Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITC-FA8

QuestionAnswer
Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. TRUE
Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. TRUE
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. TRUE
Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion. TRUE
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. TRUE
Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. War Driving
In the case of system failure or the discovery of corrupted files, users ________ the files by copying the backed up files to their original location on a computer. Restore
To utilize intrusion detection software requires little expertise because the programs are simple and easy to use and interpret. FALSE
Biometric objects often are used in combination with personal identification numbers. FALSE
A(n) ________ is someone who uses e-mail as a vehicle for extortion. Hacker
Web ____ software is a program that restricts access to specified Web sites. Filtering
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. FALSE
Assume that because information is on the Web, it is accurate. FALSE
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. FALSE
To remove spyware, users need to obtain a special program that can detect and delete it. TRUE
A spyware program communicates information it collects to some inside source while a user is offline. FALSE
Many businesses use spyware to limit employees’ Web access. FALSE
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. CVS
Computer addiction is an untreatable illness. FALSE
Content ____ is the process of restricting access to certain material on the Web. FILTERING
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. Spyware
A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. Script Kiddie
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. Malware
Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. FALSE
A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. Cyberterrorist
Any illegal act involving a computer generally is referred to as a computer security risk. FALSE
A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. Security
To prevent repetitive strain injury, take all of the following precautions except ____. use the heel of the hand as a pivot point while typing or using the mouse
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. RSI
Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. FALSE
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. Monitoring
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. Electronic Communications Privacy Act (ECPA)
A(n) ____ program secretly collects information about a user. Spyware
Under voltages can cause equipment damage, but generally do not cause data loss. FALSE
Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. TRUE
A system ________ is the prolonged malfunction of a computer. Failure
It is illegal for employers to use software programs that monitor employees. FALSE
Many businesses use ____ to limit employees’ Web access. Content Filtering
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. TRUE
The higher a surge protector’s Joule rating, the poorer the protection. FALSE
A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. FALSE
A(n) ________ occurs when the electrical supply drops. Under Voltage/ Voltage Drop
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. Overvoltage
To ________ a file means to make a copy of it. Back up
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. Noise
Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. TRUE
Perpetrators of back doors trick their victims into interacting with phony Web sites. FALSE
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. FALSE
A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. FALSE
A cyber extortionist uses the Internet or network to destroy or damage computers for political reasons. FALSE (Cyberterrorist)
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. UPS
An online UPS switches to battery power when a problem occurs in the power line. FALSE
A surge protector absorbs small over voltages — generally without damage to the computer or equipment. TRUE
A brownout is a complete power failure. FALSE
Created by: devillishly
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards