Filters
Question type

Study Flashcards

  Figure 11-1 An alternative to e-mail filtering is to purchase a(n) ____________________ that attempts to remove a message like the one in Figure 11-1 before it reaches a user s inbox. Figure 11-1 An alternative to e-mail filtering is to purchase a(n) ____________________ that attempts to remove a message like the one in Figure 11-1 before it reaches a user s inbox.

Correct Answer

verifed

verified

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

A) True
B) False

Correct Answer

verifed

verified

____________________ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.

Correct Answer

verifed

verified

Computer ____ is the discovery, collection, and analysis of evidence found on computers and networks.


A) anthropology
B) epistemology
C) forensics
D) reduction

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Perpetrators of back doors trick their victims into interacting with phony Web sites.

A) True
B) False

Correct Answer

verifed

verified

Critical Thinking Questions Case 2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?


A) Users are required to provide a software product's 25-character identification number before installing software.
B) A student copies text from the Web and uses it in a research paper for his English class.
C) A student who has been expelled from school installs a computer virus on a computer in the student lab.
D) Someone copies The DaVinci Code to the Web and encourages others to read it.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.

A) True
B) False

Correct Answer

verifed

verified

____ is/are not considered spyware because a user knows it/they exist(s) .


A) Adware
B) Cookies
C) A Web bug
D) Spam

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A(n) ____________________ has the same intent as a cracker, but does not have the technical skills and knowledge.

Correct Answer

verifed

verified

  Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a private combination of characters associated with a user name that allows access to certain computer resources. Figure 11-2 Many Web sites, like that in Figure 11-2, require a user to enter a(n) ____________________, which is a private combination of characters associated with a user name that allows access to certain computer resources.

Correct Answer

verifed

verified

Many systems implement access controls using a two-phase process called identification and assessment .

A) True
B) False

Correct Answer

verifed

verified

Many businesses use spyware to limit employees' Web access.

A) True
B) False

Correct Answer

verifed

verified

Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon.

A) True
B) False

Correct Answer

verifed

verified

  Figure 11-3 A program like the one in Figure 11-3 scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. Figure 11-3 A program like the one in Figure 11-3 scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.

A) True
B) False

Correct Answer

verifed

verified

Discuss S-HTTP.

Correct Answer

verifed

verified

Secure HTTP (S-HTTP) allows users to cho...

View Answer

Assume that because information is on the Web, it is accurate.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is a utility program that detects and protects a personal computer and its data from unauthorized access.

Correct Answer

verifed

verified

In its simplest form, a(n) ____ is a programmed formula that the recipient of encrypted data uses to decrypt the ciphertext.


A) encryption key
B) virus signature
C) digital certificate
D) session cookie

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

One of the more popular e-mail encryption programs is called ____, which is freeware for personal, noncommercial users.


A) IMP
B) TCP
C) DoS
D) PGP

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Critical Thinking Questions Case 2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which is NOT an issue surrounding the concept of fair use, from copyright law?


A) The right of students to post their own term papers on the Web.
B) The rights of a faculty member to print material from the Web and distribute it to the members of her class for instructional purposes.
C) The use of a program like Freedom WebSecure to surf the Web anonymously.
D) The rights of individuals to download contents of your Web site, modify it, and then put it on the Web again as their own.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 191

Related Exams

Show Answer