Filters
Question type

Study Flashcards

Sophie Black works as a computer programmer for a software company.Her boss, Mike Jones, is responsible for developing a new software game for the Wii.After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company.Sophie is a little hesitant and unsure about accepting the game because legally it would be considered _________.


A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the Child Online Protection Act?


A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

What is the primary difference between a worm and a virus?


A) A worm must attach to something to spread, where a virus does not need to attach to anything to spread and can tunnel itself into the computer.
B) A virus is copied and spread by a person, where a worm takes a string of tag words and deletes websites.
C) A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.
D) All of these

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

A) True
B) False

Correct Answer

verifed

verified

White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

A) True
B) False

Correct Answer

verifed

verified

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?


A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

What is adware?


A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A) True
B) False

Correct Answer

verifed

verified

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?


A) Ethical information
B) Information technology
C) Information policies
D) Information ethics

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

A) True
B) False

Correct Answer

verifed

verified

What is drive-by hacking?


A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?


A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A worm spreads itself not only from file to file but also from computer to computer.

A) True
B) False

Correct Answer

verifed

verified

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

A) True
B) False

Correct Answer

verifed

verified

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?


A) Employees copying and distributing company owned software.
B) Employees searching other employee's private information without consent.
C) Employees intentionally creating or spreading viruses to confuse IT.
D) All of these.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is a form of malicious software that infects your computer and asks for money?


A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?


A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is not an example of unplanned downtime?


A) Power outages
B) Tornados
C) A system upgrade
D) Network failure

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

A) True
B) False

Correct Answer

verifed

verified

Ransomware is a form of malicious software that infects your computer and asks for money.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 121

Related Exams

Show Answer