Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers Today
Quiz 15: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Computer tracking software sends identifying information to the computer tracking company on a regular basis.
Question 22
Multiple Choice
Hardware loss,as well as other security issues,can result from hardware damage (both intentional and accidental) and ____.
Question 23
True/False
One of the most obvious types of hardware loss is hardware theft.
Question 24
Multiple Choice
Our networked society has raised a number of ____ concerns.
Question 25
Multiple Choice
Although many of us may prefer not to think about it,____-the complete malfunction of a computer system-and other types of computer-related disasters do happen.
Question 26
Multiple Choice
____ can be used to secure portable computers,external hard drives,and other portable pieces of hardware to a table or other object.
Question 27
Multiple Choice
To facilitate using a computer lock,nearly all computers today come with a ____-a small opening built into the system unit case designed for computer locks.
Question 28
True/False
Prevention measures against the counterfeiting of documents-such as checks and identification cards-include using microprinting,watermarks,and other difficult-to-reproduce content.
Question 29
True/False
Mobile protection software can remotely lock down a lost or stolen phone,display a message on the phone containing instructions for returning the device,and/or play a sound to help the owner locate the phone if it is nearby.