Midterm comp

Computer addiction
Which of the following occurs when a computer consumes someones entire social life?
Intellectual property
Which of the following category of rights are the rights to which creators are entitled for their work?
IP
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
Copyright
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
Ethical
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
ENERGY STAR
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
Information privacy
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
Session cookies
Web sites use which of the following to keep track of items in a user’s shopping cart?
Phishing
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
Spyware
Internet advertising firms often use which of the following to collect information about users Web browsing habits?
Web bug
One type of spyware is hidden on Web pages or in e-mail messages in the form of graphical images. What is the term for this type of spyware?
Electronic Communications Privacy Act (ECPA)
Which of the following 1986 laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
Computer Matching and Privacy Protection Act
Which of the following 1988 laws regulates the use of government data to determine the eligibility of individuals for federal benefits?
Employee monitoring
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited?
The term fair use specifies how material may be used and helps to define intellectual property rights.
Which of the following statements is NOT true about intellectual property rights?
An IT code of conduct
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
Clear your history file when you are finished browsing
In order to safeguard your personal information, which of the following is recommended?
A cookie
Which of the following terms is used to describe a small text file that a Web server stores on your computer?
It does not define what a legitimate business need is for viewing a credit report
What is the problem with the Fair Credit Reporting Act?
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Define social engineering as it pertains to computers
Content filtering
What term is used to describe the process of restricting access to certain material on the Web?
Users are required to provide a software product’s 25- character identification number before installing software
Which of the following is not a question of computer ethics?
The use of an anonymizer program to surf the Web anonymously
Which is not an issue surrounding the concept of fair use, from copyright law?
Schedule
______ feasibility measures whether the established deadlines for a project are reasonable.
Interview
The ____ is the most important data and information gathering technique for the systems analyst.
Request
The _____ becomes the first item in the project notebook.
Computer security risk
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
Script kiddie
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
Cyber-extortionists
Which of the following is someone who uses e-mail as a vehicle for extortion?
Online or Internet-based illegal acts
Which of the following best describes the term, cybercrime?
Crimeware
Which term is used to describe software used by cybercriminals?
Cracker
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
Cyberterrorists
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
Information kept on an organizations premises has a higher security risk than information transmitted over networks
Which of the following statements is not true about Internet and network attacks
A worm
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
Malware
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
The destructive event or prank the program is intended to deliver
Define the term, payload, as it pertains to computer crime.
Rootkit
A _____ is a program that hides in a computer and allows someone form a remote location to take full control of the computer
Payload
Computer viruses, worms, and Trojan horses deliver their ____ on a computer when a user opens an infected file or runs an infected program, for example.
Planning
The _____ phase for a project begins when the steering committee receives a project request