MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers...

Post on 23-Dec-2015

267 views 2 download

Tags:

transcript

MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy

Discovering Computers 2010

Multiple Choice Main MenuComputer Security and Safety, Ethics, and Privacy

Question 1

MC Quiz 11PreviousSlide

End Show

Question 2

Question 3Question 4Question 5

Question 8

Question 6Question 7

Question 9Question 10

Question 11Question 12Question 13Question 14

Question 15

Question 16Question 17Question 18

Question 19Question 20

Question 1

B

A

C

D

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11

Textbook: Page 557

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

cyber extortionist

cyber terrorist

blogger

hacker

Question 1

B

A

C

D

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11Textbook: Page 557

=================================================================

Incorrect Previous

SlideMainMenu

cyber terrorist

blogger

cyber extortionist

hacker

Click On: A, B, C, or D

Question 1

D

A

C

B

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11Textbook: Page 557

=================================================================

Correct MainMenu

PreviousSlide

cyber terrorist

cyber extortionist

blogger

hacker

Click On: A, B, C, or D

Click Here For Next Question

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11

Textbook: Page 559

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

1,500

5,800

10,500

180,000

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11Textbook: Page 559

=================================================================

Incorrect Previous

SlideMainMenu

5,800

1,500

10,500

180,000

Click On: A, B, C, or D

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11Textbook: Page 559

=================================================================

Correct MainMenu

PreviousSlide

5,800

1,500

10,500

180,000

Click On: A, B, C, or D

Click Here For Next Question

Question 3

D

B

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11

Textbook: Page 573

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Packing

Compression

Encryption

Formatting

Question 3

D

B

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11

=================================================================

Incorrect Previous

SlideMainMenu

Compression

Packing

Encryption

Formatting

Click On: A, B, C, or D

Textbook: Page 573

Question 3

B

D

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11Textbook: Page 573

=================================================================

Correct MainMenu

PreviousSlide

Compression

Packing

Encryption

Formatting

Click On: A, B, C, or D

Click Here For Next Question

Question 4

A

B

C

D

=================================================================

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Quiz 11

Textbook: Page 579

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Repetitive

Divergent

Convergent

Encryption

Question 4

A

B

C

D

=================================================================

Quiz 11Textbook: Page 579

=================================================================

Incorrect Previous

SlideMainMenu

Divergent

Repetitive

Convergent

Encryption

Click On: A, B, C, or D

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Question 4

D

A

B

C

=================================================================

Quiz 11Textbook: Page 579

=================================================================

Correct MainMenu

PreviousSlide

Divergent

Repetitive

Convergent

Encryption

Click On: A, B, C, or D

Click Here For Next Question

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11

Textbook: Page 582

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Community

Intellectual

National

Independent

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11Textbook: Page 582

=================================================================

Incorrect Previous

SlideMainMenu

Intellectual

Community

National

Independent

Click On: A, B, C, or D

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11Textbook: Page 582

=================================================================

Correct MainMenu

PreviousSlide

Intellectual

Community

National

Independent

Click On: A, B, C, or D

Click Here For Next Question

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11

Textbook: Page 590

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Electrical

Biological

Social

Ethical

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11Textbook: Page 590

=================================================================

Incorrect Previous

SlideMainMenu

Biological

Electrical

Social

Ethical

Click On: A, B, C, or D

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11Textbook: Page 590

=================================================================

Correct MainMenu

PreviousSlide

Biological

Electrical

Social

Ethical

Click On: A, B, C, or D

Click Here For Next Question

Question 7

A

B

C

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11

Textbook: Page 556

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

hypertext

cybercrime

hypercube

virtual crime

Question 7

A

B

C

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11Textbook: Page 556

=================================================================

Incorrect Previous

SlideMainMenu

cybercrime

hypertext

hypercube

virtual crime

Click On: A, B, C, or D

Question 7

C

B

A

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11Textbook: Page 556

=================================================================

Correct MainMenu

PreviousSlide

cybercrime

hypertext

hypercube

virtual crime

Click On: A, B, C, or D

Click Here For Next Question

Question 8

D

B

C

A

=================================================================

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Quiz 11

Textbook: Page 568

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

photocell

scanner

biometric device

digitizer

Question 8

D

B

C

A

=================================================================

Quiz 11Textbook: Page 568

=================================================================

Incorrect Previous

SlideMainMenu

scanner

photocell

biometric device

digitizer

Click On: A, B, C, or D

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Question 8

A

B

C

D

=================================================================

Quiz 11Textbook: Page 568

=================================================================

Correct MainMenu

PreviousSlide

scanner

photocell

biometric device

digitizer

Click On: A, B, C, or D

Click Here For Next Question

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11

Textbook: Page 564

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

web host

buffer

honeypot

client

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11

=================================================================

Incorrect Previous

SlideMainMenu

buffer

web host

honeypot

client

Click On: A, B, C, or D

Textbook: Page 564

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11Textbook: Page 564

=================================================================

Correct MainMenu

PreviousSlide

buffer

web host

honeypot

client

Click On: A, B, C, or D

Click Here For Next Question

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11

Textbook: Page 569

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Computer hacking

Digital Forensics

Network Administration

Encryption

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11Textbook: Page 569

=================================================================

Incorrect Previous

SlideMainMenu

Digital Forensics

Computer hacking

Network Administration

Encryption

Click On: A, B, C, or D

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11Textbook: Page 569

=================================================================

Correct MainMenu

PreviousSlide

Digital Forensics

Computer hacking

Network Administration

Encryption

Click On: A, B, C, or D

Click Here For Next Question

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11

Textbook: Page 573

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Random

Public

Hyper

Indexed

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11Textbook: Page 573

=================================================================

Incorrect Previous

SlideMainMenu

Public

Random

Hyper

Indexed

Click On: A, B, C, or D

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11Textbook: Page 573

=================================================================

Correct MainMenu

PreviousSlide

Public

Random

Hyper

Indexed

Click On: A, B, C, or D

Click Here For Next Question

Question 12

C

B

A

D

=================================================================

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Quiz 11

Textbook: Page 574

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

stamp

disclaimer

digital signature

copyright

Question 12

C

B

A

D

=================================================================

Quiz 11Textbook: Page 574

=================================================================

Incorrect Previous

SlideMainMenu

copyright

stamp

disclaimer

digital signature

Click On: A, B, C, or D

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Question 12

C

B

A

D

=================================================================

Quiz 11Textbook: Page 574

=================================================================

Correct MainMenu

PreviousSlide

copyright

stamp

disclaimer

digital signature

Click On: A, B, C, or D

Click Here For Next Question

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Question 13

A

B

C

D

=================================================================

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Quiz 11

Textbook: Page 580

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Encryption

Programming

Forensics

Ergonomics

Question 13

A

B

C

D

=================================================================

Quiz 11Textbook: Page 580

=================================================================

Incorrect Previous

SlideMainMenu

Programming

Encryption

Forensics

Ergonomics

Click On: A, B, C, or D

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Question 13

A

B

C

D

=================================================================

Quiz 11Textbook: Page 580

=================================================================

Correct MainMenu

PreviousSlide

Programming

Encryption

Forensics

Ergonomics

Click On: A, B, C, or D

Click Here For Next Question

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11

Textbook: Page 587

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

E-cards

Spam

Texting

Postings

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11Textbook: Page 587

=================================================================

Incorrect Previous

SlideMainMenu

Spam

E-cards

Texting

Postings

Click On: A, B, C, or D

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11Textbook: Page 587

=================================================================

Correct MainMenu

PreviousSlide

Spam

E-cards

Texting

Postings

Click On: A, B, C, or D

Click Here For Next Question

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11

Textbook: Page 587

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Cloning

Streaming

Compression

Phishing

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11Textbook: Page 587

=================================================================

Incorrect Previous

SlideMainMenu

Streaming

Cloning

Compression

Phishing

Click On: A, B, C, or D

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11Textbook: Page 587

=================================================================

Correct MainMenu

PreviousSlide

Streaming

Cloning

Compression

Phishing

Click On: A, B, C, or D

Click Here For Next Question

Question 16

A

B

C

D

=================================================================

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Quiz 11

Textbook: Page 584

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

privacy

retrieval

dispersion

transmission

Question 16

D

B

C

A

=================================================================

Quiz 11Textbook: Page 584

=================================================================

Incorrect Previous

SlideMainMenu

retrieval

privacy

dispersion

transmission

Click On: A, B, C, or D

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Question 16

A

B

C

D

=================================================================

Quiz 11Textbook: Page 584

=================================================================

Correct MainMenu

PreviousSlide

retrieval

privacy

dispersion

transmission

Click On: A, B, C, or D

Click Here For Next Question

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11

Textbook: Page 563

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Cloning

Coding

Spoofing

Encoding

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11Textbook: Page 563

=================================================================

Incorrect Previous

SlideMainMenu

Coding

Cloning

Spoofing

Encoding

Click On: A, B, C, or D

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11Textbook: Page 563

=================================================================

Correct MainMenu

PreviousSlide

Coding

Cloning

Spoofing

Encoding

Click On: A, B, C, or D

Click Here For Next Question

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11

Textbook: Page 566

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

password

combination

code key

signature

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11Textbook: Page 566

=================================================================

Incorrect Previous

SlideMainMenu

combination

password

code key

signature

Click On: A, B, C, or D

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11Textbook: Page 566

=================================================================

Correct MainMenu

PreviousSlide

combination

password

code key

signature

Click On: A, B, C, or D

Click Here For Next Question

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11

Textbook: Page 564

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Defrag Utility

Compression Utility

Zip Utility

Personal Firewall

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11Textbook: Page 564

=================================================================

Incorrect Previous

SlideMainMenu

Compression Utility

Defrag Utility

Zip Utility

Personal Firewall

Click On: A, B, C, or D

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11Textbook: Page 564

=================================================================

Correct MainMenu

PreviousSlide

Compression Utility

Defrag Utility

Zip Utility

Personal Firewall

Click On: A, B, C, or D

Click Here For Next Question

Question 20

A

B

C

D

=================================================================

A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Quiz 11

Textbook: Page 556

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

computer security risk

head crash

cyber attack

event horizon

Question 20

A

B

C

D

=================================================================

Quiz 11Textbook: Page 556

=================================================================

Incorrect Previous

SlideMainMenu

computer security risk

event horizon

head crash

cyber attack

Click On: A, B, C, or D

A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Question 20

A

B

C

D

=================================================================

Quiz 11Textbook: Page 556

=================================================================

Correct MainMenu

PreviousSlide

computer security risk

event horizon

head crash

cyber attack

Click On: A, B, C, or D

Click Here For The Answer Key

An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Answer Key Computer Security and Safety, Ethics, and Privacy

Q1 = A

Quiz 11PreviousSlide

End Show

Q2 = D

Q3 = C

Q4 = AQ5 = B

Q8 = C

Q6 = C

Q7 = B

Q9 = C

Q10 = B

Q11 = B

Q12 = D

Q13 = D

Q14 = B

Q15 = D

Q16 = A Q17 = C Q18 = A

Q19 = D Q20 = B

MainMenu