Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Today
Quiz 15: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
Question 2
True/False
Scam refers to unsolicited e-mail sent to a large group of individuals at one time.
Question 3
True/False
Semirugged PCs are designed to withstand drops of three feet or more onto concrete,extreme temperature ranges,wet conditions,and use while being bounced around over rough terrain in a vehicle.
Question 4
True/False
At the present time,opting-out procedures are confusing and time-consuming,and they do not always work well.
Question 5
True/False
A privacy concern is the inclusion of digital camera capabilities in most mobile phones today.
Question 6
True/False
Information such as birth records,marriage certificates,and divorce information,as well as property purchases,assessments,liens,and tax values is confidential and can legally be seen only by authorized individuals.
Question 7
True/False
Read the Web site's piracy rules (if they exist)before providing any personal information.
Question 8
True/False
You can surf anonymously,opt out of some marketing activities,and use filters and other tools to limit your exposure to spam.
Question 9
True/False
The disaster recovery plan is also called a business continuity plan.
Question 10
True/False
In response to the increased occurrence of identity theft,some local governments have removed birth and death information from their available online records.
Question 11
True/False
There are many options for protecting yourself against computer monitoring by your employer or the government.
Question 12
True/False
Hardware theft can take many forms,including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.