Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Systems Study Set 3
Quiz 13: Security and Ethical Challenges
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
According to the text, companies can use ________________ to attack the problem of unauthorized use of computer systems and networks, to monitor network traffic in order to reveal evidence of improper use.
Question 62
Multiple Choice
Indiscriminate sending of unsolicited e-mail messages to many Internet users is called _______________.
Question 63
Multiple Choice
A _______________ is software that can guess passwords.
Question 64
Multiple Choice
Good ergonomic design considers tools, tasks, the workstation, and _______________.
Question 65
Multiple Choice
Information technologies have caused a significant reduction in the following types of job opportunities, except:
Question 66
Multiple Choice
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________.