MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy
Discovering Computers 2010
Multiple Choice Main MenuComputer Security and Safety, Ethics, and Privacy
Question 1
MC Quiz 11PreviousSlide
End Show
Question 2
Question 3Question 4Question 5
Question 8
Question 6Question 7
Question 9Question 10
Question 11Question 12Question 13Question 14
Question 15
Question 16Question 17Question 18
Question 19Question 20
Question 1
B
A
C
D
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11
Textbook: Page 557
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
cyber extortionist
cyber terrorist
blogger
hacker
Question 1
B
A
C
D
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11Textbook: Page 557
=================================================================
Incorrect Previous
SlideMainMenu
cyber terrorist
blogger
cyber extortionist
hacker
Click On: A, B, C, or D
Question 1
D
A
C
B
=================================================================
A __________ is someone who uses e-mail as a vehicle for extortion.
Quiz 11Textbook: Page 557
=================================================================
Correct MainMenu
PreviousSlide
cyber terrorist
cyber extortionist
blogger
hacker
Click On: A, B, C, or D
Click Here For Next Question
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11
Textbook: Page 559
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
1,500
5,800
10,500
180,000
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11Textbook: Page 559
=================================================================
Incorrect Previous
SlideMainMenu
5,800
1,500
10,500
180,000
Click On: A, B, C, or D
Question 2
B
A
C
D
=================================================================
Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.
Quiz 11Textbook: Page 559
=================================================================
Correct MainMenu
PreviousSlide
5,800
1,500
10,500
180,000
Click On: A, B, C, or D
Click Here For Next Question
Question 3
D
B
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11
Textbook: Page 573
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Packing
Compression
Encryption
Formatting
Question 3
D
B
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11
=================================================================
Incorrect Previous
SlideMainMenu
Compression
Packing
Encryption
Formatting
Click On: A, B, C, or D
Textbook: Page 573
Question 3
B
D
C
A
=================================================================
__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.
Quiz 11Textbook: Page 573
=================================================================
Correct MainMenu
PreviousSlide
Compression
Packing
Encryption
Formatting
Click On: A, B, C, or D
Click Here For Next Question
Question 4
A
B
C
D
=================================================================
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
Quiz 11
Textbook: Page 579
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Repetitive
Divergent
Convergent
Encryption
Question 4
A
B
C
D
=================================================================
Quiz 11Textbook: Page 579
=================================================================
Incorrect Previous
SlideMainMenu
Divergent
Repetitive
Convergent
Encryption
Click On: A, B, C, or D
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
Question 4
D
A
B
C
=================================================================
Quiz 11Textbook: Page 579
=================================================================
Correct MainMenu
PreviousSlide
Divergent
Repetitive
Convergent
Encryption
Click On: A, B, C, or D
Click Here For Next Question
__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11
Textbook: Page 582
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Community
Intellectual
National
Independent
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11Textbook: Page 582
=================================================================
Incorrect Previous
SlideMainMenu
Intellectual
Community
National
Independent
Click On: A, B, C, or D
Question 5
A
B
C
D
=================================================================
__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.
Quiz 11Textbook: Page 582
=================================================================
Correct MainMenu
PreviousSlide
Intellectual
Community
National
Independent
Click On: A, B, C, or D
Click Here For Next Question
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11
Textbook: Page 590
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Electrical
Biological
Social
Ethical
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11Textbook: Page 590
=================================================================
Incorrect Previous
SlideMainMenu
Biological
Electrical
Social
Ethical
Click On: A, B, C, or D
Question 6
B
A
C
D
=================================================================
__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.
Quiz 11Textbook: Page 590
=================================================================
Correct MainMenu
PreviousSlide
Biological
Electrical
Social
Ethical
Click On: A, B, C, or D
Click Here For Next Question
Question 7
A
B
C
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11
Textbook: Page 556
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
hypertext
cybercrime
hypercube
virtual crime
Question 7
A
B
C
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11Textbook: Page 556
=================================================================
Incorrect Previous
SlideMainMenu
cybercrime
hypertext
hypercube
virtual crime
Click On: A, B, C, or D
Question 7
C
B
A
D
=================================================================
The term __________ refers to online or Internet-based illegal acts.
Quiz 11Textbook: Page 556
=================================================================
Correct MainMenu
PreviousSlide
cybercrime
hypertext
hypercube
virtual crime
Click On: A, B, C, or D
Click Here For Next Question
Question 8
D
B
C
A
=================================================================
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Quiz 11
Textbook: Page 568
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
photocell
scanner
biometric device
digitizer
Question 8
D
B
C
A
=================================================================
Quiz 11Textbook: Page 568
=================================================================
Incorrect Previous
SlideMainMenu
scanner
photocell
biometric device
digitizer
Click On: A, B, C, or D
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Question 8
A
B
C
D
=================================================================
Quiz 11Textbook: Page 568
=================================================================
Correct MainMenu
PreviousSlide
scanner
photocell
biometric device
digitizer
Click On: A, B, C, or D
Click Here For Next Question
A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11
Textbook: Page 564
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
web host
buffer
honeypot
client
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11
=================================================================
Incorrect Previous
SlideMainMenu
buffer
web host
honeypot
client
Click On: A, B, C, or D
Textbook: Page 564
Question 9
D
B
C
A
=================================================================
A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.
Quiz 11Textbook: Page 564
=================================================================
Correct MainMenu
PreviousSlide
buffer
web host
honeypot
client
Click On: A, B, C, or D
Click Here For Next Question
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11
Textbook: Page 569
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Computer hacking
Digital Forensics
Network Administration
Encryption
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11Textbook: Page 569
=================================================================
Incorrect Previous
SlideMainMenu
Digital Forensics
Computer hacking
Network Administration
Encryption
Click On: A, B, C, or D
Question 10
C
B
A
D
=================================================================
__________ is the discovery, collection and analysis of evidence found on computers and networks.
Quiz 11Textbook: Page 569
=================================================================
Correct MainMenu
PreviousSlide
Digital Forensics
Computer hacking
Network Administration
Encryption
Click On: A, B, C, or D
Click Here For Next Question
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11
Textbook: Page 573
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Random
Public
Hyper
Indexed
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11Textbook: Page 573
=================================================================
Incorrect Previous
SlideMainMenu
Public
Random
Hyper
Indexed
Click On: A, B, C, or D
Question 11
D
B
C
A
=================================================================
__________ key encryption, also known as asymmetric key encryption uses two encryption keys.
Quiz 11Textbook: Page 573
=================================================================
Correct MainMenu
PreviousSlide
Public
Random
Hyper
Indexed
Click On: A, B, C, or D
Click Here For Next Question
Question 12
C
B
A
D
=================================================================
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
Quiz 11
Textbook: Page 574
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
stamp
disclaimer
digital signature
copyright
Question 12
C
B
A
D
=================================================================
Quiz 11Textbook: Page 574
=================================================================
Incorrect Previous
SlideMainMenu
copyright
stamp
disclaimer
digital signature
Click On: A, B, C, or D
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
Question 12
C
B
A
D
=================================================================
Quiz 11Textbook: Page 574
=================================================================
Correct MainMenu
PreviousSlide
copyright
stamp
disclaimer
digital signature
Click On: A, B, C, or D
Click Here For Next Question
A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.
Question 13
A
B
C
D
=================================================================
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Quiz 11
Textbook: Page 580
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Encryption
Programming
Forensics
Ergonomics
Question 13
A
B
C
D
=================================================================
Quiz 11Textbook: Page 580
=================================================================
Incorrect Previous
SlideMainMenu
Programming
Encryption
Forensics
Ergonomics
Click On: A, B, C, or D
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Question 13
A
B
C
D
=================================================================
Quiz 11Textbook: Page 580
=================================================================
Correct MainMenu
PreviousSlide
Programming
Encryption
Forensics
Ergonomics
Click On: A, B, C, or D
Click Here For Next Question
__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11
Textbook: Page 587
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
E-cards
Spam
Texting
Postings
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11Textbook: Page 587
=================================================================
Incorrect Previous
SlideMainMenu
Spam
E-cards
Texting
Postings
Click On: A, B, C, or D
Question 14
B
A
C
D
=================================================================
__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.
Quiz 11Textbook: Page 587
=================================================================
Correct MainMenu
PreviousSlide
Spam
E-cards
Texting
Postings
Click On: A, B, C, or D
Click Here For Next Question
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11
Textbook: Page 587
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Cloning
Streaming
Compression
Phishing
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11Textbook: Page 587
=================================================================
Incorrect Previous
SlideMainMenu
Streaming
Cloning
Compression
Phishing
Click On: A, B, C, or D
Question 15
A
B
C
D
=================================================================
__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
Quiz 11Textbook: Page 587
=================================================================
Correct MainMenu
PreviousSlide
Streaming
Cloning
Compression
Phishing
Click On: A, B, C, or D
Click Here For Next Question
Question 16
A
B
C
D
=================================================================
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Quiz 11
Textbook: Page 584
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
privacy
retrieval
dispersion
transmission
Question 16
D
B
C
A
=================================================================
Quiz 11Textbook: Page 584
=================================================================
Incorrect Previous
SlideMainMenu
retrieval
privacy
dispersion
transmission
Click On: A, B, C, or D
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Question 16
A
B
C
D
=================================================================
Quiz 11Textbook: Page 584
=================================================================
Correct MainMenu
PreviousSlide
retrieval
privacy
dispersion
transmission
Click On: A, B, C, or D
Click Here For Next Question
Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11
Textbook: Page 563
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Cloning
Coding
Spoofing
Encoding
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11Textbook: Page 563
=================================================================
Incorrect Previous
SlideMainMenu
Coding
Cloning
Spoofing
Encoding
Click On: A, B, C, or D
Question 17
C
B
A
D
=================================================================
__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Quiz 11Textbook: Page 563
=================================================================
Correct MainMenu
PreviousSlide
Coding
Cloning
Spoofing
Encoding
Click On: A, B, C, or D
Click Here For Next Question
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11
Textbook: Page 566
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
password
combination
code key
signature
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11Textbook: Page 566
=================================================================
Incorrect Previous
SlideMainMenu
combination
password
code key
signature
Click On: A, B, C, or D
Question 18
A
B
C
D
=================================================================
A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.
Quiz 11Textbook: Page 566
=================================================================
Correct MainMenu
PreviousSlide
combination
password
code key
signature
Click On: A, B, C, or D
Click Here For Next Question
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11
Textbook: Page 564
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
Defrag Utility
Compression Utility
Zip Utility
Personal Firewall
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11Textbook: Page 564
=================================================================
Incorrect Previous
SlideMainMenu
Compression Utility
Defrag Utility
Zip Utility
Personal Firewall
Click On: A, B, C, or D
Question 19
C
B
A
D
=================================================================
A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Quiz 11Textbook: Page 564
=================================================================
Correct MainMenu
PreviousSlide
Compression Utility
Defrag Utility
Zip Utility
Personal Firewall
Click On: A, B, C, or D
Click Here For Next Question
Question 20
A
B
C
D
=================================================================
A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
Quiz 11
Textbook: Page 556
=================================================================
PreviousSlide
MainMenu
Click On: A, B, C, or D
computer security risk
head crash
cyber attack
event horizon
Question 20
A
B
C
D
=================================================================
Quiz 11Textbook: Page 556
=================================================================
Incorrect Previous
SlideMainMenu
computer security risk
event horizon
head crash
cyber attack
Click On: A, B, C, or D
A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
Question 20
A
B
C
D
=================================================================
Quiz 11Textbook: Page 556
=================================================================
Correct MainMenu
PreviousSlide
computer security risk
event horizon
head crash
cyber attack
Click On: A, B, C, or D
Click Here For The Answer Key
An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
Answer Key Computer Security and Safety, Ethics, and Privacy
Q1 = A
Quiz 11PreviousSlide
End Show
Q2 = D
Q3 = C
Q4 = AQ5 = B
Q8 = C
Q6 = C
Q7 = B
Q9 = C
Q10 = B
Q11 = B
Q12 = D
Q13 = D
Q14 = B
Q15 = D
Q16 = A Q17 = C Q18 = A
Q19 = D Q20 = B
MainMenu
Recommended