IDT Chapter 14 Test: Question Preview (ID: 17620)


Below is a preview of the questions contained within the game titled IDT CHAPTER 14 TEST: Cyber Security .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]


Play games to reveal the correct answers. Click here to play a game and get the answers.

What right of citizens do tracking systems threaten?
a) right to travel anywhere. b) right to free speech. c) right to be anonymous d) right to bear arms
Cookies record information about all of the following except?
a) IP addresses. b) computer operating systems. c) home addresses. d) URLs visited.
Which tracking technology involves coding identification numbers into both hardware and software?
a) Global Unique Identifiers b) network sniffing c) cookies d) cell phones/ handheld computers
What is a consumer profile?
a) a description of a company's typical customer. b) a drawing of a customer's face. c) information about a company's target market. d) information about a customer's lifestyle and buying habits.
Which tracking technology involves pinpointing the location of a person?
a) network sniffing b) cookies c) Global Unique Identifiers d) cell phones/ handheld computers
Why has an area of study called computer ethics become more necessary today than in the early days of computing?
a) Computer technology has become more powerful and widespread. b) Unethical behavior is out of control on the Internet. c) Programmers and engineers didn't have to make ethical decisions 50 years ago. d) Americans can no longer depend on the U.S. government to make ethical decisions for them.
What are the two main categories in the study of ethics?
a) objective and subjective b) normative and applied c) relative and nonrelative d) private and public
Which school of ethical thought believes that ethical principles stem from the command of a Supreme Being?
a) moral reliance b) moral rationalism c) moral relativism d) moral realism
What are ethics?
a) a universal, clear-cut standard of right and wrong. b) internalized principles that influence the decisions people make. c) external rules the violation of which is punishable by society. d) absolute and unchanging rules.
What is the most common protocol used for secure servers?
a) Secure Sockets Layer b) Encryption Server Security c) Distributed Security System d) E-Security Protocol
Which of the following is not a name of an FBI Internet wiretrap program?
a) Omnivore b) Carnivore c) Herbivore d) DCS1000
What act was enacted by Congress in 2001 and renewed in 2006?
a) USA PATRIOT Act b) USA HOMEGROWN Act c) USA Safety Act d) USA Homeland Act
How much money in lost productivity is bad software estimated to cost U.S. businesses each year?
a) $100,000 b) $100 million c) $100 billion d) $100 trillion
Which one of the following has made almost all its Web sites fully accessible to persons with disabilities?
a) Apple Computer b) American Online c) U.S. government d) National Association of Nonprofit Organizations
An example of making computer hardware more accessible to people with disabilities is
a) greater capacity hard disks b) the mouse c) smaller keyboards d) the sticky keys feature
Which one of the following requires public schools to install Internet filtering software on their computers?
a) Child Filtering Protection Act of 2003 b) Child Pornography Prevention Act of 1996 c) Children's Online Privacy Protection Act of 1998 d) Children's Internet Protection Act of 2000
In contract to patents, copyrights
a) help protect intellectual property. b) encourage and protect artistic and literary endeavors c) award ownership of an idea or invention to its creator for a fixed number of years. d) allow people the right to control their creations and charge others for their use.
It would be considered fair use of protected material to use which of the following without permission?
a) a young child's storybook. b) stanza of poetry c) line from a poem d) chapter from a novel
Who typically signs an acceptable use policy?
a) teachers and administrators b) computer lab aides c) parents and students d) school board members
In 2008, which group led in Internet usage?
a) Caucasian Americans b) African Americans c) Hispanic Americans d) Asian Americans
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 17620 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register