Chapter 08 Protecting People and Information



BCIS 1305 BUSINESS COMPUTER APPLICATIONS

Homework 10

Part I

True/False

1. Ethics are the principles and standards that guide our behavior toward other

people.

a) True b) False

2. Copyright is the legal protection afforded an expression of an idea, such

as a song, video game, and some types of proprietary documents.

a) True b) False

3. The Fair Use Doctrine says that you may not use copyrighted material in

certain situations — for example, in the creation of new work or, within

certain limits, for teaching purposes.

a) True b) False

4. Pirated software is the unauthorized use, duplication, distribution or sale

of copyrighted software.

a) True b) False

5. A worm hides your identity from the Web sites you visit.

a) True b) False

6. Spyware is software that comes hidden in free downloadable software and

collects information about you and your computer and reports it to someone

without your permission.

a) True b) False

7. A Web log consists of one line of information for every visitor to a Web

site and is usually stored on a Web server.

a) True b) False

8. Anonymous Web browsing (AWB) service gives your identity to the Web sites

you visit.

a) True b) False

9. Hackers are generally very knowledgeable computer users who use their

knowledge to invade other people's computers.

a) True b) False

10. Encryption scrambles the contents of a file so you can't read it without

having the right decryption key.

a) True b) False

11. People rarely do anything unethical involving computers.

a) True b) False

12. E-mail is completely secure.

a) True b) False

13. Phishing is often used to steal identities online.

a) True b) False

14. One way you can sometimes separate legitimate e-mails from phishing e-mails

is to examine the addresses closely.

a) True b) False

15. It is illegal for companies to monitor employee e-mail.

a) True b) False

16. A cookie a small file created by a Web page and stored on your computer.

a) True b) False

17. Spam is unsolicited e-mail that advertises goods and services.

a) True b) False

18. Spyware, sneakware, and stealthware are all different versions of cookies.

a) True b) False

19. Biometrics identifies individuals based on physiological characteristics.

a) True b) False

20. Denial-of-service means not being able to log on because of an invalid

password.

a) True b) False

Part II

Multiple Choice

21. What are the principles and standards that guide our behavior toward other

people?

a) Personal Morals

b) Ethics

c) Organizational culture

d) Laws

22. There are different levels of uncertainty when faced with ethical decisions;

each creates a sort of ring around the dilemma. What is true of the inside

level or ring?

a) Choices or decisions regarding the ethical dilemma become harder to make;

uncertainty is high

b) You are more certain of what is right or wrong; decisions become easier

to make

c) Illegal and/or unethical behavior become less tolerated by society

d) Choices become harder to make and illegal and/or unethical behavior less

tolerated

23. What countRy experiences the greatest revenue losses from pirated software?

a) China

b) United Kingdom

c) Japan

d) United States

24. What is the right to be left alone when you want to be, to have control over

your own personal possessions, and not to be observed without your consent?

a) Ethics

b) Personal safety laws

c) Identity theft laws

d) Privacy

25. What program records every keystroke and mouse click executed on a computer?

a) Keyboard recorder

b) Trojan horse

c) Virus

d) Key logger

26. What happens to a CD when you burn images, videos, and music to it?

a) Information about the software and hardware that you used are stored on

the CD

b) Personal and identifying information about you is stored on the CD

c) Cookies that are stored on your computer are also transferred to your CD

d) A distinct signature from the CD drive is left on your CD

27. What type of device can be installed on a vehicle that collects information

about a person's reckless driving?

a) Event data recorder (EDR)

b) Traffic Safety Monitor (TSM)

c) Mom's Offsite Monitor for Automobiles (MOMA)

d) Parents Against Reckless Driving (PARD)

28. What is phishing?

a) An investigative Web service

b) A type of Internet game that allows subscribers to find out information

about you and others living in its "virtual city"

c) Information bots that surf the Web for you searching for specific

information that you need

d) Email and other online techniques that attempt to gain personal

information from you

29. What browser image informs you that you're visiting a legitimate Web site?

a) Chain link

b) Key

c) Green traffic light

d) Padlock

30. Who commits most of the computer crime made against companies?

a) Employees

b) Competitors

c) Terrorists

d) Hackers

31. As an owner of a company, what would be a safe assumption on your part

regarding your employees and their potential to commit crime?

a) Most would not commit a crime

b) Most will commit a crime

c) It will depend on the socio economic status of your employees

d) If "push came to shove" most employees would commit a crime

32. Often times, a company will hire a hacker to find vulnerabilities in systems

and plug up the holes. What is this person called?

a) Black-hat hacker

b) Hactivist

c) Cracker

d) White-hat hacker

33. If you were trying to access your campus network but the system was unable

to respond to you because it was overwhelmed with a flood of requests coming

from some virus, what type of attack would you be experiencing?

a) Worms

b) Script kiddies

c) Denial-of-service

d) Cyber blackmail

34. What software should you install to protect your computer from computer

viruses?

a) Spyware

b) Adware

c) Worms

d) Anti-virus

35. Which of the following cannot be used for biometrics?

a) Fingerprint

b) Retina

c) Password

d) Voice

36. Which of the following can a virus do?

a) Hurt your hardware

b) Hurt any files it wasn't designed to attack

c) Infect files on write-protected disks

d) Target and corrupts specific applications or files

37. Which of the following is a characteristic of a firewall?

a) Examines each message as it seeks entrance to the network

b) Blocks messages without the correct markings from entering the network

c) Detects computers communicating with the Internet without approval

d) Each of these items are characteristics of a firewall

38. When you purchase copyrighted software, what actually are you paying for?

a) The cost of the CDs

b) The cost of the CDs, manuals, and the cost of the software development

c) A share of the cost of software development

d) The right to use it

39. What is the name of the new anti-Spam bill?

a) No-Spam

b) CAN-Spam

c) Spam-Away

d) Stop Spam

40. What is intangible creative work that is embodied in physical form?

a) Ethics

b) Intellectual property

c) Copyright

d) Fair Use Doctrine

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download