Upload
manjeet-rai
View
220
Download
0
Embed Size (px)
Citation preview
7/24/2019 ITB LC session 2.docx
1/5
QuizYou have completed your quiz attempt. You have scored 16 point(s).
Question Results
Score 1.00 of 1
1. The guidelines for the morally acceptable use of computers in society are
!omputer ethics
"rivacy
#orality
$egal systems
Score 1.00 of 1
%. The issues that deal &ith the collection and use of data on individuals are
'ccess
"roperty
'ccuracy
"rivacy
Score 1.00 of 1
. The ethical issue that involves &ho is able to read and use data is
'ccess
"roperty
'ccuracy
"rivacy
Score 1.00 of 1
7/24/2019 ITB LC session 2.docx
2/5
. *dentity theft is the
*mpersonation by a thief &ith a large ban+ account
*mpersonation by a thief &ith computer s+ills
*mpersonation by a thief &ith good credit
*mpersonation by a thief (using someone,s identity) for the purpose of economic gain
Score 1.00 of 1
-. usinesses search employees/ electronic mail and computer files using
Tro0an horses
!oo+ies
noop2 &are
Theft2&are
Score 1.00 of 1
6. "rivacy is primarily a3an 4444444444 matter.
ethical
legal
security
business
Score 1.00 of 1
5. The !ode of air *nformation "ractice &as a response to
"rivacy concerns
7thical concerns
7/24/2019 ITB LC session 2.docx
3/5
!opyright concerns
"iracy concerns
Score 1.00 of 1
8. ' computer crime is'ny activity in &hich the thief uses computer technology
'n illegal action in &hich the perpetrator uses special +no&ledge of computer techno
'n immoral action in &hich the thief uses special +no&ledge of computer technology
'ny threat to computer or data security
Score 1.00 of 1
9. 4444444444 commit the ma0ority of computer crimes.
7mployees
:ac+ers
;utside users
#embers of organized crime
Score 1.00 of 1
1
7/24/2019 ITB LC session 2.docx
4/5
employees
hac+ers
members of organized crime
crac+ers
Score 1.00 of 1
1%. ' program that migrates through net&or+s and operating systems and
attaches itself to different programs and databases is a 4444444444.
virus
&orm
denial2of2service attac+
damage
Score 1.00 of 1
1. ' program that fills a computer system &ith self2replicating
information thus clogging the system is called a 4444444444.
virus
&orm
denial2of2service attac+
damage
Score 1.00 of 11. >hich statement best describes a &orm?
' virus that is designed to destroy your hard drive
' virus that is designed to frighten people about a none@istent virus
7/24/2019 ITB LC session 2.docx
5/5
' virus that does not attach itself to programs and databases
' virus that is designed to shut do&n a server
Score 1.00 of 1
1-. ' computer virus is
' soft&are &ritten &ith malicious intent to cause annoyance or damage
' process of scrambling a message so that it cannot be read until it is unscrambled
' small device that scans the number of credit cards
'n *A2chec+ing tool used to monitor &ho is logged onto a net&or+
Score 1.00 of 1
16. Aetection programs are available to alert users &hen certain
+inds of viruses enter the system. These are typically +no&n as
4444444444.
chec+er guards
virus guards
guard chec+ers
virus chec+ers