Deck 9: Privacy, Security, and Ethics

Full screen (f)
exit full mode
Question
The use of the Internet,smartphones,or other devices to send or post content intended to hurt or embarrass another person.

A)identity theft
B)auction fraud
C)cyberbullying
D)snoopware
Use Space or
up arrow
down arrow
to flip the card.
Question
Which among the following is a way to shut down an ISP or website?

A)denial-of-service attack
B)viruses
C)Trojan horses
D)worms
Question
The most significant concerns for implementation of computer technology involve ________,security,and ethics.

A)accuracy
B)property
C)privacy
D)access
Question
People that collect and sell personal data are called ________.

A)direct marketers
B)fund-raisers
C)information resellers
D)government agencies
Question
Which of the following is not malware?

A)Trojan horses
B)viruses
C)worms
D)Ad-Aware
Question
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A)encryption
B)firewall
C)password
D)dictionary attack
Question
Corporations often use this to prevent copyright violations.

A)Digital Millennium Copyright Act
B)website encryption
C)digital rights management (DRM)
D)keyloggers
Question
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

A)malicious program
B)Internet scam
C)theft
D)data manipulation
Question
Programs used to secretly record an individual's activities on the Internet are called ________.

A)spyware
B)cookies
C)sniffer programs
D)keyloggers
Question
Most browsers offer this,which ensures that your browsing activity is not recorded on your hard disk.

A)illusion of anonymity
B)browser cache
C)history files
D)privacy mode
Question
Which type of program would likely be used by investigators to record a potential suspect's Internet activities?

A)cookie
B)global positioning system
C)keylogger
D)web bug
Question
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A)restriction
B)security
C)protection
D)encryption
Question
This type of computer criminal creates and distributes malicious programs.

A)employee
B)hacker
C)cracker
D)keylogger
Question
These are used by advertisers to keep track of your web activity as you move from one site to the next.

A)web bugs
B)history files
C)first-party cookies
D)third-party cookies
Question
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

A)Digital Millennium Copyright Act
B)Computer Abuse Amendments Act
C)The Gramm-Leach-Bliley Act
D)Computer Fraud and Abuse Act
Question
A program that replicates itself and clogs computers and networks.

A)virus
B)worm
C)denial-of-service attack
D)Trojan horse
Question
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A)worm
B)fake
C)virus
D)rogue
Question
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

A)spyware
B)freeware
C)employee-monitoring software
D)cookies
Question
Small data files that are deposited on a user's hard disk when they visit a website are called ________.

A)cookies
B)codes
C)cache
D)proxies
Question
Free computer games and free screen saver programs are typical carriers of ________.

A)DoS
B)worms
C)viruses
D)Trojan horses
Question
________ is the illegal assumption of someone's identity for the purposes of economic gain.

A)Denial-of-service attack
B)Keystroke logging
C)Cyberbullying
D)Identity theft
Question
Using publicly available databases,information resellers create ________ and sell them to direct marketers,fund-raisers,and others.

A)digital footprints
B)proxy people
C)electronic profiles
D)virtual avatars
Question
This law gives you the right to look at your personal records held by government agencies.

A)Gramm-Leach-Bliley Act
B)Freedom of Information Act
C)Family Educational Rights and Privacy Act
D)Computer Fraud and Abuse Act
Question
Computers infected by a virus,worm,or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________.

A)zombies
B)DoS sites
C)phishes
D)web bugs
Question
________ is concerned with protecting software and data from unauthorized tampering or damage.

A)Data backup
B)Physical security
C)Disaster recovery plan
D)Data security
Question
A ________ acts as a security buffer between a corporation's private network and all external networks.

A)firewall
B)password
C)disaster recovery plan
D)virus checker
Question
Which of the following is not a measure to protect computer security?

A)restricting access
B)encrypting data
C)copying data and storing it at a remote location
D)keeping the same password on all systems consistently
Question
A deceptive act,using the Internet,to trick people into spending their money and time for no gain is called an Internet ________.

A)worm
B)cookie
C)scam
D)malware
Question
________ store information about the current session,your general preferences,and your activity on the website.

A)First-party cookies
B)Web bugs
C)Third-party cookies
D)Keyloggers
Question
A ________ is someone who gains unauthorized access to computer systems.

A)cracker
B)cookie
C)hacker
D)logger
Question
Which of the following is the most widely used wireless network encryption for home wireless networks?

A)WEP
B)WPE
C)WPA
D)WPA2
Question
This is a legal concept that gives content creators the right to control use and distribution of their work.

A)piracy
B)ethics
C)copyright
D)privacy
Question
________ are used by advertising companies to keep track of your web activity as you move from one site to the next.

A)Sniffers
B)Third-party cookies
C)Keyloggers
D)First-party cookies
Question
________ is the use of the Internet,smartphones,or other devices to send or post content intended to hurt or embarrass another person.

A)Zombie apocalypse
B)Cyberbullying
C)Trojan horse attack
D)Identity theft
Question
________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.

A)A first-party cookie
B)A Trojan horse
C)A third-party cookie
D)Phishing
Question
________ are invisible images or HTML code hidden within a web page or email message and are used to transmit information without your knowledge.

A)Loggers
B)Cookies
C)History files
D)Web bugs
Question
Computer criminals that create and spread viruses are punished under this law.

A)Gramm-Leach-Bliley Act
B)Freedom of Information Act
C)Family Educational Rights and Privacy Act
D)Computer Fraud and Abuse Act
Question
A ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

A)zombie
B)DoS attack
C)worm
D)Trojan horse
Question
________,a privacy issue,relates to the responsibility of controlling who is able to use data.

A)Encryption
B)Access
C)Restriction
D)Protection
Question
________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

A)Viruses
B)Zombies
C)Web bugs
D)DoS
Question
The archiving and search features of the web make your online identity available indefinitely.
Question
________ scanning devices use fingerprints and iris scanners to identify individuals.

A)Visual
B)Biometric
C)Optical
D)Virtual
Question
Web bugs are usually hidden within the HTML code for a web page or in an email message as an invisible image.
Question
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
Question
________ is concerned with protecting software and data from unauthorized tampering or damage.

A)Cloud computing
B)Decryption
C)Phishing
D)Data security
Question
Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.
Question
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

A)Scams
B)Zombies
C)Rogues
D)Trojan horses
Question
Computer security focuses on protecting information,hardware,and software from unauthorized use as well as preventing or limiting the damage from intrusions,sabotage,and natural disasters.
Question
________ encrypt connections between company networks and remote users,such as workers connecting from home,creating a secure virtual connection to a company LAN across the Internet.

A)Loggers
B)Biometrics
C)Virtual private networks
D)Web bugs
Question
As a security buffer,all electronic communications coming into and leaving a corporation must be evaluated by the ________.

A)firewall
B)disaster recovery plan
C)encryption device
D)loss prevention team
Question
________ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A)Encryption
B)Prevention
C)Decryption
D)Restriction
Question
A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A)Trojan horse
B)dictionary
C)web bug
D)denial-of-service
Question
Spy removal programs are designed to detect and remove various types of privacy threats.
Question
It is against the law for keyloggers to be deposited on your hard drive by the company you work for.
Question
A ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

A)viral
B)phishing
C)rogue
D)worm
Question
Information systems consist of people,procedures,software,hardware,data,and the Internet.
Question
The essential element that controls how computers are used is a law.
Question
It is highly likely that each one of us has an electronic profile created by information resellers.
Question
Identity theft and mistaken identity are the same.
Question
________ is representing some other person's work and ideas as your own without giving credit to the original source.

A)Blogging
B)Phishing
C)Plagiarism
D)Key logging
Question
What is plagiarism,and why is it a particular concern today?
Question
Biometric scanning devices are used to scan employee identification cards.
Question
Privacy concerns the collection and use of data about individuals.
Question
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
Question
Describe spyware and computer monitoring software.
Question
Describe the three most common types of malware,including viruses,worms,and Trojan horses.
Question
Posting personal information such as your birth date,family member names,and home address,does not increase your risk of identity theft.
Question
Computer security is concerned with protecting information,hardware,and software from unauthorized use,as well as preventing or limiting the damage from intrusions,sabotage,and natural disasters.
Question
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
Question
Describe how information about individuals is collected and compiled.
Question
How do firewalls work?
Question
Explain cookies and identify the difference between first-party cookies and third-party cookies.
Question
Rogue Wi-Fi hotspots imitate free hotspots and capture information,such as usernames and passwords,sent by users to legitimate sites.
Question
Explain how a web bug works.
Question
Discuss copyright issues as they relate to the Internet,including software piracy and digital rights management,and the Digital Millennium Copyright Act.
Question
If copyright-protected music is uploaded to a website,it is legal to download it.
Question
What are computer ethics?
Question
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Privacy, Security, and Ethics
1
The use of the Internet,smartphones,or other devices to send or post content intended to hurt or embarrass another person.

A)identity theft
B)auction fraud
C)cyberbullying
D)snoopware
C
2
Which among the following is a way to shut down an ISP or website?

A)denial-of-service attack
B)viruses
C)Trojan horses
D)worms
A
3
The most significant concerns for implementation of computer technology involve ________,security,and ethics.

A)accuracy
B)property
C)privacy
D)access
C
4
People that collect and sell personal data are called ________.

A)direct marketers
B)fund-raisers
C)information resellers
D)government agencies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not malware?

A)Trojan horses
B)viruses
C)worms
D)Ad-Aware
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A)encryption
B)firewall
C)password
D)dictionary attack
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
Corporations often use this to prevent copyright violations.

A)Digital Millennium Copyright Act
B)website encryption
C)digital rights management (DRM)
D)keyloggers
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

A)malicious program
B)Internet scam
C)theft
D)data manipulation
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
Programs used to secretly record an individual's activities on the Internet are called ________.

A)spyware
B)cookies
C)sniffer programs
D)keyloggers
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Most browsers offer this,which ensures that your browsing activity is not recorded on your hard disk.

A)illusion of anonymity
B)browser cache
C)history files
D)privacy mode
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
Which type of program would likely be used by investigators to record a potential suspect's Internet activities?

A)cookie
B)global positioning system
C)keylogger
D)web bug
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A)restriction
B)security
C)protection
D)encryption
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
This type of computer criminal creates and distributes malicious programs.

A)employee
B)hacker
C)cracker
D)keylogger
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
These are used by advertisers to keep track of your web activity as you move from one site to the next.

A)web bugs
B)history files
C)first-party cookies
D)third-party cookies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

A)Digital Millennium Copyright Act
B)Computer Abuse Amendments Act
C)The Gramm-Leach-Bliley Act
D)Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
A program that replicates itself and clogs computers and networks.

A)virus
B)worm
C)denial-of-service attack
D)Trojan horse
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A)worm
B)fake
C)virus
D)rogue
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

A)spyware
B)freeware
C)employee-monitoring software
D)cookies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
Small data files that are deposited on a user's hard disk when they visit a website are called ________.

A)cookies
B)codes
C)cache
D)proxies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
Free computer games and free screen saver programs are typical carriers of ________.

A)DoS
B)worms
C)viruses
D)Trojan horses
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
________ is the illegal assumption of someone's identity for the purposes of economic gain.

A)Denial-of-service attack
B)Keystroke logging
C)Cyberbullying
D)Identity theft
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
Using publicly available databases,information resellers create ________ and sell them to direct marketers,fund-raisers,and others.

A)digital footprints
B)proxy people
C)electronic profiles
D)virtual avatars
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
This law gives you the right to look at your personal records held by government agencies.

A)Gramm-Leach-Bliley Act
B)Freedom of Information Act
C)Family Educational Rights and Privacy Act
D)Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
Computers infected by a virus,worm,or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________.

A)zombies
B)DoS sites
C)phishes
D)web bugs
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
________ is concerned with protecting software and data from unauthorized tampering or damage.

A)Data backup
B)Physical security
C)Disaster recovery plan
D)Data security
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
A ________ acts as a security buffer between a corporation's private network and all external networks.

A)firewall
B)password
C)disaster recovery plan
D)virus checker
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is not a measure to protect computer security?

A)restricting access
B)encrypting data
C)copying data and storing it at a remote location
D)keeping the same password on all systems consistently
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
A deceptive act,using the Internet,to trick people into spending their money and time for no gain is called an Internet ________.

A)worm
B)cookie
C)scam
D)malware
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
________ store information about the current session,your general preferences,and your activity on the website.

A)First-party cookies
B)Web bugs
C)Third-party cookies
D)Keyloggers
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
A ________ is someone who gains unauthorized access to computer systems.

A)cracker
B)cookie
C)hacker
D)logger
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is the most widely used wireless network encryption for home wireless networks?

A)WEP
B)WPE
C)WPA
D)WPA2
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
This is a legal concept that gives content creators the right to control use and distribution of their work.

A)piracy
B)ethics
C)copyright
D)privacy
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
________ are used by advertising companies to keep track of your web activity as you move from one site to the next.

A)Sniffers
B)Third-party cookies
C)Keyloggers
D)First-party cookies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
________ is the use of the Internet,smartphones,or other devices to send or post content intended to hurt or embarrass another person.

A)Zombie apocalypse
B)Cyberbullying
C)Trojan horse attack
D)Identity theft
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.

A)A first-party cookie
B)A Trojan horse
C)A third-party cookie
D)Phishing
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
________ are invisible images or HTML code hidden within a web page or email message and are used to transmit information without your knowledge.

A)Loggers
B)Cookies
C)History files
D)Web bugs
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
Computer criminals that create and spread viruses are punished under this law.

A)Gramm-Leach-Bliley Act
B)Freedom of Information Act
C)Family Educational Rights and Privacy Act
D)Computer Fraud and Abuse Act
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
A ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

A)zombie
B)DoS attack
C)worm
D)Trojan horse
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
________,a privacy issue,relates to the responsibility of controlling who is able to use data.

A)Encryption
B)Access
C)Restriction
D)Protection
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

A)Viruses
B)Zombies
C)Web bugs
D)DoS
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
The archiving and search features of the web make your online identity available indefinitely.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
________ scanning devices use fingerprints and iris scanners to identify individuals.

A)Visual
B)Biometric
C)Optical
D)Virtual
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
Web bugs are usually hidden within the HTML code for a web page or in an email message as an invisible image.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
A tracking cookie is generally used by an advertising company affiliated with a website you have visited to keep track of your web activity as you move from one site to the next.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
________ is concerned with protecting software and data from unauthorized tampering or damage.

A)Cloud computing
B)Decryption
C)Phishing
D)Data security
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
Most browsers offer a privacy mode which ensures that your browsing activity is not recorded on your hard disk.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

A)Scams
B)Zombies
C)Rogues
D)Trojan horses
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
Computer security focuses on protecting information,hardware,and software from unauthorized use as well as preventing or limiting the damage from intrusions,sabotage,and natural disasters.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
________ encrypt connections between company networks and remote users,such as workers connecting from home,creating a secure virtual connection to a company LAN across the Internet.

A)Loggers
B)Biometrics
C)Virtual private networks
D)Web bugs
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
As a security buffer,all electronic communications coming into and leaving a corporation must be evaluated by the ________.

A)firewall
B)disaster recovery plan
C)encryption device
D)loss prevention team
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
________ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A)Encryption
B)Prevention
C)Decryption
D)Restriction
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A)Trojan horse
B)dictionary
C)web bug
D)denial-of-service
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
Spy removal programs are designed to detect and remove various types of privacy threats.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
It is against the law for keyloggers to be deposited on your hard drive by the company you work for.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
A ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

A)viral
B)phishing
C)rogue
D)worm
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
Information systems consist of people,procedures,software,hardware,data,and the Internet.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
The essential element that controls how computers are used is a law.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
It is highly likely that each one of us has an electronic profile created by information resellers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
Identity theft and mistaken identity are the same.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
________ is representing some other person's work and ideas as your own without giving credit to the original source.

A)Blogging
B)Phishing
C)Plagiarism
D)Key logging
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
What is plagiarism,and why is it a particular concern today?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
Biometric scanning devices are used to scan employee identification cards.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
Privacy concerns the collection and use of data about individuals.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
Describe spyware and computer monitoring software.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
Describe the three most common types of malware,including viruses,worms,and Trojan horses.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Posting personal information such as your birth date,family member names,and home address,does not increase your risk of identity theft.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
Computer security is concerned with protecting information,hardware,and software from unauthorized use,as well as preventing or limiting the damage from intrusions,sabotage,and natural disasters.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
Describe how information about individuals is collected and compiled.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
How do firewalls work?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
Explain cookies and identify the difference between first-party cookies and third-party cookies.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
Rogue Wi-Fi hotspots imitate free hotspots and capture information,such as usernames and passwords,sent by users to legitimate sites.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
Explain how a web bug works.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
Discuss copyright issues as they relate to the Internet,including software piracy and digital rights management,and the Digital Millennium Copyright Act.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
If copyright-protected music is uploaded to a website,it is legal to download it.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
What are computer ethics?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.