Chapter 12: Computer Security and Safety, Ethics, and Privacy
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
An alternative to e-mail filtering is to purchase a(n) ____ program that attempts to remove a message before it reaches a user’s inbox. | show 🗑
|
||||
To avoid items users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources. | show 🗑
|
||||
show | spam
🗑
|
||||
show | antivirus
🗑
|
||||
show | password
🗑
|
||||
Many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers. | show 🗑
|
||||
show | power source
🗑
|
||||
show | PIN
🗑
|
||||
A ____ is a small text file that a Web server stores on a user’s computer. | show 🗑
|
||||
A ____ is the unit of energy a surge protection device can absorb before it can be damaged. | show 🗑
|
||||
A certificate ____ is an authorized person or company that issues and verifies digital certificates. | show 🗑
|
||||
show | security
🗑
|
||||
show | surge
🗑
|
||||
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. | show 🗑
|
||||
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. | show 🗑
|
||||
A system ____ is the prolonged malfunction of a computer. | show 🗑
|
||||
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. | show 🗑
|
||||
show | digital
🗑
|
||||
show | full backup
🗑
|
||||
show | copyright
🗑
|
||||
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge. | show 🗑
|
||||
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. | show 🗑
|
||||
A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. | show 🗑
|
||||
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. | show 🗑
|
||||
show | cyberextortionist
🗑
|
||||
show | cyberterrorist
🗑
|
||||
show | 802.11i
🗑
|
||||
show | undervoltage
🗑
|
||||
show | overvoltage
🗑
|
||||
A(n) ____ program secretly collects information about a user. | show 🗑
|
||||
show | trusted
🗑
|
||||
show | surge
🗑
|
||||
show | ethical
🗑
|
||||
show | ethics
🗑
|
||||
show | addiction
🗑
|
||||
show | malware
🗑
|
||||
Content ____ is the process of restricting access to certain material on the Web. | show 🗑
|
||||
show | forensics
🗑
|
||||
show | digital forensics
🗑
|
||||
show | monitoring
🗑
|
||||
show | restore
🗑
|
||||
show | privacy
🗑
|
||||
nternet advertising firms often use ____ to collect information about users Web browsing habits. | show 🗑
|
||||
show | content filtering
🗑
|
||||
One approach to content filtering is through a rating system of ____, which is similar to those used for movies and videos. | show 🗑
|
||||
show | system failure
🗑
|
||||
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images. | show 🗑
|
||||
show | energy star
🗑
|
||||
Software ____ is the unauthorized and illegal duplication of copyrighted software. | show 🗑
|
||||
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program. | show 🗑
|
||||
show | war driving
🗑
|
||||
show | addiction
🗑
|
||||
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. | show 🗑
|
||||
show | Computer Matching and Privacy Protection Act
🗑
|
||||
show | back up
🗑
|
||||
To prevent ___________, take all of the following precautions: place a wrist rest between the keyboard and the edge of the desk, place the mouse at least six inches from the edge of the desk and minimize the number of switches between the mouse and the ke | show 🗑
|
||||
show | decrypt
🗑
|
||||
show | blocks
🗑
|
||||
Users may have ____ if they have sore, tired, burning, itching or dry eyes | show 🗑
|
||||
show | filtering
🗑
|
||||
show | session cookie
🗑
|
||||
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server. | show 🗑
|
||||
show | most recent copy of the file
🗑
|
||||
With a three-generation backup policy, the grandparent is the ____. | show 🗑
|
||||
show | second oldest copy of the file
🗑
|
||||
With a(n) ____, users choose which folders and files to include in a backup. | show 🗑
|
||||
___ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches. | show 🗑
|
||||
____ is a program placed on a computer without the user’s knowledge. | show 🗑
|
||||
show | phishing
🗑
|
||||
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. | show 🗑
|
||||
___ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. | show 🗑
|
||||
___ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | show 🗑
|
||||
____ is/are not considered spyware because a user knows it/they exist(s). | show 🗑
|
||||
show | off-site
🗑
|
||||
____ occurs when someone steals personal or confidential information. | show 🗑
|
||||
show | unauthorized
🗑
|
||||
show | intellectual property
🗑
|
||||
show | s-http or secure http
🗑
|
||||
__, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
galvanl
Popular Computers sets