Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 12: Computer Security and Safety, Ethics, and Privacy

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
An alternative to e-mail filtering is to purchase a(n) ____ program that attempts to remove a message before it reaches a user’s inbox.   show
🗑
To avoid items users can sign up for ____, which is a service from an Internet service provider that blocks e-mail messages from designated sources.   show
🗑
show spam  
🗑
show antivirus  
🗑
show password  
🗑
Many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers.   show
🗑
show power source  
🗑
show PIN  
🗑
A ____ is a small text file that a Web server stores on a user’s computer.   show
🗑
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.   show
🗑
A certificate ____ is an authorized person or company that issues and verifies digital certificates.   show
🗑
show security  
🗑
show surge  
🗑
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.   show
🗑
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.   show
🗑
A system ____ is the prolonged malfunction of a computer.   show
🗑
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.   show
🗑
show digital  
🗑
show full backup  
🗑
show copyright  
🗑
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.   show
🗑
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.   show
🗑
A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.   show
🗑
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.   show
🗑
show cyberextortionist  
🗑
show cyberterrorist  
🗑
show 802.11i  
🗑
show undervoltage  
🗑
show overvoltage  
🗑
A(n) ____ program secretly collects information about a user.   show
🗑
show trusted  
🗑
show surge  
🗑
show ethical  
🗑
show ethics  
🗑
show addiction  
🗑
show malware  
🗑
Content ____ is the process of restricting access to certain material on the Web.   show
🗑
show forensics  
🗑
show digital forensics  
🗑
show monitoring  
🗑
show restore  
🗑
show privacy  
🗑
nternet advertising firms often use ____ to collect information about users Web browsing habits.   show
🗑
show content filtering  
🗑
One approach to content filtering is through a rating system of ____, which is similar to those used for movies and videos.   show
🗑
show system failure  
🗑
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.   show
🗑
show energy star  
🗑
Software ____ is the unauthorized and illegal duplication of copyrighted software.   show
🗑
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.   show
🗑
show war driving  
🗑
show addiction  
🗑
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.   show
🗑
show Computer Matching and Privacy Protection Act  
🗑
show back up  
🗑
To prevent ___________, take all of the following precautions: place a wrist rest between the keyboard and the edge of the desk, place the mouse at least six inches from the edge of the desk and minimize the number of switches between the mouse and the ke   show
🗑
show decrypt  
🗑
show blocks  
🗑
Users may have ____ if they have sore, tired, burning, itching or dry eyes   show
🗑
show filtering  
🗑
show session cookie  
🗑
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.   show
🗑
show most recent copy of the file  
🗑
With a three-generation backup policy, the grandparent is the ____.   show
🗑
show second oldest copy of the file  
🗑
With a(n) ____, users choose which folders and files to include in a backup.   show
🗑
___ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.   show
🗑
____ is a program placed on a computer without the user’s knowledge.   show
🗑
show phishing  
🗑
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.   show
🗑
___ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.   show
🗑
___ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.   show
🗑
____ is/are not considered spyware because a user knows it/they exist(s).   show
🗑
show off-site  
🗑
____ occurs when someone steals personal or confidential information.   show
🗑
show unauthorized  
🗑
show intellectual property  
🗑
show s-http or secure http  
🗑
__, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: galvanl
Popular Computers sets