Mis Chapter 9

45 Questions  I  By Rvalatnational_edu
MIS Chapter 9

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  A spam filter is software that attempts to block unwanted e-mail.
A.
B.
2.  “Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.
A.
B.
3.                   Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.
A.
B.
4.                   Worms can create copies on the same computer or can send the copies to other computers via a network.
A.
B.
5.  All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.
A.
B.
6.  Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.
A.
B.
7.  Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.
A.
B.
8.  Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.
A.
B.
9.  A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
A.
B.
10.  A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.
A.
B.
11.  E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.
A.
B.
12.  Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.
A.
B.
13.                   The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.
A.
B.
14.  There is currently no federal law that bans unsolicited fax advertisements.
A.
B.
15.  CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.
A.
B.
16.  Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.
A.
B.
C.
D.
17.  ____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.
A.
B.
C.
D.
18.                   ____ are parasitic computer programs that replicate but do not infect other computer program files.
A.
B.
C.
D.
19.  The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.
A.
B.
C.
D.
20.  A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
A.
B.
C.
D.
21.                   ____ law protects authored works such as art, books, film, and music.
A.
B.
C.
D.
22.  ____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.
A.
B.
C.
D.
23.                   ____ responds to network security breaches and monitors systems for emerging threats.
A.
B.
C.
D.
24.  ____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
A.
B.
C.
D.
25.  A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
A.
B.
C.
D.
26.  The specific goals of ____ are to protect children from potentially harmful material, while also safeguarding free speech on the Internet.
A.
B.
C.
D.
27.  ____, an international industry group whose members include Apple, Commerce One, Ericsson, and Microsoft, is supporting the development of P3P.
A.
B.
C.
D.
28.  The ____ is a screening technology that shields users from Web sites that do not provide the level of privacy protection they desire.
A.
B.
C.
D.
29.  ____ are embedded in many of the products we buy such as medicine containers, clothing, computer printers, car keys, library books, and tires.
A.
B.
C.
D.
30.  The purpose of the ____ act is to provide certain safeguards for people against an invasion of personal privacy by requiring federal agencies to do a number of things including permitting people to determine what records pertaining to them are collected, maintained, used, or disseminated by such agencies.
A.
B.
C.
D.
31.  The ____ act established a Privacy Study Commission to study existing databases and to recommend rules and legislation for consideration by Congress.
A.
B.
C.
D.
32.  Under the ____ Act, Internet service providers and telephone companies must turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.
A.
B.
C.
D.
33.                   The ____ prohibits transmissions of harmful computer programs and code, including viruses.
A.
B.
C.
D.
34.  The hazardous activities associated with poorly designed work environments are collectively referred to as ____.
A.
B.
C.
D.
35.  Practitioners in many professions subscribe to a ____ that states the principles and core values that are essential to their work and thus governs their behavior.
A.
B.
C.
D.
36.  Computer-related ____________________ refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error.
37.  A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
38.  Under the ______________________________ Act, the Federal Trade Commission (FTC) is assigned responsibility to help victims restore their credit and erase the impact of the imposter.
39.  The U.S. Congress passed the ______________________________ Act of 1998 to fight identity theft.
40.  ____________________ are wannabe crackers with little technical savvy - crackers who download programs called scripts - that automate the job of breaking into computers.
41.  A(n) ____________________ is a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code.
42.  A(n) ____________________ is a small program hidden in a network or a computer system that records identification numbers and passwords.
43.  ____________________ occurs when someone makes unauthorized use of another’s patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.
44.                   ____________________ is the aggravation of the pathway for nerves that travel through the wrist.
45.  ____________________ screens provide a much better viewing experience for your eyes by virtually eliminating flicker and while still being bright without harsh incandescence.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz