Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Study Set 1
Quiz 15: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
Question 22
Multiple Choice
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
Question 23
Multiple Choice
Our networked society has raised a number of ____ concerns.
Question 24
True/False
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
Question 25
True/False
Chain locks can be used to secure computers and other hardware. _________________________
Question 26
True/False
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
Question 27
True/False
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
Question 28
True/False
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and / or play a sound to help the owner locate the phone if it is nearby. _________________________
Question 29
True/False
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers) that cannot afford to be without power for any period of time, generators can be used. _________________________