Midterm comp

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Cyber-extortionists

Which of the following is someone who uses e-mail as a vehicle for extortion?

Computer addiction

Which of the following occurs when a computer consumes someones entire social life?

Information privacy

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

IP

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

The term fair use specifies how material may be used and helps to define intellectual property rights.

Which of the following statements is NOT true about intellectual property rights?

Information kept on an organizations premises has a higher security risk than information transmitted over networks

Which of the following statements is not true about Internet and network attacks

A worm

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

A cookie

Which of the following terms is used to describe a small text file that a Web server stores on your computer?

An IT code of conduct

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

Cracker

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

Cyberterrorists

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

Crimeware

Which term is used to describe software used by cybercriminals?

Schedule

______ feasibility measures whether the established deadlines for a project are reasonable.

Rootkit

A _____ is a program that hides in a computer and allows someone form a remote location to take full control of the computer

Ethical

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

Payload

Computer viruses, worms, and Trojan horses deliver their ____ on a computer when a user opens an infected file or runs an infected program, for example.

Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Define social engineering as it pertains to computers

The destructive event or prank the program is intended to deliver

Define the term, payload, as it pertains to computer crime.

Clear your history file when you are finished browsing

In order to safeguard your personal information, which of the following is recommended?

Spyware

Internet advertising firms often use which of the following to collect information about users Web browsing habits?

Web bug

One type of spyware is hidden on Web pages or in e-mail messages in the form of graphical images. What is the term for this type of spyware?

ENERGY STAR

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

Interview

The ____ is the most important data and information gathering technique for the systems analyst.

Request

The _____ becomes the first item in the project notebook.

Planning

The _____ phase for a project begins when the steering committee receives a project request

Session cookies

Web sites use which of the following to keep track of items in a user's shopping cart?

Malware

What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

It does not define what a legitimate business need is for viewing a credit report

What is the problem with the Fair Credit Reporting Act?

Content filtering

What term is used to describe the process of restricting access to certain material on the Web?

The use of an anonymizer program to surf the Web anonymously

Which is not an issue surrounding the concept of fair use, from copyright law?

Electronic Communications Privacy Act (ECPA)

Which of the following 1986 laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

Computer Matching and Privacy Protection Act

Which of the following 1988 laws regulates the use of government data to determine the eligibility of individuals for federal benefits?

Online or Internet-based illegal acts

Which of the following best describes the term, cybercrime?

Intellectual property

Which of the following category of rights are the rights to which creators are entitled for their work?

Copyright

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

Script kiddie

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

Employee monitoring

Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited?

Phishing

Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?

Computer security risk

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

Users are required to provide a software product's 25- character identification number before installing software

Which of the following is not a question of computer ethics?


Set pelajaran terkait

Marketing Principles: Chapter 11

View Set

Monopolistic Competition and Oligopoly

View Set

4.02 Honors Marine Biodiversity and Biotechnology

View Set

Understanding Research Methods Test #3 (Topics 14, 18, 22, 23)

View Set