Filters
Question type

Study Flashcards

What is plagiarism, and why is it a particular concern today?

Correct Answer

verifed

verified

Plagiarism means representing some other...

View Answer

A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

A) True
B) False

Correct Answer

verifed

verified

Small data files that are deposited on a user's hard drive when they visit a Web site are called:


A) cookies
B) codes
C) cache
D) proxies

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

_____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.

Correct Answer

verifed

verified

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.

Correct Answer

verifed

verified

_____ scanning devices use fingerprints and iris scanners to identify individuals.

Correct Answer

verifed

verified

Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.

A) True
B) False

Correct Answer

verifed

verified

_____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Correct Answer

verifed

verified

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.


A) Spyware
B) Freeware
C) Employee-monitoring software
D) Cookies

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

_____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.

Correct Answer

verifed

verified

Explain how a Web bug works.

Correct Answer

verifed

verified

Web bugs are invisible images or HTML co...

View Answer

The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).

A) True
B) False

Correct Answer

verifed

verified

Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

A) True
B) False

Correct Answer

verifed

verified

A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.

A) True
B) False

Correct Answer

verifed

verified

_____ security is concerned with protecting software and data from unauthorized tampering or damage.

Correct Answer

verifed

verified

A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.

Correct Answer

verifed

verified

denial of ...

View Answer

_____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

Correct Answer

verifed

verified

This law gives you the right to look at your personal records held by government agencies.


A) Gramm-Leach-Bliley Act
B) Freedom of Information Act
C) Family Educational Rights and Privacy Act
D) Computer Fraud and Abuse Act

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

The archiving and search features of the Web make your online identity available indefinitely.

A) True
B) False

Correct Answer

verifed

verified

Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 78

Related Exams

Show Answer