click below
click below
Normal Size Small Size show me how
CCS1 - Mod 8
Reviewer
| Question | Answer |
|---|---|
| Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. | True |
| Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. | True |
| Undervoltages can cause equipment damage, but generally do not cause data loss. | False |
| Some operating systems and e-mail programs allow you to encrypt the contents of files and messages that are stored on your computer. | True |
| Perpetrators of back doors trick their victims into interacting with phony Web sites. | True |
| A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. | True |
| A surge protector absorbs small overvoltages — generally without damage to the computer or equipment. | True |
| A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. | False |
| Biometric objects often are used in combination with personal identification numbers. | True |
| In the case of system failure or the discovery of corrupted files, users ________ the files by copying the backed up files to their original location on a computer. | restore |
| Content ____ is the process of restricting access to certain material on the Web. | filtering |
| It is illegal for employers to use software programs that monitor employees. | False |
| Computer addiction is an untreatable illness. | False |
| The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. | Electronic Communications Privacy Act (ECPA) |
| Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. | False |
| Many businesses use spyware to limit employees’ Web access. | False |
| Many businesses use ____ to limit employees’ Web access. | content filtering |
| A spyware program communicates information it collects to some inside source while a user is offline. | False |
| Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. | False |
| For a computer workspace, ergonomics experts recommend an area smaller than two feet by four feet. | False |
| Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. | True |
| ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | Noise |
| Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. | malware |
| A(n) ____ program secretly collects information about a user. | spyware |
| Any illegal act involving a computer generally is referred to as a computer security risk. | True |
| A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. | UPS |
| A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. | False |
| To remove spyware, users need to obtain a special program that can detect and delete it. | True |
| Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. | monitoring |
| Assume that because information is on the Web, it is accurate. | False |
| Web ____ software is a program that restricts access to specified Web sites. | filtering |
| Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. | CVS |
| A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. | RSI |
| Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. | True |
| A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. | overvoltage |
| A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. | True |
| Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. | False |
| An online UPS switches to battery power when a problem occurs in the power line. | True |
| A(n) ________ has the same intent as a cracker but does not have the technical skills and knowledge. | script kiddie |
| The higher a surge protector’s Joule rating, the poorer the protection. | False |
| To prevent repetitive strain injury, take all of the following precautions except ____. | place the mouse at least six inches from the edge of the desk |