Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CCS1 - Mod 8

Reviewer

QuestionAnswer
Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. True
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. True
Undervoltages can cause equipment damage, but generally do not cause data loss. False
Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. True
Perpetrators of back doors trick their victims into interacting with phony Web sites. True
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. True
A surge protector absorbs small overvoltages — generally without damage to the computer or equipment. True
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. False
Biometric objects often are used in combination with personal identification numbers. True
In the case of system failure or the discovery of corrupted files, users ________ the files by copying the backed up files to their original location on a computer. restore
Content ____ is the process of restricting access to certain material on the Web. filtering
It is illegal for employers to use software programs that monitor employees. False
Computer addiction is an untreatable illness. False
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. Electronic Communications Privacy Act (ECPA)
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. False
Many businesses use spyware to limit employees’ Web access. False
Many businesses use ____ to limit employees’ Web access. content filtering
A spyware program communicates information it collects to some inside source while a user is offline. False
Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. False
For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. False
Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. True
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. Noise
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. malware
A(n) ____ program secretly collects information about a user. spyware
Any illegal act involving a computer generally is referred to as a computer security risk. True
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. UPS
A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. False
To remove spyware, users need to obtain a special program that can detect and delete it. True
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. monitoring
Assume that because information is on the Web, it is accurate. False
Web ____ software is a program that restricts access to specified Web sites. filtering
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. CVS
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. RSI
Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. True
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. overvoltage
A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. True
Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. False
An online UPS switches to battery power when a problem occurs in the power line. True
A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. script kiddie
The higher a surge protector’s Joule rating, the poorer the protection. False
To prevent repetitive strain injury, take all of the following precautions except ____. place the mouse at least six inches from the edge of the desk
Created by: PipoyKuraku
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards