A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Data distribution of systems attack.
B) Data denial-of-software attack.
C) Distributed data online systems attack.
D) Distributed denial-of-service attack.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The assurance that messages and information are available only to those who are authorized to view them.
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment.
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.
D) The principles and standards that guide our behavior toward other people.
Correct Answer
verified
Multiple Choice
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
Correct Answer
verified
Multiple Choice
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
Correct Answer
verified
Multiple Choice
A) The unauthorized use, duplication, distribution, or sale of copyrighted software.
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
C) A law passed to protect minors from accessing inappropriate material on the Internet.
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
Multiple Choice
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
B) A method or system of government for information management or control.
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) A form of malicious software that infects your computer and asks for money.
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys.
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user.
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 1 - 20 of 121
Related Exams