Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Enhanced Discovering Computers 2017 Study Set 1
Quiz 5: Digital Security Ethics and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
Question 42
Multiple Choice
COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?
Question 43
Multiple Choice
Websites use which of the following to keep track of items in a user's shopping cart?
Question 44
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
Question 45
Multiple Choice
COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
Question 46
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
Question 47
Multiple Choice
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
Question 48
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
Question 49
Multiple Choice
Internet advertising firms often use which of the following to collect information about users web browsing habits?
Question 50
Multiple Choice
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
Question 51
Multiple Choice
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
Question 52
Multiple Choice
COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?
Question 53
Multiple Choice
Which of the following is the process of restricting access to certain material on the web?
Question 54
Multiple Choice
COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
Question 55
Multiple Choice
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?