Download presentation
Presentation is loading. Please wait.
1
Discovering Computers 2010
MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy
2
Question 1 Question 8 Question 15 Question 2 Question 9 Question 16
Multiple Choice Main Menu Computer Security and Safety, Ethics, and Privacy Question 1 Question 8 Question 15 Question 2 Question 9 Question 16 Question 3 Question 10 Question 17 Question 4 Question 11 Question 18 Question 5 Question 12 Question 19 Question 6 Question 13 Question 20 Question 7 Question 14 End Show Previous Slide MC Quiz 11
3
A __________ is someone who uses e-mail as a vehicle for extortion.
Question 1 ================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Textbook: Page 557 Main Menu Previous Slide Quiz 11
4
Question 1 ================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Incorrect Previous Slide Textbook: Page 557 Main Menu Quiz 11
5
Click Here For Next Question
================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Correct Click Here For Next Question Previous Slide Textbook: Page 557 Main Menu Quiz 11
6
Question 2 ================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Textbook: Page 559 Main Menu Previous Slide Quiz 11
7
Question 2 ================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Incorrect Previous Slide Textbook: Page 559 Main Menu Quiz 11
8
Click Here For Next Question
================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Correct Click Here For Next Question Previous Slide Textbook: Page 559 Main Menu Quiz 11
9
Question 3 ================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Textbook: Page 573 Main Menu Previous Slide Quiz 11
10
Question 3 ================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Incorrect Textbook: Page 573 Main Menu Previous Slide Quiz 11
11
Click Here For Next Question
================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Correct Click Here For Next Question Previous Slide Textbook: Page 573 Main Menu Quiz 11
12
Repetitive Divergent Convergent Encryption
Question 4 ================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Textbook: Page 579 Main Menu Previous Slide Quiz 11
13
Incorrect Repetitive Divergent Convergent Encryption
Question 4 ================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Incorrect Main Menu Previous Slide Textbook: Page 579 Quiz 11
14
Click Here For Next Question
================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Correct Click Here For Next Question Previous Slide Textbook: Page 579 Main Menu Quiz 11
15
Question 5 ================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Textbook: Page 582 Main Menu Previous Slide Quiz 11
16
Question 5 ================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Incorrect Textbook: Page 582 Main Menu Previous Slide Quiz 11
17
Click Here For Next Question
================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Correct Click Here For Next Question Previous Slide Textbook: Page 582 Main Menu Quiz 11
18
Electrical Biological Social Ethical
Question 6 ================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Textbook: Page 590 Main Menu Previous Slide Quiz 11
19
Incorrect Electrical Biological Social Ethical
Question 6 ================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Incorrect Previous Slide Textbook: Page 590 Main Menu Quiz 11
20
Click Here For Next Question
================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Correct Click Here For Next Question Previous Slide Textbook: Page 590 Main Menu Quiz 11
21
The term __________ refers to online or Internet-based illegal acts.
Question 7 ================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Textbook: Page 556 Main Menu Previous Slide Quiz 11
22
Question 7 ================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Incorrect Previous Slide Textbook: Page 556 Main Menu Quiz 11
23
Click Here For Next Question
================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Correct Click Here For Next Question Previous Slide Textbook: Page 556 Main Menu Quiz 11
24
photocell scanner biometric device digitizer
Question 8 ================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Textbook: Page 568 Main Menu Previous Slide Quiz 11
25
Incorrect photocell scanner biometric device digitizer
Question 8 ================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Incorrect Main Menu Previous Slide Textbook: Page 568 Quiz 11
26
Click Here For Next Question
================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Correct Click Here For Next Question Previous Slide Textbook: Page 568 Main Menu Quiz 11
27
Question 9 ================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Textbook: Page 564 Main Menu Previous Slide Quiz 11
28
Question 9 ================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Incorrect Textbook: Page 564 Main Menu Previous Slide Quiz 11
29
Click Here For Next Question
================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Correct Click Here For Next Question Previous Slide Textbook: Page 564 Main Menu Quiz 11
30
Network Administration
Question 10 ================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Textbook: Page 569 Main Menu Previous Slide Quiz 11
31
Question 10 ================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Incorrect Textbook: Page 569 Main Menu Previous Slide Quiz 11
32
Click Here For Next Question
================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Correct Click Here For Next Question Previous Slide Textbook: Page 569 Main Menu Quiz 11
33
Question 11 ================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Textbook: Page 573 Main Menu Previous Slide Quiz 11
34
Question 11 ================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Incorrect Previous Slide Textbook: Page 573 Main Menu Quiz 11
35
Click Here For Next Question
================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Correct Click Here For Next Question Previous Slide Textbook: Page 573 Main Menu Quiz 11
36
Question 12 ================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Textbook: Page 574 Main Menu Previous Slide Quiz 11
37
Question 12 ================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Incorrect Main Menu Previous Slide Textbook: Page 574 Quiz 11
38
Click Here For Next Question
================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Correct Click Here For Next Question Previous Slide Textbook: Page 574 Main Menu Quiz 11
39
Question 13 ================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Textbook: Page 580 Main Menu Previous Slide Quiz 11
40
Question 13 ================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Incorrect Main Menu Previous Slide Textbook: Page 580 Quiz 11
41
Click Here For Next Question
================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Correct Click Here For Next Question Previous Slide Textbook: Page 580 Main Menu Quiz 11
42
Question 14 ================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Textbook: Page 587 Main Menu Previous Slide Quiz 11
43
Question 14 ================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Incorrect Previous Slide Textbook: Page 587 Main Menu Quiz 11
44
Click Here For Next Question
================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Correct Click Here For Next Question Previous Slide Textbook: Page 587 Main Menu Quiz 11
45
Question 15 ================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Textbook: Page 587 Main Menu Previous Slide Quiz 11
46
Question 15 ================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Incorrect Previous Slide Textbook: Page 587 Main Menu Quiz 11
47
Click Here For Next Question
================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Correct Click Here For Next Question Previous Slide Textbook: Page 587 Main Menu Quiz 11
48
Question 16 ================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Textbook: Page 584 Main Menu Previous Slide Quiz 11
49
Question 16 ================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Incorrect Main Menu Previous Slide Textbook: Page 584 Quiz 11
50
Click Here For Next Question
================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Correct Click Here For Next Question Previous Slide Textbook: Page 584 Main Menu Quiz 11
51
Question 17 ================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Textbook: Page 563 Main Menu Previous Slide Quiz 11
52
Question 17 ================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Incorrect Previous Slide Textbook: Page 563 Main Menu Quiz 11
53
Click Here For Next Question
================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Correct Click Here For Next Question Previous Slide Textbook: Page 563 Main Menu Quiz 11
54
Question 18 ================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Textbook: Page 566 Main Menu Previous Slide Quiz 11
55
Question 18 ================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Incorrect Previous Slide Textbook: Page 566 Main Menu Quiz 11
56
Click Here For Next Question
================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Correct Click Here For Next Question Previous Slide Textbook: Page 566 Main Menu Quiz 11
57
Question 19 ================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Textbook: Page 564 Main Menu Previous Slide Quiz 11
58
Question 19 ================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Incorrect Previous Slide Textbook: Page 564 Main Menu Quiz 11
59
Click Here For Next Question
================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Correct Click Here For Next Question Previous Slide Textbook: Page 564 Main Menu Quiz 11
60
computer security risk
Question 20 ================================================================= A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Textbook: Page 556 Main Menu Previous Slide Quiz 11
61
Question 20 ================================================================= A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Incorrect Main Menu Previous Slide Textbook: Page 556 Quiz 11
62
Click Here For The Answer Key
Question 20 ================================================================= An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Correct Click Here For The Answer Key Previous Slide Textbook: Page 556 Main Menu Quiz 11
63
Answer Key Computer Security and Safety, Ethics, and Privacy
Q1 = A Q8 = C Q15 = D Q2 = D Q9 = C Q16 = A Q3 = C Q10 = B Q17 = C Q11 = B Q18 = A Q4 = A Q5 = B Q12 = D Q19 = D Q20 = B Q6 = C Q13 = D Q7 = B Q14 = B Main Menu End Show Previous Slide Quiz 11
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.