ITB LC session 2.docx

Embed Size (px)

Citation preview

  • 7/24/2019 ITB LC session 2.docx

    1/5

    QuizYou have completed your quiz attempt. You have scored 16 point(s).

    Question Results

    Score 1.00 of 1

    1. The guidelines for the morally acceptable use of computers in society are

    !omputer ethics

    "rivacy

    #orality

    $egal systems

    Score 1.00 of 1

    %. The issues that deal &ith the collection and use of data on individuals are

    'ccess

    "roperty

    'ccuracy

    "rivacy

    Score 1.00 of 1

    . The ethical issue that involves &ho is able to read and use data is

    'ccess

    "roperty

    'ccuracy

    "rivacy

    Score 1.00 of 1

  • 7/24/2019 ITB LC session 2.docx

    2/5

    . *dentity theft is the

    *mpersonation by a thief &ith a large ban+ account

    *mpersonation by a thief &ith computer s+ills

    *mpersonation by a thief &ith good credit

    *mpersonation by a thief (using someone,s identity) for the purpose of economic gain

    Score 1.00 of 1

    -. usinesses search employees/ electronic mail and computer files using

    Tro0an horses

    !oo+ies

    noop2 &are

    Theft2&are

    Score 1.00 of 1

    6. "rivacy is primarily a3an 4444444444 matter.

    ethical

    legal

    security

    business

    Score 1.00 of 1

    5. The !ode of air *nformation "ractice &as a response to

    "rivacy concerns

    7thical concerns

  • 7/24/2019 ITB LC session 2.docx

    3/5

    !opyright concerns

    "iracy concerns

    Score 1.00 of 1

    8. ' computer crime is'ny activity in &hich the thief uses computer technology

    'n illegal action in &hich the perpetrator uses special +no&ledge of computer techno

    'n immoral action in &hich the thief uses special +no&ledge of computer technology

    'ny threat to computer or data security

    Score 1.00 of 1

    9. 4444444444 commit the ma0ority of computer crimes.

    7mployees

    :ac+ers

    ;utside users

    #embers of organized crime

    Score 1.00 of 1

    1

  • 7/24/2019 ITB LC session 2.docx

    4/5

    employees

    hac+ers

    members of organized crime

    crac+ers

    Score 1.00 of 1

    1%. ' program that migrates through net&or+s and operating systems and

    attaches itself to different programs and databases is a 4444444444.

    virus

    &orm

    denial2of2service attac+

    damage

    Score 1.00 of 1

    1. ' program that fills a computer system &ith self2replicating

    information thus clogging the system is called a 4444444444.

    virus

    &orm

    denial2of2service attac+

    damage

    Score 1.00 of 11. >hich statement best describes a &orm?

    ' virus that is designed to destroy your hard drive

    ' virus that is designed to frighten people about a none@istent virus

  • 7/24/2019 ITB LC session 2.docx

    5/5

    ' virus that does not attach itself to programs and databases

    ' virus that is designed to shut do&n a server

    Score 1.00 of 1

    1-. ' computer virus is

    ' soft&are &ritten &ith malicious intent to cause annoyance or damage

    ' process of scrambling a message so that it cannot be read until it is unscrambled

    ' small device that scans the number of credit cards

    'n *A2chec+ing tool used to monitor &ho is logged onto a net&or+

    Score 1.00 of 1

    16. Aetection programs are available to alert users &hen certain

    +inds of viruses enter the system. These are typically +no&n as

    4444444444.

    chec+er guards

    virus guards

    guard chec+ers

    virus chec+ers