Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Understanding Computers in a Changing Society
Quiz 5: Computer Security and Privacy
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Read a Web site's piracy rules (if they exist)before providing any personal information.
Question 2
True/False
A growing illegal use of computer monitoring software is the use of a keystroke logging system by hackers.
Question 3
True/False
Some local governments permit searches for property located in that area, such as displaying the owner's name, address, and a link to additional information including property value and tax information.
Question 4
True/False
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
Question 5
True/False
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
Question 6
True/False
According to the American Management Association (AMA), the vast majority of all U.S. companies use some type of electronic surveillance with their employees. However, it is uncommon for employers to discipline employees for misuse of e-mail or the Internet at work.
Question 7
True/False
Information such as birth records, marriage certificates, and divorce information, as well as property purchases, assessments, liens, and tax values is confidential and can legally be seen only by authorized individuals.
Question 8
True/False
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
Question 9
True/False
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
Question 10
True/False
Cookies and spyware are possible privacy risks.
Question 11
True/False
The disaster recovery plan is also called a business continuity plan.
Question 12
True/False
Use voltage inverters to protect all of your sensitive electronics, such as televisions and gaming consoles in addition to computers, from electrical fluctuations.
Question 13
True/False
There are many options for protecting yourself against computer monitoring by your employer or the government.
Question 14
True/False
At the present time, opting-out procedures are confusing and time-consuming, and they do not always work well.
Question 15
True/False
Many privacy advocates object to the use of video surveillance and face recognition technology in public locations.
Question 16
True/False
System failure can occur because of a hardware problem, software problem, or a computer virus.
Question 17
True/False
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.