Discovering Computers Chapter 5

Product activation
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?
True
True or False:

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.

False
True or False:

Analog signatures help to prevent email forgery.

True
True or False:

If a company does not have a formal email policy, it can read email messages without employee notification.

False
True or False:

During virtual browsing, your browser does not keep track of the websites you are visiting.

Need essay sample on "Discovering Computers Chapter 5" ? We will write a custom essay sample specifically for you for only $12.90/page

compaction
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
Electronic Communications Privacy Act (ECPA)
Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
False
True or False:

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

True
True or False:

HIPAA protects individuals against the wrongful disclosure of their health information.

An IT code of conduct
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
authorizing ActiveX scripts
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
True
True or False:

The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

False
True or False:

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

signature verification system
Which of the following does your financial institution use to reduce fraud?
false
True or False:

Biometric objects are entirely foolproof.

hand geometry system
Which of the following does your college use to verify your identity?
malware
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
information theft
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________
an audit trail
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
secure site
What is the term for a website that uses encryption techniques to protect its data?
intellectual property
Which of the following categories are the rights to which creators are entitled for their work?
a rootkit
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
off-site
Which of the following terms means in a location separate from the computer site?
adobe
Which of the following is not a security product developer?
true
True or False:

Any illegal act involving a computer generally is referred to as a computer crime.

Haven’t Found A Paper?

Let us create the best one for you! What is your topic?

Haven't found the Essay You Want?

Get your custom essay sample

For Only $13/page