Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 12: Computer Security and Safety, Ethics, and Privacy

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show anti-spam  
🗑
show e-mail filtering  
🗑
____ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.   show
🗑
show antivirus  
🗑
Many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.   show
🗑
Many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers.   show
🗑
A UPS connects between a computer and a ____.   show
🗑
show PIN  
🗑
A ____ is a small text file that a Web server stores on a user’s computer.   show
🗑
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.   show
🗑
A certificate ____ is an authorized person or company that issues and verifies digital certificates.   show
🗑
show security  
🗑
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).   show
🗑
show distributed  
🗑
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.   show
🗑
A system ____ is the prolonged malfunction of a computer.   show
🗑
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.   show
🗑
show digital  
🗑
A(n) ____ copies all of the files in a computer.   show
🗑
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.   show
🗑
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.   show
🗑
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.   show
🗑
A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.   show
🗑
show RSI Repetitive stress injury  
🗑
show cyberextortionist  
🗑
A(n) ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.   show
🗑
show 802.11i  
🗑
A(n) ____ occurs when the electrical supply drops.   show
🗑
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.   show
🗑
A(n) ____ program secretly collects information about a user.   show
🗑
show trusted  
🗑
show surge  
🗑
show ethical  
🗑
show ethics  
🗑
Computer ____ occurs when a computer consumes someone’s entire social life.   show
🗑
Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations.   show
🗑
show filtering  
🗑
Digital ____ is the discovery, collection, and analysis of evidence found on computers and networks.   show
🗑
show digital forensics  
🗑
show monitoring  
🗑
show restore  
🗑
show privacy  
🗑
nternet advertising firms often use ____ to collect information about users Web browsing habits.   show
🗑
show content filtering  
🗑
show icra  
🗑
One of the more common causes of ____ is an electrical power variation.   show
🗑
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.   show
🗑
show energy star  
🗑
show piracy  
🗑
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.   show
🗑
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.   show
🗑
Symptoms of a user with computer _________ include craving computer time, inability to stop computer activity, and neglecting of family and friends.   show
🗑
show Electronic Communications Privacy Act (ECPA)  
🗑
show Computer Matching and Privacy Protection Act  
🗑
show back up  
🗑
show repetitive strain injury  
🗑
To read encrypted data, the recipient must ____, or decipher, it into a readable form.   show
🗑
Users can purchase a software program that selectively ____ cookies.   show
🗑
Users may have ____ if they have sore, tired, burning, itching or dry eyes   show
🗑
show filtering  
🗑
show session cookie  
🗑
show VPN or virtual private network  
🗑
With a three-generation backup policy, the child is the ____.   show
🗑
show oldest  
🗑
show second oldest copy of the file  
🗑
With a(n) ____, users choose which folders and files to include in a backup.   show
🗑
show intrusion  
🗑
____ is a program placed on a computer without the user’s knowledge.   show
🗑
show phishing  
🗑
show spoofing  
🗑
___ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.   show
🗑
show noise  
🗑
____ is/are not considered spyware because a user knows it/they exist(s).   show
🗑
show off-site  
🗑
show information theft  
🗑
___ use is the use of a computer or its data for unapproved or possibly illegal activities.   show
🗑
show intellectual property  
🗑
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.   show
🗑
show Transport Layer Security (TLS)  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: galvanl
Popular Computers sets