Você está na página 1de 5

Quiz

You have completed your quiz attempt. You have scored 16 point(s).

Question Results
Score 1.00 of 1

1. The guidelines for the morally acceptable use of computers in society are:
Computer ethics

Privacy
Morality
Legal systems
Score 1.00 of 1

2. The issues that deal with the collection and use of data on individuals are:
Access
Property
Accuracy
Privacy
Score 1.00 of 1

3. The ethical issue that involves who is able to read and use data is:
Access

Property
Accuracy
Privacy
Score 1.00 of 1

4. Identity theft is the:


Impersonation by a thief with a large bank account
Impersonation by a thief with computer skills
Impersonation by a thief with good credit
Impersonation by a thief (using someones identity) for the purpose of economic gain
Score 1.00 of 1

5. Businesses search employees' electronic mail and computer files using:


Trojan horses
Cookies
Snoop- ware

Theft-ware
Score 1.00 of 1

6. Privacy is primarily a/an __________ matter.


ethical

legal
security
business
Score 1.00 of 1

7. The Code of Fair Information Practice was a response to:


Privacy concerns

Ethical concerns

Copyright concerns
Piracy concerns
Score 1.00 of 1

8. A computer crime is:


Any activity in which the thief uses computer technology
An illegal action in which the perpetrator uses special knowledge of computer technology

An immoral action in which the thief uses special knowledge of computer technology withou
Any threat to computer or data security
Score 1.00 of 1

9. __________ commit the majority of computer crimes.


Employees

Hackers
Outside users
Members of organized crime
Score 1.00 of 1

10. People who gain unauthorized access to computers for the fun of it, but
do not intentionally do damage, are __________.
employees
hackers

crackers
members of organized crime
Score 1.00 of 1

11. People who gain unauthorized access to computers for the purpose of
causing damage are called __________.

employees
hackers
members of organized crime
crackers
Score 1.00 of 1

12. A program that migrates through networks and operating systems and
attaches itself to different programs and databases is a __________.
virus

worm
denial-of-service attack
damage
Score 1.00 of 1

13. A program that fills a computer system with self-replicating


information thus clogging the system is called a __________.
virus
worm

denial-of-service attack
damage
Score 1.00 of 1

14. Which statement best describes a worm?


A virus that is designed to destroy your hard drive
A virus that is designed to frighten people about a nonexistent virus

A virus that does not attach itself to programs and databases

A virus that is designed to shut down a server


Score 1.00 of 1

15. A computer virus is:


A software written with malicious intent to cause annoyance or damage

A process of scrambling a message so that it cannot be read until it is unscrambled


A small device that scans the number of credit cards
An ID-checking tool used to monitor who is logged onto a network
Score 1.00 of 1

16. Detection programs are available to alert users when certain


kinds of viruses enter the system. These are typically known as
__________.
checker guards
virus guards
guard checkers
virus checkers

Você também pode gostar