Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CH 10

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 51

Chapter 10 Privacy and Security

Multiple Choice

1.

In the world of computing, the essential element that controls how computers are used is a) ethics

b) legal laws c) security requirements

d) business demands Answer: A Difficulty level: Medium Page: 269 Response: The essential element that controls how computers are used today is ethics.

2.

The guidelines for the morally acceptable use of computers in society are a) computer ethics

b) privacy c) morality

d) legal systems Answer: A Difficulty level: Easy Page: 269 Response: Computer ethics are guidelines for the morally acceptable use of computers.

3.

The issues that deal with the collection and use of data about individuals is a) access

b) property c) accuracy

d) privacy Answer: D Difficulty level: Easy Page: 269 Response: Privacy concerns the collection and use of data about individuals.

4.

The ethical issue concerned with the correctness of data collected is a) access

b) property c) exactness

d) privacy Answer: C

Difficulty level: Easy Page: 269 Response: Exactness (accuracy) relates to the responsibility of those who collect data to ensure that the data is correct.

5.

The ethical issue that involves who is able to read and use data is a) access

b) property c) accuracy

d) privacy Answer: A Difficulty level: Easy Page: 269 Response: Access relates to the responsibility of those who have data to control and who are able to use that data.

6.

The vast industry involving the gathering and selling of personal data is a) direct marketing

b) fund-raising c) information reselling

d) government agencies Answer: C Difficulty level: Medium Page: 270

Response: Information reselling involves the gathering and selling of personal data.

7.

Identity theft is the a) impersonation by a thief of someone with a large bank account

b) impersonation by a thief of someone with computer skills c) impersonation by a thief of someone with good credit

d) impersonation by a thief of someones identity for the purpose of economic gain Answer: D Difficulty level: Medium Page: 270 Response: Identify theft is the illegal assumption of someones identify for the purpose of economic gain.

8.

Businesses search employees' electronic mail and computer files using so-called __________. a) Trojan horses

b) cookies c) snoopware

d) theft-ware Answer: C Difficulty level: Easy Page: 271

Response: Businesses search employees electronic mail and computer files using snoopware.

9.

Small files that are deposited on a users hard drive when they visit a Web site are best described as a) cookies

b) codes c) profiles

d) trackers Answer: A Difficulty level: Easy Page: 272 Response: Cookies are programs that are deposited on your hard disk from Web sites visited.

10.

Two types of cookies are __________. a) advanced and remedial

b) traditional and natural c) natural and ad network

d) ad network and traditional Answer: D Difficulty level: Medium Page: 272

Response: Two basic types of cookies are traditional and ad network.

11.

A program that allows the user to selectively filter or block the most intrusive ad network cookies is called a) technical cookie program

b) cookie-cutter program c) anti-cookie cutter program

d) cookie monster program Answer: B Difficulty level: Medium Page: 272 Response: Cookie-cutter programs allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.

12.

Information about how often you visit a Web site can be stored in a __________ on your hard drive. a) info-byte

b) history file c) net minder

d) cookie Answer: D Difficulty level: Easy Page: 272 Response: Cookies are specialized programs that are deposited on your hard disk from Web sites you have visited.

13.

Privacy is primarily a(n) __________ matter. a) ethical

b) legal c) security

d) business Answer: A Difficulty level: Medium Page: 273 Response: Privacy is primarily an ethical matter.

14.

The Code of Fair Information Practice was a response to a) privacy concerns

b) ethical concerns c) copyright concerns

d) piracy concerns Answer: A Difficulty level: Easy Page: 273 Response: The Code of Fair Information Practice is a response to privacy concerns.

15

A computer crime is __________ a) any activity in which the thief uses computer technology

b) an illegal action in which the perpetrator uses special knowledge of computer technology c) an immoral action in which the thief uses special knowledge of computer technology without the other person knowing

d) any threat to computer or data security Answer: B Difficulty level: Easy Page: 276 Response: A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology.

16.

__________ commit the majority of computer crimes. a) Employees

b) Hackers c) Outside users

d) Members of organized crime Answer: A Difficulty level: Medium Page: 276 Response: Employees are the largest category of computer criminals.

17.

People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________. a) employees

b) hackers c) crackers

d) members of organized crime Answer: B Difficulty level: Easy Page: 277 Response: Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it.

18.

People who gain unauthorized access to computers for the purpose of doing damage are called __________. a) employees

b) hackers c) members of organized crime

d) crackers Answer: D Difficulty level: Easy Page: 277 Response: Crackers gain unauthorized access to computers with the intent to do damage.

19.

A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

a)

virus

b) worm c) denial-of-service attack

d) damage Answer: A Difficulty level: Easy Page: 277 Response: Viruses are programs that migrate through networks and operating systems, and most attach themselves to different programs and databases.

20.

A program that fills a computer system with self-replicating information thus clogging the system is called a __________. a) virus

b) worm c) denial-of-service attack

d) damage Answer: B Difficulty level: Medium Page: 277 Response: A worm is a self-replicating virus that clogs the systems.

21.

Which statement best describes a worm?

a)

a virus that is designed to destroy your hard drive

b) a virus that is designed to frighten people about a nonexistent virus c) a virus that doesnt attach itself to programs and databases

d) a virus that is designed to shut down a server Answer: C Difficulty level: Medium Page: 277 Response: A worm self-replicates information, clogging the system so that operations are slowed or stopped.

22.

A computer virus is a) software written with malicious intent to cause annoyance or damage

b) a process of scrambling a message so that it cannot be read until it is unscrambled c) a small device that scans the number off credit cards

d) an ID-checking tool used to monitor who is logged onto a network Answer: A Difficulty level: Easy Page: 277 Response: A virus is software written with malicious intent to cause annoyance or damage.

23.

Detection programs are available to alert users when certain kinds of viruses enter the system. These are typically known as __________. a) checker guards

b) virus guards c) guard checkers

d) virus checkers Answer: D Difficulty level: Medium Page: 278 Response: Virus checkers are detection programs which will alert users when certain kinds of viruses and worms enter their system.

24.

Programs that come into a computer system disguised as something else are called a) spoofers

b) loggers c) defacers

d) Trojan horses Answer: D Difficulty level: Easy Page: 278 Response: Trojan horses are programs that come into a computer system disguised as something else.

25.

An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a a) virus

b) worm c) denial-of-service attack

d) Trojan horse Answer: C Difficulty level: Medium Page: 278 Response: A DoS attempts to slow down or stop a computer system or network.

26.

The acronym DoS, when it references a computer attack, is short for a) denial-of-service attack b) destruction-of-service attack c) depository-of-service attack

d) designed-service-attack Answer: A Difficulty level: Medium Page: 278 Response: DoS is an acronym for denial-of-service attack.

27.

A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

a)

annoyance

b) worm b) attack b) scam Answer: D Difficulty level: Easy Page: 278 Response: A scam is a fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return.

28.

Theft can take many forms of hardware, of software, of data, of computer time. White-collar computer crime involves the theft of a) applications

b) spikes c) data

d) property Answer: C Difficulty level: Easy Page: 278 Response: White-collar crime involves the theft of data.

29.

Which of the following would best fit the following description software is copied and given to a friend without the permission of the owner?

a)

freeware

b) piracy c) shareware

d) public domain Answer: B Difficulty level: Easy Page: 278 Response: Copying software and distributing it without the consent of the owner is software piracy.

30.

When a hard disk crashes, it is an example of a __________ type of computer security threat. a) natural hazard

b) criminal c) technological failure

d) civil strife Answer: C Difficulty level: Easy Page: 279 Response: A hard disk crash is an example of a technological failure.

31.

A device that protects against a sudden increase in electrical power is a(n) __________. a) anti-spiker

b) voltage regulator c) electrical manipulator

d) surge protector Answer: D Difficulty level: Easy Page: 279 Response: A device that protects against sudden increase in electrical power is a surge protector.

32.

One of the more common types of technological failures is when your computer experiences too much electricity. This is known as a(n) __________. a) protector

b) brownout c) voltage surge

d) energizing Answer: C Difficulty level: Easy Page: 279 Response: A voltage surge is when a computer experiences too much electricity at once.

33.

__________ is the process of protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters. a) Protector

b) Security

c)

Antivirus

d) Drivers Answer: B Difficulty level: Easy Page: 280 Response: Security is concerned with protecting information, hardware, and software, which must be protected from unauthorized use as well as from damage from these events.

34.

A common way to protect information being sent over a network, when long distance is involved, is a) spying

b) putting up a firewall c) passwording

d) encrypting Answer: D Difficulty level: Medium Page: 280 Response: Encrypting involves coding messages.

35.

A __________ acts as a security buffer between a companys private network and all external networks. a) firewall

b) password c) disaster recovery plan

d) virus checker Answer: A Difficulty level: Easy Page: 280 Response: A firewall acts as a security buffer between a corporations private network and all external networks.

36.

A __________ can help to avoid loss of information and data and protect computer systems from access by unauthorized persons. a) firewall

b) password c) disaster recovery plan

d) backup files Answer: B Difficulty level: Easy Page: 280 Response: A password can be used to protect information and data from unauthorized access.

37.

Secret words or numbers used to gain access to a computer system are called a) encryption

b) codes c) crackers

d) passswords Answer: D

Difficulty level: Easy Page: 280 Response: Passwords are secret words or numbers that can be used to gain access to a computer system.

38.

Having a(n) __________ is important to help large organizations continue operating until normal computer operations can be restored. a) firewall protection scheme

b) encryption coding process c) disaster recovery plan

d) virus encryption programs Answer: C Difficulty level: Medium Page: 281 Response: A disaster recovery plan describes ways to continue operating until normal computer operations can be restored.

39.

Special emergency facilities that are fully equipped backup computer centers, including hardware and software, are a) cold sites

b) backups c) hot sites

d) reinforcements Answer: C Difficulty level: Easy

Page: 281 Response: Hot sites may be created that are fully equipped backup computer centers.

40.

If an off-location site is available for backing up data and systems but requires hardware to be installed, this site is known as __________. a) hot sites

b) backups c) reinforcements

d) cold sites Answer: D Difficulty level: Easy Page: 281 Response: A cold site is the physical location only and has no installed hardware.

41.

One of the safest procedures to protect software and data is to include __________. a) screening of applicants to be sure they have no previous records

b) guarding of passwords and frequently changing them c) making frequent backups of data and storing in remote locations

d) auditing of data and programs once a year Answer: C Difficulty level: Medium Page: 281

Response: The safest procedure to protect software and data is to keep it backed up and stored in a remote location.

42.

The study of fitting computers to people is called __________. a) macro building

b) kinesthetic c) ergonomics

d) chiropractic Answer: C Difficulty level: Easy Page: 282 Response: Ergonomics is defined as the study of human factors related to things people use such as computers.

43.

The term used to describe harmful stress associated with computer use is a) technostress

b) cyberstress c) compustress

d) repetitive stress injury Answer: A Difficulty level: Medium Page: 284 Response: Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us.

44.

A Green PC a) uses no energy

b) uses less energy than older PCs c) uses less energy than any other office device

d) represents the most energy-efficient PC possible Answer: B Difficulty level: Medium Page: 285 Response: Green PC uses less energy than older PCs.

45.

Computer users can help protect the environment by a) conserving, recycling, and education

b) buying, using, and throwing away old systems c) buying, conserving, and keeping machines on when not in use

d) sharing systems and buying systems jointly Answer: A Difficulty level: Medium Page: 285 Response: Computer users can conserve, recycle, and educate.

True/False

46.

Ethical issues are the same as legal issues. Answer: False Difficulty level: Easy Page: 269 Response: Ethical issues are standards of moral conduct.

47.

The issue of accuracy of data is concerned with the responsibility of those who collect data to ensure it is correct. Answer: True Difficulty level: Easy Page: 269 Response: Accuracy relates to the responsibility of those who collect data to ensure that the data is correct.

48.

There is a large market for data collected about individuals. Answer: True Difficulty level: Easy Page: 270 Response: There is a very large market for data collected about individuals.

49.

Information collected about you and your buying habits can only be released with your permission. Answer: False

Difficulty level: Medium Page: 270 Response: Selling of personal information on you can be done without your permission.

50.

Your employer is legally obligated to give you written notice that your e-mail is monitored. Answer: False Difficulty level: Medium Page: 271 Response: Your employer is currently not legally obliged to give you written notice that your e-mail is monitored.

51.

Once an information reseller has placed spyware on your computer, it is nearly impossible to remove it. Answer: False Difficulty level: Medium Page: 272 Response: Spyware can be removed from your computer.

52.

Ad network cookies are a type of spyware. Answer: True Difficulty level: Medium Page: 272

Response: Ad network is a type of spyware as it is capable of monitoring your activities across all sites you visit.

53.

The illusion of anonymity is related to the idea that many people believe their privacy is protected on the Web as long as they are selective about disclosing their name and other personal information. Answer: True Difficulty level: Medium Page: 272 Response: The illusion of anonymity is when people believe that their privacy is protected as long as they are selective in what they disclose.

54.

Traditional cookies monitor your activities at a single site. Answer: True Difficulty level: Medium Page: 272 Response: Traditional cookies monitor your activities at a single site.

55.

Adware cookies monitor your activities at a single site. Answer: False Difficulty level: Medium Page: 272 Response: Adware cookies monitor your activities across all sites you visit.

56.

Spyware refers to programs that are designed to secretly record and report an individuals activities on the Web.

Answer: True Difficulty level: Medium Page: 272 Response: Spyware is a term used to describe a wide range of programs that are designed to secretly record and report on individuals activities on the Internet.

57.

Cookie-cutter programs allow you to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate. Answer: True Difficulty level: Medium Page: 272 Response: Cookie-cutter programs are designed to carry out these functions.

58.

Organizations are legally required to seek your permission before depositing cookies on your hard disk. Answer: False Difficulty level: Medium Page: 272 Response: Organizations are not legally required to seek your permission before depositing cookies on your hard disk.

59.

The Code of Fair Information Practice is adopted by many information collecting businesses but is not a law. Answer: True Difficulty level: Hard

Page: 273 Response: The Code of Fair Information Practice was designed to respond to privacy concerns it is not a law.

60.

Privacy of information is primarily a legal issue in the United States. Answer: False Difficulty level: Medium Page: 273 Response: Privacy issues remain primarily ethical issues in the United States.

61.

The majority of computer criminals come from outside the company. Answer: False Difficulty level: Easy Page: 276 Response: The majority of computer criminals come from within the organization.

62.

Hackers and crackers break into computers to do damage or steal information. Answer: False Difficulty level: Medium Page: 277 Response: Hackers do it for the challenge not to do damage or steal information.

63.

Crackers break into computers to do damage or steal information.

Answer: True Difficulty level: Medium Page: 277 Response: Crackers break into computers with the intent to do damage or steal information.

64.

Crackers break into computers simply for the fun of it. Answer: False Difficulty level: Medium Page: 277 Response: Crackers break into computers with the intent to do damage or steal information.

65.

Viruses are spread from computer to computer through networks and operating systems. Answer: True Difficulty level: Easy Page: 277 Response: Viruses migrate through networks and operating systems, and most attach themselves to different programs and databases.

66.

Worms are programs that primarily attach themselves to programs and databases and migrate through networks and operating systems. Answer: False

Difficulty level: Medium Page: 271 Response: Viruses attach themselves to programs and databases and migrate through networks and operating systems.

67.

Virus checkers are detection programs that alert users when certain kinds of viruses and worms enter their system. Answer: True Difficulty level: Easy Page: 278 Response: Virus checkers alert users when certain kinds of viruses and worms enter their system.

68.

Trojan horses are programs that attempt to slow down or stop a computer system or network. Answer: False Difficulty level: Easy Page: 278 Response: Trojan horses are programs that come into a computer system disguised as something else.

69.

An Internet scam is a scam using the Internet which is designed to trick individuals into spending their time and money for little or no return.

Answer: True Difficulty level: Medium Page: 278 Response: Internet scam uses the Internet to carry out fraudulent or deceptive acts such as tricking people into something.

70.

Unauthorized copying of programs for personal gain is a form of theft called service theft. Answer: False Difficulty level: Medium Page: 278 Response: Software piracy is the unauthorized copying of programs for personal gain.

71.

A surge protector will protect a computer if a voltage spike occurs. Answer: True Difficulty level: Easy Page: 279 Response: A surge protector is a device designed to protect a computer from voltage spikes.

72.

Encrypting messages is a way to prevent them from being deleted or lost. Answer: False

Difficulty level: Medium Page: 280 Response: Encrypting messages puts them into a secure code that cannot be read by others.

73.

Biometric scanning devices have been developed to scan individual fingerprints and eyes. Answer: True Difficulty level: Easy Page: 280 Response: Biometric scanning devices can scan for personal traits such as these.

74.

Firewalls act as a security buffer between a corporations private network and all external networks. Answer: True Difficulty level: Easy Page: 280 Response: Firewalls act as security buffers between the corporations private network and all external networks, including the Internet.

75.

The focus of computer security is protecting computers from attack from outside the company. Answer: False

Difficulty level: Medium Page: 280 Response: Security is concerned with protecting information, hardware, and software from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.

76.

Businesses have been encrypting, or coding, messages for years. Answer: True Difficulty level: Medium Page: 280 Response: Businesses have been encrypting messages for years.

77.

The government is encouraging businesses to encrypt messages over the Internet using an unbreakable code. Answer: False Difficulty level: Hard Page: 280 Response: Government is encouraging businesses to use a standard code that, if they need to, they can break in order to monitor suspected criminal activity.

78.

Physical security is concerned with protecting the computers and the data on them. Answer: False Difficulty level: Medium

Page: 281 Response: Physical security is concerned with protecting hardware from possible human and natural disasters.

79.

Special emergency facilities called hot sites are empty shells where computer equipment can be installed. Answer: False Difficulty level: Medium Page: 281 Response: Cold sites are empty shells where computer equipment can be installed when it is needed.

80.

Data security is concerned with protecting the hardware, software, and data. Answer: False Difficulty level: Medium Page: 281 Response: Data security is concerned with protecting software and data from unauthorized tampering or damage.

81.

Ergonomics is the study of making computers fit people. Answer: True Difficulty level: Easy Page: 282

Response: Ergonomics is defined as the study of human factors related to things people use.

82.

One of the most common workplace illnesses is repetitive strain injury. Answer: True Difficulty level: Easy Page: 282 Response: RSI is a very common workplace illness.

83.

Carpal tunnel syndrome is an example of a repetitive strain injury. Answer: True Difficulty level: Easy Page: 282 Response: Carpal tunnel syndrome is a form of RSI.

84.

Technostress is the term for stress caused by all modern technology. Answer: False Difficulty level: Medium Page: 284 Response: Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us.

85.

The Green PC is the industry response to the EPA Energy Star program. Answer: True Difficulty level: Easy Page: 285 Response: Green PC is the industry response to the EPA Energy Star program.

Fill-In-The-Blank

86.

Computer __________ provide guidelines for the morally acceptable use of computers. Answer: ethics Difficulty level: Easy Page: 269 Response: Ethics are guidelines for the morally acceptable use of computers.

87.

__________ are standards of moral conduct. Answer: Ethics Difficulty level: Easy Page: 269 Response: Ethics are standards of moral conduct.

88.

An individual who gathers and sells personal data about other individuals is known as a data __________ or information reseller.

Answer: gatherer Difficulty level: Medium Page: 270 Response: Information gatherers collect and sell personal data about other individuals.

89.

In a __________ identity, the electronic profile of one person is switched with another. Answer: mistaken Difficulty level: Easy Page: 271 Response: Mistaken identity is when the electronic profile of one person is switched with another.

90.

__________ programs record virtually everything you do on your computer. Answer: Snoopware Difficulty level: Medium Page: 271 Response: Snoopware programs can record almost everything you do on your computer.

91.

In the United States, the __________ of Information Act, you are entitled to look at any personal records held by government agencies.

Answer: Freedom Difficulty level: Easy Page: 271 Response: Freedom of Information Act gives individuals this right.

92.

Your Web browser creates a __________ file that includes the location of sites visited by your computer system. Answer: history Difficulty level: Easy Page: 272 Response: A history file includes the locations of sites visited by your computer system.

93.

__________ are specialized programs that are deposited on your hard disk. Answer: Cookies Difficulty level: Easy Page: 272 Response: Cookies are specialized programs that are deposited on your hard disk from Web sites you have visited.

94.

__________ cookies monitor your activities at a single Web site you visit. Answer: Traditional Difficulty level: Medium

Page: 272 Response: Traditional cookies monitor your visits at a single Web site you visit.

95.

Ad network or __________ cookies monitor your activities across all sites you visit. Answer: adware Difficulty level: Medium Page: 272 Response: Ad network or adware cookies monitor your activities across all sites you visit.

96.

__________ is used to describe a range of programs that are designed to secretly record and report on an individuals activities on the Internet. Answer: Spyware Difficulty level: Medium Page: 272 Response: Spyware is designed to do exactly this function.

97.

The largest category of computer criminals consist in this group (__________). Answer: employees Difficulty level: Easy Page: 276 Response: Employees constitute the biggest category of computer criminals.

98.

A __________ is an individual who gains unauthorized access to a computer with the intent of doing harm. Answer: cracker Difficulty level: Easy Page: 277 Response: Crackers gain access and have the intent to do harm.

99.

A __________ is an individual who gains unauthorized access to a computer for the fun or challenge of it. Answer: hacker Difficulty level: Easy Page: 277 Response: Hackers gain access but do not have the intent on doing harm.

100.

A __________ is a malicious computer program that can migrate through networks and attach itself to programs. Answer: virus Difficulty level: Easy Page: 277 Response: Viruses are programs that migrate though networks and operating systems, and most attach themselves to different programs and databases.

101.

__________ horses are programs that come into a computer system disguised as something else. Answer: Trojan Difficulty level: Easy Page: 278 Response: Trojan horses come into a computer system disguised as something else.

102.

A __________ attack attempts to slow down or stop a computer system or network. Answer: denial-of-service Difficulty level: Medium Page: 278 Response: A DoS attempts to slow down or stop a computer system or network.

103.

A __________ is a fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return. Answer: scam Difficulty level: Easy Page: 278 Response: Scam is a fraudulent act or deceptive act.

104.

Giving a friend a copy of a word processing program you own is an example of software __________.

Answer: piracy Difficulty level: Medium Page: 278 Response: Software piracy is an example of distributing unauthorized copies of software.

105.

Using your company's computer to do personal work is an example of the crime of computer __________. Answer: theft Difficulty level: Medium Page: 278 Response: This is actually referred to as service theft.

106.

__________ hazards include fires, floods, wind, hurricanes, tornadoes, and earthquakes. Answer: Natural Difficulty level: Easy Page: 279 Response: Natural disasters include all of these elements.

107.

Using a __________ protector can help protect your computer against voltage spikes. Answer: surge

Difficulty level: Medium Page: 279 Response: Surge protectors can help protect your computer against voltage spikes.

108.

The most common type of threat to data and software is __________ error. Answer: human Difficulty level: Easy Page: 279 Response: Human mistakes are the most commonplace errors.

109.

__________ are secret words or numbers used to gain access to a computer system. Answer: Passwords Difficulty level: Easy Page: 280 Response: Passwords are secret words or numbers used to gain authorized access to a computer system.

110.

A __________ acts as a security buffer between a corporations private network and all external networks. Answer: firewall Difficulty level: Easy Page: 280 Response: A firewall acts as a security buffer between a corporations private network and all external networks.

111.

Computer __________ is concerned with protecting information, hardware, and software which must be protected from unauthorized use as well as from damage from intrusion, sabotage, and natural disasters. Answer: security Difficulty level: Medium Page: 280 Response: Computer security is concerned with all of these aspects.

112.

__________ involves coding information so that only the user can read or otherwise use it. Answer: Encryption Difficulty level: Medium Page: 280 Response: Encryption involves coding information for this purpose.

113.

__________ scanning devices check fingerprints or retinal scans. Answer: Biometric Difficulty level: Easy Page: 280 Response: Biometric scanning devices are designed to accomplish this.

114.

Businesses have been __________ or coding messages for years. Answer: encrypting Difficulty level: Medium Page: 280 Response: Businesses have been encrypting messages for years.

115.

__________ security is concerned with protecting hardware from damage and disaster. Answer: Physical Difficulty level: Medium Page: 281 Response: Physical security is concerned with protecting hardware from possible human and natural disasters.

116.

__________ security is concerned with protecting software and data from tampering or damage. Answer: Data Difficulty level: Medium Page: 281 Response: Data security is concerned with protecting software and data from unauthorized tampering or damage.

117.

A special emergency facility that is fully equipped with hardware is called a __________ site. Answer: hot Difficulty level: Easy Page: 281 Response: A hot site has the equipment a cold site is only the building.

118.

A special emergency facility that is just a shell without the equipment is called a __________ site. Answer: cold Difficulty level: Easy Page: 281 Response: A hot site has the equipment a cold site is only the building.

119.

A __________ plan describes ways to continue operating until normal computer operations can be restored. Answer: disaster recovery Difficulty level: Medium Page: 281 Response: Disaster recovery plans are developed in order to accomplish this task.

120.

The study of how computers can be modified to better fit people is __________.

Answer: ergonomics Difficulty level: Medium Page: 282 Response: Ergonomics is the study of human factors related to things we use.

121.

The most common type of workplace injury is a(n) __________ injury. Answer: RSI Difficulty level: Medium Page: 283 Response: Repetitive strain injury (RSI) is the most common type of workplace injury.

122.

__________tunnel syndrome is a common repetitive motion injury among heavy computer users. Answer: Carpal Difficulty level: Easy Page: 284 Response: Carpal tunnel syndrome is a form of RSI.

123.

Computers and monitors produce __________ that can cause headaches and stress. Answer: noise Difficulty level: Medium

Page: 283 Response: Computing can be quite noisy.

124.

The term for harmful stress associated with computer use is __________. Answer: technostress Difficulty level: Hard Page: 284 Response: Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us.

125.

The EPA has created the __________ Star program to discourage waste in the computer industry. Answer: Energy Difficulty level: Easy Page: 285 Response: Energy Star program was designed to discourage waste in the computer industry.

Essay

126.

Describe how data about individuals is collected and compiled. Answer: Large organizations are constantly compiling information about us. The federal government alone has over 2,000 databases. Our social security numbers have become a national identification number. The vast majority of forms we fill out today require our social security number. Every day data is gathered about us and stored in large databases. For billing purposes, telephone companies compile lists of the calls we make, the numbers called, and so on. The reverse directory lists telephone numbers followed by subscriber names. Government authorities and others could easily get the names, addresses, and other details about the persons we call. Credit card companies keep similar records. Supermarket

scanners in grocery checkout counters record what we buy, when we buy it, how much we buy, and the price. Publishers of magazines, newspapers, and mail-order catalogs have our names, addresses, phone numbers, and what we order. Difficulty level: Medium Page: 270

127.

Explain cookies and identify the difference between traditional cookies and ad network cookies. Answer: Cookies are specialized programs that are deposited on your hard disk. Typically these programs are deposited without your knowledge or consent. They record what sites you visit, what you do at the sites, and other information you provide such as credit card numbers. Traditional cookies monitor your activities at a single site. When you leave the site, the cookie becomes dormant. Ad network cookies monitor your activities across all sites you visit. Once deposited on your hard drive, they are continually active collecting information on your Web activities. These are deposited by organizations that compile and market the information including individual personal profiles, mailing lists, and e-mail addresses. There are specialized programs, called cookie-cutter programs, that allow users to selectively filter or block the most intrusive ad network cookies while allowing selective traditional cookies to operate. Difficulty level: Medium Page: 272

128.

Describe the difference between spyware and snoopware. Answer: Spyware is a term used to describe a wide range of programs that are designed to secretly record and report an individuals activities on the Internet. These programs are placed on the computers as a cookie. Snoopware is electronic surveillance software used by an employer to monitor employees e-mail and computer files. Difficulty level: Medium

Page: 272

129.

List three categories of computer crimes. Answer: Three categories of computer crimes could include damage, theft, and manipulations. Damage: loss of data or damage to equipment. Theft: of data or equipment, of computer time by employees. Manipulation: crackers break in to do harm, viruses and worms do harm to programs and data, or tie up services. Difficulty level: Easy Page: 276

130.

Explain the difference between crackers and hackers. Answer: Hackers are people who gain access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. Difficulty level: Easy Page: 277

131.

Explain the danger and spread of a computer virus. Answer: Viruses are programs that migrate through networks and operating systems and attach themselves to different programs and databases. These viruses can do major damage and destroy all the information on a system. Viruses are usually spread through the sharing of infected floppy disks or through downloading infected files from networks or bulletin boards. Difficulty level: Easy Page: 277

132.

Describe the best security to respond to natural or man-made disasters. Answer: The best security against the effects of natural and man-made disasters is to store backup disks of programs and data in safe locations. Difficulty level: Medium Page: 281

133.

Differentiate between physical and data security. Answer: Physical security is concerned with protecting hardware from possible human and natural disasters. Data security is concerned with protecting software and data from unauthorized tampering or damage. Difficulty level: Medium Page: 281

134.

Explain the study of ergonomics and its concerns. Answer: Ergonomics is defined as the study of human factors related to computers. Ergonomics helps computer users take steps to avoid physical and mental health risks and to increase productivity. It is concerned with fitting the job to the worker rather than forcing the worker to conform to the job. Difficulty level: Easy Page: 282

135.

Define technostress.

Answer: Technostress is used to describe the stress associated with computer use that is harmful to people. Technostress is the tension that arises when we have to unnaturally adapt to computers rather than having computers adapt to us. Difficulty level: Easy Page: 284

You might also like