Module 8 Flashcards
(80 cards)
Web sites use a ____ to keep track of items in a user’s shopping cart.
SESSION COOKIE
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
Computer Vision Syndrome (CVS)
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Uninterruptible power supply (UPS)
TRUE OR FALSE: Some operating systems and e-mail programs allows you to encrypt the contents of files and messages that are stored in your computer.
TRUE
TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.
FALSE
TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
TRUE
TRUE OR FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites.
FALSE
TRUE OR FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.
TRUE
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
Noise
TRUE OR FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.
FALSE
TRUE OR FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.
TRUE
Employee __ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited.
MONITORING
TRUE OR FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion
TRUE
TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
TRUE
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts.
OVERVOLTAGE
A(n) ____ program secretly collects information about a user.
SPYWARE
To ________ a file means to make a copy of it.
BACK UP
Computer ____ occurs when a computer consumes someone’s entire social life.
ADDICTION
TRUE OR FALSE: Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
TRUE
TRUE OR FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
FALSE
A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
SECURITY
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
FIREWALL
TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
TRUE