Comp Ch 9 – Flashcards

Unlock all answers in this set

Unlock answers
question
Worm
answer
A program that replicates itself and clogs computers and networks.
question
Firewall
answer
A(n) _______ acts as a security buffer between a corporation's private network and all external networks.
question
Digital Millennium Copyright Act
answer
According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
question
Computer Fraud and Abuse Act
answer
Computer criminals that create and spread viruses are punished under this law.
question
Digital Rights Management (DRM)
answer
Corporations often use this to prevent copyright violations.
question
Trojan horses
answer
Free computer games and free screen saver programs are typical carriers of _______.
question
Privacy Mode
answer
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
question
Information resellers
answer
People that collect and sell personal data are called _______.
question
Spyware
answer
Programs used to secretly record an individual's activities on the Internet are called _______.
question
Cookies
answer
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
question
Privacy
answer
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
question
Encryption
answer
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
question
Cyberbullying
answer
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.
question
Third-party cookies
answer
These are used by advertisers to keep track of your web activity as you move from one site to the next.
question
Employee-monitoring software
answer
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
question
Copyright
answer
This is a legal concept that gives content creators the right to control use and distribution of their work.
question
Freedom of Information Act
answer
This law gives you the right to look at your personal records held by government agencies.
question
Rogue
answer
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
question
Cracker
answer
This type of computer criminal creates and distributes malicious programs.
question
Dictionary attack
answer
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
question
Internet scam
answer
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
question
Denial of service attack
answer
Which among the following is a way to shut down an ISP or website?
question
Keeping the same password on all systems consistently
answer
Which of the following is not a measure to protect computer security?
question
Ad-Aware
answer
Which of the following is not malware?
question
WPA2
answer
Which of the following is the most widely used wireless network encryption for home wireless networks?
question
Keystroke logger
answer
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
question
Data security
answer
_______ is concerned with protecting software and data from unauthorized tampering or damage.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New