organizations can collect, use, and dispose personal information
D)it sanctions the use of personal information over the Internet
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
37
What is the term for publishing an intentionally false written statement that is damaging to a person's or an organization's reputation?
A)discrimination
B)libel
C)slander
D)harassment
A)discrimination
B)libel
C)slander
D)harassment
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
38
According to the Nielsen survey, over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic websites.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
39
Jason has been fired by his company and he posted on his blog false rumours about his company.What term is used to refer to Jason's postings?
A)a security breach
B)a privacy breach
C)libel
D)vengeance
A)a security breach
B)a privacy breach
C)libel
D)vengeance
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
40
When waste is identified, it usually points to one common cause: the improper management of information systems and resources.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
41
While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
42
The use of e-mail among public officials might violate transborder data flow laws.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
43
Unfortunately, many intrusion detection systems frequently provide false alarms that result in wasted effort.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
44
Deleting the contents of the Recycle Bin make it impossible for individuals to view the deleted data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
45
Role-based system access means that only people who fill or used to fill a certain role can access a specific system.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
46
Recent court cases and police reports involving computer crime show that lawmakers are not yet ready to introduce newer and tougher computer crime legislation.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
47
Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
48
Federal law prohibits private employers from monitoring e-mail sent or received by their employees.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
49
Fingerprint authentication devices, used to provide security in the PC environment, are sometimes employed rather than passwords.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
50
To obtain a patent or to determine whether a patent exists in an area a company seeks to exploit, the Canadian Patent Office requires the company to submit a $1 million deposit.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
51
The Canadian government has established the Canadian Cyber Incident Response Centre to combat cyber attacks.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
52
To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
53
The Business Software Alliance (BSA) has become a prominent software antipiracy organization.It is estimated that in 2009 the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
54
In Canada, PIPEDA requires individual's consent to collect personal information and it can then be used for any purpose.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
55
The Electronic Commerce Protection Act (ECPA) is Canada's anti-spam and malware law.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
56
Smartphones, such as the iPhone and Google's Android phone, which can run applications, are impervious to malware.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
57
Few small- and medium-sized organizations are willing to outsource their network security operations.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
58
Software piracy is the act of authorized copying or distribution of copyrighted software.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
59
Tracking software for laptops is not yet available.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
60
Copyright laws protect processes, machines, and compositions of matter.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
61
Most organizations implement internal ____________________ to measure actual results against established goals, such as the percentage of end-user reports produced on time.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
62
Software is considered intellectual property and may be protected by copyright or ____________________ law.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
63
Many organizations use ____________________ software to provide a comprehensive display on a single computer screen of all the vital data related to an organization's security defences.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ spam is a new tactic spammers use to circumvent spam-filtering software.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
65
With ____________________ tools, law enforcement agencies can analyze crime data relative to other factors, including the locations of common crime scenes and certain demographic data.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
66
Managed ____________________ providers monitor, manage, and maintain network security for their customers.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) ____________________ is a person paid by a company to pose as a satisfied customer in order to lure other people into buying into the get-rich-quick plan.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
68
Spam messages often carry attached files with embedded ____________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
69
Flexibility is a major component of ergonomics and an important feature in computer devices.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
71
It has been clearly proven that increased use of cell phones can lead to an increased chance of brain cancer.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
72
The ____________________ Card causes phones to display a caller ID number specified by the caller rather than the actual number of the caller.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
73
Specialized hardware and software, such as ____________________ devices, can be used to encode data and information to help prevent unauthorized use.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
74
____________________ is the operation of a fake website by someone trying to gain access to customer's private information.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
75
Often, computer criminals manipulate people and get them to reveal their confidential information.This practice is called _______________.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) ____________________ system monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) ____________________ is a modified version of a virus.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ is involved in what is considered the largest copyright infringement case in history.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
79
A Mayo Clinic study found that heavy computer users have a much higher rate of carpel tunnel syndrome.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.
Unlock Deck
Unlock for access to all 92 flashcards in this deck.
Unlock Deck
k this deck