Chapter 08 Protecting People and Information
BCIS 1305 BUSINESS COMPUTER APPLICATIONS
Homework 10
Part I
True/False
1. Ethics are the principles and standards that guide our behavior toward other
people.
a) True b) False
2. Copyright is the legal protection afforded an expression of an idea, such
as a song, video game, and some types of proprietary documents.
a) True b) False
3. The Fair Use Doctrine says that you may not use copyrighted material in
certain situations — for example, in the creation of new work or, within
certain limits, for teaching purposes.
a) True b) False
4. Pirated software is the unauthorized use, duplication, distribution or sale
of copyrighted software.
a) True b) False
5. A worm hides your identity from the Web sites you visit.
a) True b) False
6. Spyware is software that comes hidden in free downloadable software and
collects information about you and your computer and reports it to someone
without your permission.
a) True b) False
7. A Web log consists of one line of information for every visitor to a Web
site and is usually stored on a Web server.
a) True b) False
8. Anonymous Web browsing (AWB) service gives your identity to the Web sites
you visit.
a) True b) False
9. Hackers are generally very knowledgeable computer users who use their
knowledge to invade other people's computers.
a) True b) False
10. Encryption scrambles the contents of a file so you can't read it without
having the right decryption key.
a) True b) False
11. People rarely do anything unethical involving computers.
a) True b) False
12. E-mail is completely secure.
a) True b) False
13. Phishing is often used to steal identities online.
a) True b) False
14. One way you can sometimes separate legitimate e-mails from phishing e-mails
is to examine the addresses closely.
a) True b) False
15. It is illegal for companies to monitor employee e-mail.
a) True b) False
16. A cookie a small file created by a Web page and stored on your computer.
a) True b) False
17. Spam is unsolicited e-mail that advertises goods and services.
a) True b) False
18. Spyware, sneakware, and stealthware are all different versions of cookies.
a) True b) False
19. Biometrics identifies individuals based on physiological characteristics.
a) True b) False
20. Denial-of-service means not being able to log on because of an invalid
password.
a) True b) False
Part II
Multiple Choice
21. What are the principles and standards that guide our behavior toward other
people?
a) Personal Morals
b) Ethics
c) Organizational culture
d) Laws
22. There are different levels of uncertainty when faced with ethical decisions;
each creates a sort of ring around the dilemma. What is true of the inside
level or ring?
a) Choices or decisions regarding the ethical dilemma become harder to make;
uncertainty is high
b) You are more certain of what is right or wrong; decisions become easier
to make
c) Illegal and/or unethical behavior become less tolerated by society
d) Choices become harder to make and illegal and/or unethical behavior less
tolerated
23. What countRy experiences the greatest revenue losses from pirated software?
a) China
b) United Kingdom
c) Japan
d) United States
24. What is the right to be left alone when you want to be, to have control over
your own personal possessions, and not to be observed without your consent?
a) Ethics
b) Personal safety laws
c) Identity theft laws
d) Privacy
25. What program records every keystroke and mouse click executed on a computer?
a) Keyboard recorder
b) Trojan horse
c) Virus
d) Key logger
26. What happens to a CD when you burn images, videos, and music to it?
a) Information about the software and hardware that you used are stored on
the CD
b) Personal and identifying information about you is stored on the CD
c) Cookies that are stored on your computer are also transferred to your CD
d) A distinct signature from the CD drive is left on your CD
27. What type of device can be installed on a vehicle that collects information
about a person's reckless driving?
a) Event data recorder (EDR)
b) Traffic Safety Monitor (TSM)
c) Mom's Offsite Monitor for Automobiles (MOMA)
d) Parents Against Reckless Driving (PARD)
28. What is phishing?
a) An investigative Web service
b) A type of Internet game that allows subscribers to find out information
about you and others living in its "virtual city"
c) Information bots that surf the Web for you searching for specific
information that you need
d) Email and other online techniques that attempt to gain personal
information from you
29. What browser image informs you that you're visiting a legitimate Web site?
a) Chain link
b) Key
c) Green traffic light
d) Padlock
30. Who commits most of the computer crime made against companies?
a) Employees
b) Competitors
c) Terrorists
d) Hackers
31. As an owner of a company, what would be a safe assumption on your part
regarding your employees and their potential to commit crime?
a) Most would not commit a crime
b) Most will commit a crime
c) It will depend on the socio economic status of your employees
d) If "push came to shove" most employees would commit a crime
32. Often times, a company will hire a hacker to find vulnerabilities in systems
and plug up the holes. What is this person called?
a) Black-hat hacker
b) Hactivist
c) Cracker
d) White-hat hacker
33. If you were trying to access your campus network but the system was unable
to respond to you because it was overwhelmed with a flood of requests coming
from some virus, what type of attack would you be experiencing?
a) Worms
b) Script kiddies
c) Denial-of-service
d) Cyber blackmail
34. What software should you install to protect your computer from computer
viruses?
a) Spyware
b) Adware
c) Worms
d) Anti-virus
35. Which of the following cannot be used for biometrics?
a) Fingerprint
b) Retina
c) Password
d) Voice
36. Which of the following can a virus do?
a) Hurt your hardware
b) Hurt any files it wasn't designed to attack
c) Infect files on write-protected disks
d) Target and corrupts specific applications or files
37. Which of the following is a characteristic of a firewall?
a) Examines each message as it seeks entrance to the network
b) Blocks messages without the correct markings from entering the network
c) Detects computers communicating with the Internet without approval
d) Each of these items are characteristics of a firewall
38. When you purchase copyrighted software, what actually are you paying for?
a) The cost of the CDs
b) The cost of the CDs, manuals, and the cost of the software development
c) A share of the cost of software development
d) The right to use it
39. What is the name of the new anti-Spam bill?
a) No-Spam
b) CAN-Spam
c) Spam-Away
d) Stop Spam
40. What is intangible creative work that is embodied in physical form?
a) Ethics
b) Intellectual property
c) Copyright
d) Fair Use Doctrine
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- chapter 6 assault robbery rape and other serious crimes
- against all odds sermon outlines org
- instructions for petition for order of
- chapter 08 protecting people and information
- com
- the contributions of management theory and practice in
- into the wild reading and annotations guide
- instructions for petitions to prohibit workplace
- hud u s department of housing and urban
Related searches
- finance and information technology
- ministry of education youth and information jamaica
- computer and information systems managers
- business management and information systems
- computer and information technology pdf
- statistics and information technology
- chapter 2 review questions and answers
- chapter 7 membrane structure and function key
- computer and information literacy pdf
- chapter 7 membrane structure and function
- chapter books for 2nd and 3rd graders
- amazon and information technology