ch11_quiz
DESCRIPTION
discovering Computers Ch11TRANSCRIPT
![Page 1: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/1.jpg)
MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy
Discovering Computers 2010
![Page 2: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/2.jpg)
Multiple Choice Main MenuComputer Security and Safety, Ethics, and Privacy
Question 1
MC Quiz 11PreviousSlide
End Show
Question 2
Question 3Question 4Question 5
Question 8
Question 6Question 7
Question 9Question 10
Question 11Question 12Question 13Question 14
Question 15
Question 16Question 17Question 18
Question 19Question 20
![Page 3: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/3.jpg)
Question 1
B
A
C
D
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11
Textbook: Page 557
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
cyber extortionist
cyber terrorist
blogger
hacker
![Page 4: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/4.jpg)
Question 1
B
A
C
D
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11Textbook: Page 557
=================================================================
Incorrect Previous
SlideMainMenu
cyber terrorist
blogger
cyber extortionist
hacker
Click On: A, B, C, or D
![Page 5: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/5.jpg)
Question 1
D
A
C
B
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11Textbook: Page 557
=================================================================
Correct MainMenu
PreviousSlide
cyber terrorist
cyber extortionist
blogger
hacker
Click On: A, B, C, or D
Click Here For Next Question
![Page 6: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/6.jpg)
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11
Textbook: Page 559
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
1,500
5,800
10,500
180,000
![Page 7: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/7.jpg)
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11Textbook: Page 559
=================================================================
Incorrect Previous
SlideMainMenu
5,800
1,500
10,500
180,000
Click On: A, B, C, or D
![Page 8: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/8.jpg)
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11Textbook: Page 559
=================================================================
Correct MainMenu
PreviousSlide
5,800
1,500
10,500
180,000
Click On: A, B, C, or D
Click Here For Next Question
![Page 9: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/9.jpg)
Question 3
D
B
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11
Textbook: Page 573
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Packing
Compression
Encryption
Formatting
![Page 10: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/10.jpg)
Question 3
D
B
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11
=================================================================
Incorrect Previous
SlideMainMenu
Compression
Packing
Encryption
Formatting
Click On: A, B, C, or D
Textbook: Page 573
![Page 11: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/11.jpg)
Question 3
B
D
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11Textbook: Page 573
=================================================================
Correct MainMenu
PreviousSlide
Compression
Packing
Encryption
Formatting
Click On: A, B, C, or D
Click Here For Next Question
![Page 12: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/12.jpg)
Question 4
A
B
C
D
=================================================================
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
Quiz 11
Textbook: Page 579
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Repetitive
Divergent
Convergent
Encryption
![Page 13: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/13.jpg)
Question 4
A
B
C
D
=================================================================
Quiz 11Textbook: Page 579
=================================================================
Incorrect Previous
SlideMainMenu
Divergent
Repetitive
Convergent
Encryption
Click On: A, B, C, or D
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
![Page 14: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/14.jpg)
Question 4
D
A
B
C
=================================================================
Quiz 11Textbook: Page 579
=================================================================
Correct MainMenu
PreviousSlide
Divergent
Repetitive
Convergent
Encryption
Click On: A, B, C, or D
Click Here For Next Question
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
![Page 15: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/15.jpg)
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11
Textbook: Page 582
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Community
Intellectual
National
Independent
![Page 16: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/16.jpg)
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11Textbook: Page 582
=================================================================
Incorrect Previous
SlideMainMenu
Intellectual
Community
National
Independent
Click On: A, B, C, or D
![Page 17: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/17.jpg)
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11Textbook: Page 582
=================================================================
Correct MainMenu
PreviousSlide
Intellectual
Community
National
Independent
Click On: A, B, C, or D
Click Here For Next Question
![Page 18: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/18.jpg)
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11
Textbook: Page 590
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Electrical
Biological
Social
Ethical
![Page 19: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/19.jpg)
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11Textbook: Page 590
=================================================================
Incorrect Previous
SlideMainMenu
Biological
Electrical
Social
Ethical
Click On: A, B, C, or D
![Page 20: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/20.jpg)
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11Textbook: Page 590
=================================================================
Correct MainMenu
PreviousSlide
Biological
Electrical
Social
Ethical
Click On: A, B, C, or D
Click Here For Next Question
![Page 21: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/21.jpg)
Question 7
A
B
C
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11
Textbook: Page 556
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
hypertext
cybercrime
hypercube
virtual crime
![Page 22: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/22.jpg)
Question 7
A
B
C
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11Textbook: Page 556
=================================================================
Incorrect Previous
SlideMainMenu
cybercrime
hypertext
hypercube
virtual crime
Click On: A, B, C, or D
![Page 23: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/23.jpg)
Question 7
C
B
A
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11Textbook: Page 556
=================================================================
Correct MainMenu
PreviousSlide
cybercrime
hypertext
hypercube
virtual crime
Click On: A, B, C, or D
Click Here For Next Question
![Page 24: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/24.jpg)
Question 8
D
B
C
A
=================================================================
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Quiz 11
Textbook: Page 568
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
photocell
scanner
biometric device
digitizer
![Page 25: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/25.jpg)
Question 8
D
B
C
A
=================================================================
Quiz 11Textbook: Page 568
=================================================================
Incorrect Previous
SlideMainMenu
scanner
photocell
biometric device
digitizer
Click On: A, B, C, or D
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
![Page 26: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/26.jpg)
Question 8
A
B
C
D
=================================================================
Quiz 11Textbook: Page 568
=================================================================
Correct MainMenu
PreviousSlide
scanner
photocell
biometric device
digitizer
Click On: A, B, C, or D
Click Here For Next Question
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
![Page 27: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/27.jpg)
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11
Textbook: Page 564
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
web host
buffer
honeypot
client
![Page 28: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/28.jpg)
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11
=================================================================
Incorrect Previous
SlideMainMenu
buffer
web host
honeypot
client
Click On: A, B, C, or D
Textbook: Page 564
![Page 29: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/29.jpg)
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11Textbook: Page 564
=================================================================
Correct MainMenu
PreviousSlide
buffer
web host
honeypot
client
Click On: A, B, C, or D
Click Here For Next Question
![Page 30: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/30.jpg)
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11
Textbook: Page 569
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Computer hacking
Digital Forensics
Network Administration
Encryption
![Page 31: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/31.jpg)
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11Textbook: Page 569
=================================================================
Incorrect Previous
SlideMainMenu
Digital Forensics
Computer hacking
Network Administration
Encryption
Click On: A, B, C, or D
![Page 32: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/32.jpg)
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11Textbook: Page 569
=================================================================
Correct MainMenu
PreviousSlide
Digital Forensics
Computer hacking
Network Administration
Encryption
Click On: A, B, C, or D
Click Here For Next Question
![Page 33: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/33.jpg)
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11
Textbook: Page 573
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Random
Public
Hyper
Indexed
![Page 34: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/34.jpg)
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11Textbook: Page 573
=================================================================
Incorrect Previous
SlideMainMenu
Public
Random
Hyper
Indexed
Click On: A, B, C, or D
![Page 35: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/35.jpg)
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11Textbook: Page 573
=================================================================
Correct MainMenu
PreviousSlide
Public
Random
Hyper
Indexed
Click On: A, B, C, or D
Click Here For Next Question
![Page 36: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/36.jpg)
Question 12
C
B
A
D
=================================================================
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
Quiz 11
Textbook: Page 574
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
stamp
disclaimer
digital signature
copyright
![Page 37: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/37.jpg)
Question 12
C
B
A
D
=================================================================
Quiz 11Textbook: Page 574
=================================================================
Incorrect Previous
SlideMainMenu
copyright
stamp
disclaimer
digital signature
Click On: A, B, C, or D
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
![Page 38: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/38.jpg)
Question 12
C
B
A
D
=================================================================
Quiz 11Textbook: Page 574
=================================================================
Correct MainMenu
PreviousSlide
copyright
stamp
disclaimer
digital signature
Click On: A, B, C, or D
Click Here For Next Question
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
![Page 39: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/39.jpg)
Question 13
A
B
C
D
=================================================================
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Quiz 11
Textbook: Page 580
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Encryption
Programming
Forensics
Ergonomics
![Page 40: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/40.jpg)
Question 13
A
B
C
D
=================================================================
Quiz 11Textbook: Page 580
=================================================================
Incorrect Previous
SlideMainMenu
Programming
Encryption
Forensics
Ergonomics
Click On: A, B, C, or D
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
![Page 41: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/41.jpg)
Question 13
A
B
C
D
=================================================================
Quiz 11Textbook: Page 580
=================================================================
Correct MainMenu
PreviousSlide
Programming
Encryption
Forensics
Ergonomics
Click On: A, B, C, or D
Click Here For Next Question
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
![Page 42: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/42.jpg)
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11
Textbook: Page 587
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
E-cards
Spam
Texting
Postings
![Page 43: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/43.jpg)
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11Textbook: Page 587
=================================================================
Incorrect Previous
SlideMainMenu
Spam
E-cards
Texting
Postings
Click On: A, B, C, or D
![Page 44: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/44.jpg)
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11Textbook: Page 587
=================================================================
Correct MainMenu
PreviousSlide
Spam
E-cards
Texting
Postings
Click On: A, B, C, or D
Click Here For Next Question
![Page 45: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/45.jpg)
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11
Textbook: Page 587
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Cloning
Streaming
Compression
Phishing
![Page 46: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/46.jpg)
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11Textbook: Page 587
=================================================================
Incorrect Previous
SlideMainMenu
Streaming
Cloning
Compression
Phishing
Click On: A, B, C, or D
![Page 47: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/47.jpg)
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11Textbook: Page 587
=================================================================
Correct MainMenu
PreviousSlide
Streaming
Cloning
Compression
Phishing
Click On: A, B, C, or D
Click Here For Next Question
![Page 48: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/48.jpg)
Question 16
A
B
C
D
=================================================================
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Quiz 11
Textbook: Page 584
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
privacy
retrieval
dispersion
transmission
![Page 49: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/49.jpg)
Question 16
D
B
C
A
=================================================================
Quiz 11Textbook: Page 584
=================================================================
Incorrect Previous
SlideMainMenu
retrieval
privacy
dispersion
transmission
Click On: A, B, C, or D
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
![Page 50: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/50.jpg)
Question 16
A
B
C
D
=================================================================
Quiz 11Textbook: Page 584
=================================================================
Correct MainMenu
PreviousSlide
retrieval
privacy
dispersion
transmission
Click On: A, B, C, or D
Click Here For Next Question
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
![Page 51: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/51.jpg)
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11
Textbook: Page 563
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Cloning
Coding
Spoofing
Encoding
![Page 52: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/52.jpg)
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11Textbook: Page 563
=================================================================
Incorrect Previous
SlideMainMenu
Coding
Cloning
Spoofing
Encoding
Click On: A, B, C, or D
![Page 53: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/53.jpg)
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11Textbook: Page 563
=================================================================
Correct MainMenu
PreviousSlide
Coding
Cloning
Spoofing
Encoding
Click On: A, B, C, or D
Click Here For Next Question
![Page 54: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/54.jpg)
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11
Textbook: Page 566
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
password
combination
code key
signature
![Page 55: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/55.jpg)
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11Textbook: Page 566
=================================================================
Incorrect Previous
SlideMainMenu
combination
password
code key
signature
Click On: A, B, C, or D
![Page 56: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/56.jpg)
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11Textbook: Page 566
=================================================================
Correct MainMenu
PreviousSlide
combination
password
code key
signature
Click On: A, B, C, or D
Click Here For Next Question
![Page 57: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/57.jpg)
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11
Textbook: Page 564
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Defrag Utility
Compression Utility
Zip Utility
Personal Firewall
![Page 58: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/58.jpg)
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11Textbook: Page 564
=================================================================
Incorrect Previous
SlideMainMenu
Compression Utility
Defrag Utility
Zip Utility
Personal Firewall
Click On: A, B, C, or D
![Page 59: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/59.jpg)
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11Textbook: Page 564
=================================================================
Correct MainMenu
PreviousSlide
Compression Utility
Defrag Utility
Zip Utility
Personal Firewall
Click On: A, B, C, or D
Click Here For Next Question
![Page 60: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/60.jpg)
Question 20
A
B
C
D
=================================================================
A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
Quiz 11
Textbook: Page 556
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
computer security risk
head crash
cyber attack
event horizon
![Page 61: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/61.jpg)
Question 20
A
B
C
D
=================================================================
Quiz 11Textbook: Page 556
=================================================================
Incorrect Previous
SlideMainMenu
computer security risk
event horizon
head crash
cyber attack
Click On: A, B, C, or D
A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
![Page 62: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/62.jpg)
Question 20
A
B
C
D
=================================================================
Quiz 11Textbook: Page 556
=================================================================
Correct MainMenu
PreviousSlide
computer security risk
event horizon
head crash
cyber attack
Click On: A, B, C, or D
Click Here For The Answer Key
An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
![Page 63: Ch11_quiz](https://reader034.vdocument.in/reader034/viewer/2022042717/55cf99c0550346d0339efc4a/html5/thumbnails/63.jpg)
Answer Key Computer Security and Safety, Ethics, and Privacy
Q1 = A
Quiz 11PreviousSlide
End Show
Q2 = D
Q3 = C
Q4 = AQ5 = B
Q8 = C
Q6 = C
Q7 = B
Q9 = C
Q10 = B
Q11 = B
Q12 = D
Q13 = D
Q14 = B
Q15 = D
Q16 = A Q17 = C Q18 = A
Q19 = D Q20 = B
MainMenu