Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers in a Changing Society
Quiz 5: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
One of the most obvious types of hardware loss is hardware theft . _________________________
Question 22
True/False
Presence backup enables data backups to be made on a continual basis so that data can be recovered from any point in time, even just a few minutes ago, when needed. _________________________
Question 23
True/False
One software tool that can be used to help increase the chances of a stolen or lost device being recovered is device tracking software. _________________________
Question 24
Multiple Choice
Our networked society has raised a number of ____ concerns.
Question 25
Multiple Choice
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
Question 26
True/False
To comply with truth-in-advertising laws, a(n)unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
Question 27
Multiple Choice
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
Question 28
True/False
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting, watermarks , and other difficult-to-reproduce content. _________________________
Question 29
True/False
Mobile device protection software can remotely lock down a lost or stolen phone, display a message on the phone containing instructions for returning the device, and/or play a sound to help the owner locate the phone if it is nearby. _________________________
Question 30
True/False
Spam sent via IM is called sim . _________________________
Question 31
True/False
Chain locks can be used to secure computers and other hardware. _________________________
Question 32
True/False
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
Question 33
Multiple Choice
To facilitate using a computer lock, nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
Question 34
True/False
A(n)head crash occurs when a hard drive's read/write heads actually touch the surface of a hard disk. _________________________
Question 35
True/False
To provide continuous power to facilities (such as hospitals, nuclear power plants, and business data centers)that cannot afford to be without power for any period of time, generators can be used. _________________________