Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers in a Changing Society
Quiz 5: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Essay
Discuss the features and benefits of continuous data protection.
Question 82
Short Answer
____________________, the unauthorized copying of a computer program, is illegal in the United States and many other-but not all-countries.
Question 83
Short Answer
A growing illegal use of computer monitoring software is for a hacker to use a(n)____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
Question 84
Essay
Describe e-mail filters.
Question 85
Short Answer
A wireless ____________________ system ties your phone to a key fob in order to sound an alarm and lock the phone if the phone and key fob become further away than the specified allowable distance.
Question 86
Short Answer
The U.S. ____________________ Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.
Question 87
Short Answer
To protect hardware from damage due to power fluctuations, it is important for all users to use a surge ____________________ with a computer whenever it is plugged into a power outlet.
Question 88
Short Answer
____________________ labels change their appearance if someone (such as a thief)tries to remove them.
Question 89
Essay
Why should you be concerned about computer security?
Question 90
Short Answer
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits is called ____________________.
Question 91
Short Answer
As shown in the accompanying figure, a(n) ____________________ app can lock and unlock your computer automatically as your iPhone moves in and out of range.
Question 92
Short Answer
For users who need more protection than a protective case can provide, ____________________ devices (such as portable computers and mobile phones)are available.
Question 93
Essay
Discuss the proper disposal of hardware containing sensitive information.
Question 94
Short Answer
____________________ procedures, such as making copies of important documents and storing them in a safe location, also apply to important nonelectronic documents in your life, such as birth certificates, tax returns, passports, and so forth.
Question 95
Short Answer
By ____________________ businesses and consumers about the legal use of software and the possible negative consequences associated with breaking antipiracy laws, the industry hopes to reduce the known use of illegal software significantly.