1.
_____ is a kind of identity theft where the victim knows the person who stole his/her identity.
A. 
B. 
C. 
D. 
2.
_____ is a technique to gain personal information for the purpose of identity theft, where specific individuals are targeted and the creator of a fraudulent e-mail already has some of the victim's personal information and wants more.
A. 
B. 
C. 
D. 
3.
An assessment of what is right or wrong can be determined by considering ____, which can be understood as the benefit or harm that will come from a particular decision.
A. 
B. 
C. 
The time till the consequences take effect
D. 
4.
_____ is the use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.
A. 
B. 
C. 
D. 
5.
_____ are types of hackers who break into other people's computer systems and may just look around. They may steal credit card numbers or destroy information, or otherwise do damage.
A. 
B. 
C. 
D. 
6.
_____ can be defined as the principles and standards that guide our behavior toward other people.
A. 
B. 
C. 
D. 
7.
_____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services.
A. 
B. 
C. 
D. 
8.
_____ refers to intangible creative work that is embodied in physical form.
A. 
B. 
C. 
D. 
9.
The _____ sought to protect investors by improving the accuracy and reliability of corporate disclosures and requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.
A. 
B. 
C. 
D. 
Fair and Accurate Credit Transactions Act
10.
An assessment of what is right or wrong can be determined by considering the ____, which may be defined as how long it will take for the benefit or harm to take effect.
A. 
B. 
C. 
D. 
11.
Which of the following is an example of the unethical use of computers?
A. 
Employees failing to answer a large number of e-mail messages due to network problems.
B. 
Employees searching organizational databases for information on celebrities and friends.
C. 
Employees sending messages without spell checking and proofreading them.
D. 
Employees updating their passwords at the end of every month.
12.
_____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent.
A. 
B. 
C. 
D. 
13.
_____ is a way of protecting messages and files by scrambling the contents of a file so that one cannot read it without having the right key.
A. 
B. 
C. 
D. 
14.
An assessment of what is right or wrong can be determined by considering ____, which refers to the probability that the harm or benefit will occur if one undertakes an action.
A. 
B. 
C. 
D. 
15.
_____ have philosophical and political reasons for breaking into systems and often deface Web sites as a sign of protest.
A. 
B. 
C. 
D. 
16.
Which of the following is part of the outermost level of an individual's ethical structure?
A. 
Actions that are considered serious ethical violations by both society and oneself.
B. 
Behavior that causes extreme ethical discomfort to the person.
C. 
Behavior that calls for stringent measures against the person.
D. 
Actions that most people would not consider unacceptable or unethical.
17.
An architectural firm's blueprints, sketches and other proprietary documents are examples of ____.
A. 
B. 
C. 
D. 
18.
A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
A. 
B. 
C. 
D. 
19.
A _____ refers to the legal protection offered for the expression of an idea, such as a song, video game, and some types of proprietary documents.
A. 
B. 
C. 
D. 
20.
_____ refers to malicious software that collects information about a person and his/her computer and reports it to someone without their permission.
A. 
B. 
C. 
D. 
21.
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
A. 
B. 
C. 
D. 
22.
Which of the following is a program that, when installed on a computer, records every mouse click?
A. 
B. 
C. 
D. 
23.
The _____ says that you may use copyrighted material in certain situations, for example, in the creation of new work or, within certain limits, for teaching purposes.
A. 
B. 
C. 
D. 
24.
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.
A. 
B. 
Identity Theft and Assumption Deterrence Act
C. 
D. 
25.
_____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
A. 
B. 
C. 
D.