Filters
Question type

Study Flashcards

This law gives you the right to look at your personal records held by government agencies.


A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the three most common types of malware,including viruses,worms,and Trojan horses.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The three most common types of malware a...

View Answer

The most common protocol for website encryption is https (Hypertext Transfer Protocol Secure).

A) True
B) False

Correct Answer

verifed

verified

A ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.


A) zombie
B) DoS attack
C) worm
D) Trojan horse

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What is plagiarism,and why is it a particular concern today?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Plagiarism is the act of using someone e...

View Answer

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.


A) restriction
B) security
C) protection
D) encryption

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Corporations often use this to prevent copyright violations.


A) Digital Millennium Copyright Act
B) website encryption
C) digital rights management (DRM)
D) keyloggers

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What are computer ethics?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Computer ethics refers to the set of mor...

View Answer

People that collect and sell personal data are called ________.


A) direct marketers
B) fund-raisers
C) information resellers
D) government agencies

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A ________ acts as a security buffer between a corporation's private network and all external networks.


A) firewall
B) password
C) disaster recovery plan
D) virus checker

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.


A) Viruses
B) Zombies
C) Web bugs
D) DoS

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Which type of program would likely be used by investigators to record a potential suspect's Internet activities?


A) cookie
B) global positioning system
C) keylogger
D) web bug

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Discuss copyright issues as they relate to the Internet,including software piracy and digital rights management,and the Digital Millennium Copyright Act.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Copyright issues on the internet are a c...

View Answer

Identity theft and mistaken identity are the same.

A) True
B) False

Correct Answer

verifed

verified

This type of computer criminal creates and distributes malicious programs.


A) employee
B) hacker
C) cracker
D) keylogger

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________ is concerned with protecting software and data from unauthorized tampering or damage.


A) Data backup
B) Physical security
C) Disaster recovery plan
D) Data security

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Web bugs are usually hidden within the HTML code for a web page or in an email message as an invisible image.

A) True
B) False

Correct Answer

verifed

verified

Explain cookies and identify the difference between first-party cookies and third-party cookies.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Cookies are small pieces of data that ar...

View Answer

Showing 61 - 78 of 78

Related Exams

Show Answer