Filters
Question type

Study Flashcards

COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the Web?


A) content filtering
B) information monitoring
C) data mining
D) social profiling

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the process of restricting access to certain material on the Web?


A) text remastering
B) content filtering
C) indexing
D) material masking

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following occurs when the electrical supply drops?


A) overvoltage
B) undervoltage
C) spike
D) unstable flow

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail.

A) True
B) False

Correct Answer

verifed

verified

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?


A) re-securing
B) decryption
C) assessment
D) digitization

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Critical Thinking Questions Case 11-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which is NOT an issue surrounding the concept of fair use, from copyright law?


A) The right of students to post their own term papers on the Web.
B) The rights of a faculty member to print material from the Web and distribute it to the members of her class for instructional purposes.
C) The use of an anonymizer program to surf the Web anonymously.
D) The rights of individuals to download contents of your Web site, modify it, and then put it on the Web again as their own.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?


A) The term fair use specifies how material may be used and helps to define intellectual property rights.
B) Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
C) A copyright protects any tangible form of expression.
D) Digital rights management is a strategy designed to prevent illegal distribution of digital content.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What is a power surge?


A) when incoming electrical power increases more than five percent above normal volts
B) a complete power failure
C) an undervoltage that lasts longer than a minute
D) an increase in power that lasts less than one millisecond

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer or network.

A) True
B) False

Correct Answer

verifed

verified

Which of the following terms means in a location separate from the computer site?


A) Offscope
B) Offshore
C) Offline
D) Offsite

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints?


A) DoS
B) ISP
C) PGP
D) RSI

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the unit of energy a surge protection device can absorb before it can be damaged?


A) Joule
B) spike
C) hash
D) macro

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A wireless access point should be configured so that it broadcasts an SSID to prevent war driving.

A) True
B) False

Correct Answer

verifed

verified

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the computer activities for which a computer or network may and may not be used.

Correct Answer

verifed

verified

Describe botnets and denial of service attacks.

Correct Answer

verifed

verified

When users purchase software, a(n) ____________________ license agreement, like the one in the accompanying figure, permits users to install the software on only one computer

Correct Answer

verifed

verified

Which of the following is a small text file that a Web server stores on a user's computer?


A) worm
B) spike
C) cookie
D) payload

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In the case of system failure or the discovery of corrupted files, users do this to the files by copying the backed up files to their original location on a computer. What is the term in question?


A) reset
B) index
C) restore
D) resource

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Tendonitis is an example of what type of computer-related disorder?


A) CVS
B) RSI
C) OSHA
D) CBT

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 181

Related Exams

Show Answer