Midterm comp

Unlock all answers in this set

Unlock answers
question
Which of the following occurs when a computer consumes someones entire social life?
answer
Computer addiction
question
Which of the following category of rights are the rights to which creators are entitled for their work?
answer
Intellectual property
question
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
answer
IP
question
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
answer
Copyright
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
answer
Ethical
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
answer
ENERGY STAR
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
Information privacy
question
Web sites use which of the following to keep track of items in a user's shopping cart?
answer
Session cookies
question
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?
answer
Phishing
question
Internet advertising firms often use which of the following to collect information about users Web browsing habits?
answer
Spyware
question
One type of spyware is hidden on Web pages or in e-mail messages in the form of graphical images. What is the term for this type of spyware?
answer
Web bug
question
Which of the following 1986 laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
answer
Electronic Communications Privacy Act (ECPA)
question
Which of the following 1988 laws regulates the use of government data to determine the eligibility of individuals for federal benefits?
answer
Computer Matching and Privacy Protection Act
question
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited?
answer
Employee monitoring
question
Which of the following statements is NOT true about intellectual property rights?
answer
The term fair use specifies how material may be used and helps to define intellectual property rights.
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
An IT code of conduct
question
In order to safeguard your personal information, which of the following is recommended?
answer
Clear your history file when you are finished browsing
question
Which of the following terms is used to describe a small text file that a Web server stores on your computer?
answer
A cookie
question
What is the problem with the Fair Credit Reporting Act?
answer
It does not define what a legitimate business need is for viewing a credit report
question
Define social engineering as it pertains to computers
answer
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
What term is used to describe the process of restricting access to certain material on the Web?
answer
Content filtering
question
Which of the following is not a question of computer ethics?
answer
Users are required to provide a software product's 25- character identification number before installing software
question
Which is not an issue surrounding the concept of fair use, from copyright law?
answer
The use of an anonymizer program to surf the Web anonymously
question
______ feasibility measures whether the established deadlines for a project are reasonable.
answer
Schedule
question
The ____ is the most important data and information gathering technique for the systems analyst.
answer
Interview
question
The _____ becomes the first item in the project notebook.
answer
Request
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
answer
Computer security risk
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
Script kiddie
question
Which of the following is someone who uses e-mail as a vehicle for extortion?
answer
Cyber-extortionists
question
Which of the following best describes the term, cybercrime?
answer
Online or Internet-based illegal acts
question
Which term is used to describe software used by cybercriminals?
answer
Crimeware
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
Cracker
question
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
answer
Cyberterrorists
question
Which of the following statements is not true about Internet and network attacks
answer
Information kept on an organizations premises has a higher security risk than information transmitted over networks
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
A worm
question
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
answer
Malware
question
Define the term, payload, as it pertains to computer crime.
answer
The destructive event or prank the program is intended to deliver
question
A _____ is a program that hides in a computer and allows someone form a remote location to take full control of the computer
answer
Rootkit
question
Computer viruses, worms, and Trojan horses deliver their ____ on a computer when a user opens an infected file or runs an infected program, for example.
answer
Payload
question
The _____ phase for a project begins when the steering committee receives a project request
answer
Planning
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New