Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Enhanced Discovering Computers Study Set 1
Quiz 5: Digital Safety and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 141
True/False
It is illegal for employers to use software programs that monitor employees.
Question 142
True/False
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
Question 143
Short Answer
A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
Question 144
True/False
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
Question 145
Short Answer
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
Question 146
True/False
FOIA enables public access to most government records.
Question 147
True/False
If a company does not have a formal email policy, it can read email messages without employee notification.
Question 148
True/False
HIPAA protects individuals against the wrongful disclosure of their health information.
Question 149
Short Answer
A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.
Question 150
True/False
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
Question 151
Short Answer
A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.
Question 152
Short Answer
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
Question 153
Short Answer
A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.