1.
A spam filter is software that attempts to block unwanted e-mail.
2.
“Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.
3.
Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.
4.
Worms can create copies on the same computer or can send the copies to other computers via a network.
5.
All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.
6.
Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.
7.
Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.
8.
Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.
9.
A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.
10.
A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.
11.
E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.
12.
Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.
13.
The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.
14.
There is currently no federal law that bans unsolicited fax advertisements.
15.
CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.
16.
Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.
A. 
B. 
C. 
D. 
17.
____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.
A. 
B. 
C. 
D. 
18.
____ are parasitic computer programs that replicate but do not infect other computer program files.
A. 
B. 
C. 
D. 
19.
The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.
A. 
B. 
C. 
D. 
20.
A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
A. 
B. 
C. 
D. 
21.
____ law protects authored works such as art, books, film, and music.
A. 
B. 
C. 
D. 
22.
____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.
A. 
B. 
C. 
D. 
23.
____ responds to network security breaches and monitors systems for emerging threats.
A. 
B. 
The World Wide Consortium
C. 
D. 
The Software and Information Industry Alliance
24.
____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.
A. 
B. 
C. 
D. 
25.
A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.
A. 
B. 
Intrusion detection system
C. 
D.