Académique Documents
Professionnel Documents
Culture Documents
Answer Key
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Introduction
Even the most ethical people must face the nearly inevitable dilemmas involving
choices between incompatible good outcomes and conflicting loyalties. An
ethical dilemma is not the choice of whether or not to be ethical; rather, an
ethical dilemma is when one's responsibilities seem to lead in opposite
directions.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
3. _____ can be defined as the principles and standards that guide our behavior
toward other people.
A. Ethics
B. Models
C. Eugenics
D. Aesthetics
Ethics can be defined as the principles and standards that guide our behavior
toward other people. Ethics is also about the reasons we give for thinking we
ought to live one way rather than another, make one decision rather than
another, or opt for one policy over another.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
4. Which of the following is true of ethics and ethical people?
A. Ethical people do not face ethical dilemmas since they know the difference
between right and wrong.
B. Ethical people's values are free from the influence of their history, culture,
and religion.
AACSB: Ethics
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
5. David works as process supervisor at an industrial plant. In his company, he is
known by all his colleagues and superiors as an honest worker whose decisions
are always guided by ethical values. Recently, David came to know that due to
the irresponsible disposal of company waste, the local groundwater has been
contaminated. Because of this, a large number of people living in close
proximity to the plant have been suffering from severe ailments. However, in
spite of knowing this, David does not take any action. Which of the following, if
true, most likely explains David's decision not to act?
B. David considered the impact of toxins on the environment while making the
decision.
C. David's decision was influenced by the dilemma of losing his job at the plant.
D. David made the decision by considering the well-being of the people living in
close proximity to the plant.
Two factors affect how one makes a decision when faced with an ethical
dilemma. The first is one's basic ethical structure, which one developed while
growing up. The second is the set of practical circumstances inevitably involved
in the decision that one is trying to make, that is, all the shades of gray in what
are rarely black or white decisions.
A. Actions that are considered serious ethical violations by both society and
oneself.
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.
AACSB: Ethics
Blooms: Understand
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
7. Among the three levels of an individual's ethical structure, the _____ level
involves things that most people would not consider bad, such as taking a
couple of paper clips or sending an occasional personal e-mail on company
time.
A. innermost
B. outermost
C. second
D. middle
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
8. Which of the following is part of the innermost level of an individual's ethical
structure?
C. Behavior that does not call for action against the person.
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
consider very serious, such as embezzling funds or selling company records to a
competitor.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 2 Medium
Topic: Ethics
9. Among the three levels of an individual's ethical structure, the _____ level
involves ethical violations that one would consider very serious, such as
embezzling funds or selling company records to a competitor.
A. innermost
B. outermost
C. external
D. middle
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
consider very serious, such as embezzling funds or selling company records to a
competitor.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
10. Michelle works as an engineer at a software firm and often checks her personal
e-mail while at work. Due to the long hours she puts in at the office, she does
not have any time to check her e-mail at home and hence, feels that her actions
are acceptable. Michelle's behavior relates to which of the following levels of her
ethical structure?
A. Innermost
B. Outermost
C. Inside
D. Middle
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the outside level are things that most people would not
consider bad, such as taking a couple of paper clips or sending an occasional
personal e-mail on company time.
A. Innermost
B. External
C. Outermost
D. Middle
A person's ethical structure and the ethical challenges one will face exist at
several levels. At the innermost ethical level are ethical violations that one would
surely consider very serious, such as embezzling funds or selling company
records to a competitor.
A. the consequences
B. society's opinion
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
13. Peter works as a quality inspection officer at a coffee factory. Due to personal
obligations, he needs to leave work early one day, because of which certain
consignments will be shipped without any quality checks. Peter is now thinking
about the actions that the company will take against him if they find out about
it. Which of the following is Peter considering before making his decision?
A. Reach of result
B. Relatedness
C. Time to consequences
D. Consequences
A. Likelihood of effect
B. Relatedness
C. Society's opinion
D. Time to consequences
A. Time to consequences
B. Likelihood of effect
C. Relatedness
D. Reach of result
B. society's opinion
D. relatedness
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
17. An assessment of what is right or wrong can be determined by considering the
____, which may be defined as how long it will take for the benefit or harm to
take effect.
A. likelihood of effect
B. reach of result
C. time to consequences
D. consequences
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
18. _____ refers to the extent to which one identifies with the person or persons who
will receive the benefit or suffer the harm associated with a particular decision.
A. Reach of result
B. Tangibility
C. Likelihood of effect
D. Relatedness
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
19. An assessment of what is right or wrong can be made by considering _____
which focuses on the number of people that will be affected by one's action.
A. society's opinion
B. the consequences
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
20. The management at Corpus Inc. is weighing the pros and cons of moving their
factory from Michigan to Vermont. They know that the move will lower their
operating costs, however, they are also aware that several of their factory
workers will be left without a job because of their inability to relocate. Which of
the following considerations is the company taking into account while making
their decision?
A. Time to consequences
B. Reach of result
C. Causes
D. Society's opinion
A. public property
B. intellectual property
C. real property
D. personal property
A. Real property
B. Public property
C. Intellectual property
D. Immovable property
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
23. An architectural firm's blueprints, sketches and other proprietary documents are
examples of ____.
A. public property
B. intellectual property
C. real property
D. immovable property
AACSB: Ethics
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
24. Katherine Wood, a critically acclaimed feminist poet, recently published her
second anthology of poetry. Which of the following will protect her work from
being used by other people without her permission?
A. Copyright law
B. Patent law
C. Trademark law
D. Fair use
Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Copyright is the legal protection
afforded an expression of an idea, such as a song, video game, and some types
of proprietary documents.
A. copyright
B. trademark
C. patent
Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Copyright is the legal protection
offered for the expression of an idea, such as a song, video game, and some
types of proprietary documents.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
26. The _____ says that you may use copyrighted material in certain situations, for
example, in the creation of new work or, within certain limits, for teaching
purposes.
B. First-Sale Doctrine
D. Open-source rule
The Fair Use Doctrine says that one may use copyrighted material in certain
situations, for example, in the creation of new work or, within certain limits, for
teaching purposes. One of those limits is on the amount of the copyrighted
material one may use.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
27. Jeanne Sanders, a celebrity chef, recently published a book titled "Easy to Bake
Cakes and Pastries." However, in spite of copyrighting her work, James Riley, a
critic with News Today, used some excerpts from her book for his news article.
Jeanne is upset and consults her lawyer who tells her that, according to law,
James has the right to use excerpts from her book and has not violated any
laws. This is an example of ____.
The Fair Use Doctrine says that one may use copyrighted material in certain
situations, for example, in the creation of new work or, within certain limits, for
teaching purposes. One of those limits is on the amount of the copyrighted
material one may use.
A. Annotations
B. Citations
C. Watermarks
D. Inscriptions
In preparing material, keep one simple rule in mind: If it is not your original
work, then provide a citation.
A. Pirated software
B. File sharing
C. Torrent poisoning
D. Phishing
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
30. Sarah recently downloaded a few songs by her favorite artist a month before
the artist's album was released. After downloading the songs, she distributed
them to all her friends. Which of the following is Sarah doing?
A. Spamming
B. Phishing
C. Pirating
D. Spoofing
Copyright law protects the authorship of literary and dramatic works, musical
and theatrical compositions, and works of art. Having a copyright means that no
one can use your song or video game without your permission. Pirated software
is the unauthorized use, duplication, distribution, or sale of copyrighted
software. If one copies copyrighted software and gives it to another person, the
person is pirating the software.
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
31. _____ is the right to be left alone when one wants to be, to have control over
one's own personal possessions, and not to be observed without one's consent.
A. Non-disclosure
B. Intellectual property
C. Personalization
D. Privacy
Privacy is the right to be left alone when one wants to be, to have control over
one's own personal possessions, and not to be observed without one's consent.
It is the right to be free of unwanted intrusion into one's private life.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
32. _____ refers to programs that Web sites offer to help people monitor what is
happening on a computer.
A. Abandonware
B. Snoop ware
C. Freeware
D. Shareware
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
33. Claytons and Sons, a finance firm in Manhattan, has a large number of
employees who handle huge amounts of online transactions everyday. The
management feels that it is crucial to monitor their online activities. Which of the
following can the company use for this purpose?
A. Snoopware
B. Sneakware
C. Spyware
D. Stealthware
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
34. Which of the following is a program that, when installed on a computer, records
every mouse click?
A. Honeypot
B. Spear phishing
C. Clickstreaming
D. Key logger
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
35. Starlit Corporation recently had an incident where one of their employees sent
out confidential information to a competitor. The company has now decided to
use a certain software which tracks their employees' online activities based on
their mouse clicks. Which of the following is the company most likely planning
to use?
A. Spear phishing
B. Spyware
D. Clickstream
A. Spyware
B. Key logger
C. Packet sniffer
D. Rootkit
Tools for monitoring include packet sniffers that examine the information passing by on switches, hubs, or
routers (the devices on networks that connect computers to each other), and log analysis tools that keep
track of logons, deletions, and so forth.
A. Packet sniffers
B. Routers
C. Adware
D. Modems
Tools for monitoring computer use include packet sniffers that examine the
information passing by on switches, hubs, or routers (the devices on networks
that connect computers to each other), and log analysis tools that keep track of
logons, deletions, and so forth.
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
38. _____ is a kind of identity theft where the victim knows the person who stole
his/her identity.
A. Friendly fraud
B. PayPal
C. Peer-to-peer computing
D. Pretexting
Identity theft is the forging of someone's identity for the purpose of fraud. A
kind of identity theft where the victim knows the person who stole their identity
is called friendly fraud.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
39. _____ is a technique to gain personal information for the purpose of identity
theft, usually by means of fraudulent e-mail.
A. Greylisting
B. Phishing
C. Sniffing
D. Wire fraud
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
40. Ashley recently received an e-mail from a bank asking for her account number
and verification of her password. The e-mail contained the bank's logo and was
signed by the branch manager. She immediately replied to the e-mail, providing
the requested details. However, a few days later, she noticed that her bank
statement showed a zero balance. On checking with the bank authorities, she
was told that the e-mail was not sent by them. Ashley was most likely a victim of
which of the following types of fraud?
A. Brand spoofing
B. Key logging
C. Pirating
D. Pharming
A. Spear phishing
B. Vishing
C. Spy-phishing
D. Pharming
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
42. _____ is the use of phishing targeted at senior business executives, government
leaders, and other types of high-profile individuals.
A. Spamming
B. Whaling
C. Vishing
D. Keystroke logging
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
43. Which of the following should a person do to protect their personal
information?
D. Do not enter those Web sites where https:// appears in the Web browser.
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
44. The most recent federal bill that addressed electronic monitoring of employees
is the ____.
The most recent federal bill that addressed electronic monitoring of employees
is the Electronic Communications Privacy Act of 1986. Although, in general, it
forbids the interception of wired or electronic communications, it has exceptions
for both prior consent and business use.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
45. A _____ is a small file that contains information about a person and his/her Web
activities, which a Web site one visits places on their computer.
A. cookie
B. bot
C. cache
D. key logger
A cookie is a small file that contains information about you and your Web
activities, which a Web site you visit places on your computer. A cookie has
many uses. For example, it is used to keep ID and password information so that
one does not have to go through the whole verification process every time they
log onto a Web site.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
46. _____ refers to unsolicited e-mail (electronic junk mail) from businesses that
advertise goods and services.
A. Adware
B. Spyware
C. Pharming
D. Spam
Spam is unsolicited e-mail (electronic junk mail) from businesses that advertise
goods and services. Often spam mass mailings advertise pornography, get-rich-
quick schemes, and miracle cures.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
47. Jennifer recently installed a free media player for downloading music onto her
laptop. Without her knowledge, along with the media player, a software was
installed on her system which constantly tracked her online activities in addition
to the data saved on her laptop. Which of the following was most likely
downloaded without Jennifer's knowledge?
A. Adware
B. Spyware
C. Firmware
D. Cookie
A. Antivirus software
B. Adware
C. Spyware
D. AdSense
Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. Adware is a
type of Trojan horse software. It is software that you do not want hidden inside
software you do want.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
49. _____ refers to malicious software that collects information about a person and
his/her computer and reports it to someone without their permission.
A. Firmware
B. Spyware
C. Adware
D. Spam
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
50. Spyware is also known as ____.
A. adware
B. malware
C. stealthware
D. firmware
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
51. A _____ consists of one line of information for every visitor to a Web site and is
usually stored on a Web server.
A. Web log
B. firewall
C. cookie
D. copyright
A Web log consists of one line of information for every visitor to a Web site and
is usually stored on a Web server. Even without spyware, a Web site can tell a lot
about its Web visitors from its Web log.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
52. A _____ records information about you during a Web surfing session such as
what Web sites you visited, how long you were there, what ads you looked at,
and what you bought.
A. copyright
B. key logger
C. firewall
D. clickstream
A clickstream records information about you during a Web surfing session such
as what Web sites you visited, how long you were there, what ads you looked at,
and what you bought.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
53. The _____ allows law enforcement to get access to almost any information,
including library records, video rentals, bookstore purchases, and business
records when investigating any act of terrorism or hostile intelligence activities.
B. Sarbanes-Oxley Act
C. CAN-Spam Act
The USA Patriot Act of 2001 and 2003 allows law enforcement to get access to
almost any information, including library records, video rentals, bookstore
purchases, and business records when investigating any act of terrorism or
hostile intelligence activities. In 2003 Patriot II broadened the original law.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
54. The _____ sought to protect investors by improving the accuracy and reliability
of corporate disclosures and requires companies to implement extensive and
detailed policies to prevent illegal activity within the company and respond in a
timely manner to investigate illegal activity.
C. Sarbanes-Oxley Act
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
55. The _____ provided new authority to government agencies to mine data on
individuals and groups including e-mails and Web site visits, and put limits on
the information available under the Freedom of Information Act.
A. CAN-Spam Act
B. Sarbanes-Oxley Act
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
56. The _____ sought to regulate interstate commerce by imposing limitations and
penalties on businesses sending unsolicited e-mail to consumers.
D. CAN-Spam Act
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
57. _____ are types of hackers who break into other people's computer systems and
may just look around. They may steal credit card numbers or destroy
information, or otherwise do damage.
A. Zombies
B. White-hat hackers
C. Black-hat hackers
D. Drones
Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Black-hat
hackers break into other people's computer systems and may just look around,
or they may steal credit card numbers or destroy information, or otherwise do
damage.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
58. _____ have philosophical and political reasons for breaking into systems and
often deface Web sites as a sign of protest.
A. Zombies
B. White-hat hackers
C. Hacktivists
D. Screenagers
Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Hacktivists have
philosophical and political reasons for breaking into systems. They often deface
a Web site as a protest.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security
59. A _____ floods a server or network with so many requests for service that it slows
down or crashes.
A. rootkit
B. denial-of-service attack
C. wiki
D. Trojan horse
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
60. A(n) ______ is hardware and/or software that protects a computer or a network
from intruders.
A. Web log
B. worm
C. firewall
D. public key
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
61. _____ refers to the use of physiological characteristics such as fingerprints, the
blood vessels in the iris of the eye, and the sound of one's voice to provide
identification.
A. Pharming
B. Biometrics
C. Intellectual property
D. Whaling
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
62. _____ is a way of protecting messages and files by scrambling the contents of a
file so that one cannot read it without having the right key.
A. Encryption
B. Feature creep
C. Biometrics
D. Encapsulation
Encryption scrambles the contents of a file so that you cannot read it without
having the right decryption key. There are various ways of encrypting messages.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
FALSE
Even the most ethical people must face the nearly inevitable dilemmas involving
choices between incompatible good outcomes and conflicting loyalties. An
ethical dilemma is not the choice of whether or not to be ethical. An ethical
dilemma is when one's responsibilities seem to lead in opposite directions.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
64. Intellectual property is defined as the principles and standards that guide our
behavior toward other people.
FALSE
Ethics can be defined as the principles and standards that guide our behavior
toward other people. One might add that ethics is also about the reasons we
give for thinking we ought to live one way rather than another, make one
decision rather than another, or opt for one policy over another.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
65. A factor that affects how one makes a decision when faced with an ethical
dilemma is one's basic ethical structure, which develops as one grows up.
TRUE
Two factors affect how one makes a decision when one is faced with an ethical
dilemma. The first is one's basic ethical structure, which develops as one grows
up. The second is the set of practical circumstances inevitably involved in the
decision that one is trying to make.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
66. Intellectual property refers to tangible creative work that is embodied in non-
physical form.
FALSE
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
FALSE
Copyright law does not forbid the use of intellectual property completely. It has
some notable exceptions. For example, a TV program could show a video game
that a person developed without his/her permission. This would be an example
of the use of copyrighted material for the creation of new material, i.e., the TV
program. This is legal because it falls under the Fair Use Doctrine.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
68. In the United States, making a copy of copyrighted software for backup
purposes amounts to software piracy.
FALSE
It is illegal to copy copyrighted software. But there's one exception to that rule:
In the United States, you may always make one copy of copyrighted software for
backup purposes.
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 2 Medium
Topic: Ethics
69. In order to monitor computer use, screen capture programs can be used to
capture every single screen that a user views.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
70. Log analysis is a monitoring tool that keeps track of logons, deletions, and so
forth.
TRUE
Tools for monitoring include packet sniffers that examine the information
passing by on switches, hubs, or routers, and log analysis tools that keep track
of logons, deletions, and so forth.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
71. Identity theft is often for financial gain, and the stolen identity is used to apply
for and use credit cards in the victim's name or to apply for loans.
TRUE
Identity theft is the forging of someone's identity for the purpose of fraud. The
fraud is often for financial gain, and the stolen identity is used to apply for and
use credit cards in the victim's name or to apply for loans. But it can also be
simply to disguise a real identity, particularly if the thief is hiding from law
enforcement or is running some sort of scam.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
72. Phishing is a technique which delays incoming e-mail messages for a long
period of time to defend one's computer against viruses and worms.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
73. Key logging refers to the rerouting of a person's request for a legitimate Web
site to a fake site which then collects information from the person.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
74. Pharming is accomplished by getting access to the giant databases that Internet
providers use to route Web traffic.
TRUE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
75. A reason that companies monitor employees' e-mail is that they can be sued for
what their employees send to each other and to people outside the company.
TRUE
After you're hired, your employer can monitor where you go, what you do, what
you say, and what you write in e-mails—at least during working hours. One
reason that companies monitor employees' e-mail is that they can be sued for
what their employees send to each other and to people outside the company.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
76. A hardware key logger cannot capture backspaces and deletions.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
77. A unique cookie is one that started out as a common cookie, but the original
site sold access to it to a third party.
FALSE
A cookie can be used to track your Web activity. It can monitor and record what
sites you visit, how long you stay there, what Web pages you visited, what site
you came from and the next site you went to. This type of cookie is called a
unique cookie. A common cookie on the other hand, is one that started out as a
unique cookie, but the original site sold access to it to a third party that can
then change the cookie so that the third party can track the surfer's activity
across many sites.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
78. One way to block cookies is to set one's browser to accept or reject all cookies.
TRUE
There are two ways to block cookies. First, one can set the browser to accept or
reject all cookies. Second, one can get cookie management software with
additional options that are not available on one's browser.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
TRUE
A person can get spam filters to block out spam, but spammers are clever about
including nonprinting characters in their subject lines and addresses that fool
the filters into letting them pass.
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
80. The CAN-Spam Act is an anti-spam law passed by the Federal Government
which bans spamming entirely.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
81. Adware is software to generate ads that installs itself on your computer when
you download some other program from the Web.
TRUE
Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. It is a type of
Trojan horse software.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
82. Spyware is a kind of software that blocks malicious software from entering one's
computer.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
83. Without spyware, a Web site cannot tell a lot about its Web visitors.
FALSE
Even without spyware, a Web site can tell a lot about its Web visitors from its
Web log. A Web log consists of one line of information for every visitor to a
Web site and is usually stored on a Web server.
AACSB: Ethics
AACSB: Technology
Blooms: Understand
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
84. Anonymous Web browsing (AWB) services help in hiding a person's identity
from the Web sites one visits.
TRUE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
85. The Homeland Security Act of 2002 sought to protect investors by improving
the accuracy and reliability of corporate disclosures.
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 2 Medium
Topic: Privacy
86. Hackers who have a philosophical or political message that they want to share
are called hacktivists.
TRUE
Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives and some just
do it for the fun of it. Others, known as hacktivists, have a philosophical or
political message that they want to share.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
87. Black-hat hackers are known as the "good guys" who test the vulnerability of
systems so that protective measures may be taken.
FALSE
Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives and some just
do it for the fun of it. There are also "good guys," called white-hat hackers, who
test the vulnerability of systems so that protective measures may be taken.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security
88. A virus is software that is written with malicious intent to cause annoyance or
damage.
TRUE
A computer virus, also known as a virus, is software that is written with malicious
intent to cause annoyance or damage. It can be benign or malicious.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
89. Benign viruses are the worst kinds of viruses as they have the capacity to
damage computers.
FALSE
A virus can be benign or malicious. The benign ones just display a message on
the screen or slow the computer down, but do not do any damage.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
90. Script kiddies work at the request of the owners of computer systems, find
vulnerabilities in systems, and plug the holes.
FALSE
Script kiddies, or script bunnies, find hacking code on the Internet and click-
and-point their way into systems, to cause damage or spread viruses.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 2 Medium
Topic: Security
TRUE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
FALSE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
93. A drawback of spam protection is that it may mark something as spam when it
is not.
TRUE
Spam protection is good to have, although it may let some spam through and
may mark something as spam when it is not.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
TRUE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
TRUE
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
ethical dilemma
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
97. _____ are the principles and standards that guide our behavior toward other
people.
Ethics
Ethics can be defined as the principles and standards that guide our behavior
toward other people. One might add that ethics is also about the reasons we
give for thinking we ought to live one way rather than another, make one
decision rather than another, or opt for one policy over another.
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
98. The _____ level of an individual's ethical structure consists of actions that are
serious ethical violations.
innermost
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-01 Define ethics and describe the two factors that affect how you make a decision concerning an ethical
issue.
Level of Difficulty: 1 Easy
Topic: Ethics
99. _____ refers to intangible creative work that is embodied in physical form.
Intellectual property
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
100. _____ refers to the legal protection afforded to the expression of an idea, such as
a song, video game, and some types of proprietary documents.
Copyright
AACSB: Ethics
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
101. The _____ states that one may use copyrighted material in certain situations but
places a limit on the amount of the copyrighted material that one may use.
The Fair Use Doctrine states that one may use copyrighted material in certain
situations but puts a limit on the amount of the copyrighted material that one
may use.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
Pirated software
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-02 Define and describe intellectual property; copyright; Fair Use Doctrine; and pirated software.
Level of Difficulty: 1 Easy
Topic: Ethics
103. _____ refers to the right to be left alone when one wants to be, to have control
over one's own personal possessions, and not to be observed without one's
consent.
Privacy
Privacy is the right to be left alone when you want to be, to have control over
your own personal possessions, and not to be observed without your consent. It
is the right to be free of unwanted intrusion into your private life.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
104. _____ is a program that, when installed on a computer, records every keystroke
and mouse click.
Key logger
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
105. _____ refers to the forging of someone's identity for the purpose of fraud.
Identity theft
Identity theft is the forging of someone's identity for the purpose of fraud. The
fraud is often for financial gain, and the stolen identity is used to apply for and
use credit cards in the victim's name or to apply for loans.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
carding/brand spoofing
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
Whaling
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
108. A(n) _____ is a hardware device that captures keystrokes on their journey from
the keyboard to the motherboard.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
109. A(n) _____ is a small file that contains information about you and your Web
activities, which a Web site you visit places on your computer.
cookie
The basic tool of consumer Web monitoring is the cookie. A cookie is a small file
that contains information about a person and their Web activities, which a Web
site the person visits places on their computer.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
110. A(n) _____ is a cookie that started out as a unique cookie, but the original site
sold access to it to a third party, that can then change the cookie so that the
third party can track the surfer's activity across many sites.
common cookie
A common cookie is a cookie that started out as a unique cookie, but the
original site sold access to it to a third party, that can then change the cookie so
that the third party can track the surfer's activity across many sites. The third
party collects information about surfers without names or other identifiable
personal information.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
111. _____ is unsolicited e-mail from businesses that advertise goods and services.
Spam
Spam is unsolicited e-mail (electronic junk mail) from businesses that advertise
goods and services. Often spam mass mailings advertise pornography, get-rich-
quick schemes, and miracle cures.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
112. _____ is software to generate advertisements that installs itself on a person's
computer when they download some other program from the Web.
Adware
Adware is software to generate ads that installs itself on your computer when
you download some other (usually free) program from the Web. For instance,
when a person downloads a game or other software from the Web for free, they
may notice that it came with banner ads. These ads are collectively known as
adware.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
113. _____ is malicious software that collects information about a person and their
computer and reports it to someone without their permission.
Spyware
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
114. A(n) _____ consists of one line of information for every visitor to a Web site and
is usually stored on a Web server.
Web log
A Web log consists of one line of information for every visitor to a Web site and
is usually stored on a Web server. At the very least, a Web log can provide a
Web site company with a record of your clickstream.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
115. A(n) _____ records information about a person during a Web surfing session
such as what Web sites the person visited, how long they were there, what ads
they looked at, and what they purchased.
clickstream
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
116. In addition to cookie management software, a person can use _____ services to
hide their identity from the Web sites they visit.
Apart from cookie management software, one can avail anonymous Web
browsing (AWB) services, which, in effect, hide a person's identity from the Web
sites they visit.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
117. The _____ allows law enforcement to get access to almost any information,
including library records, video rentals, bookstore purchases, and business
records when investigating any act of terrorism or hostile intelligence activities.
The USA Patriot Act, 2001 and 2003, allows law enforcement to get access to
almost any information, including library records, video rentals, bookstore
purchases, and business records when investigating any act of terrorism or
hostile intelligence activities. In 2003, Patriot II broadened the original law.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
118. The _____ sought to regulate interstate commerce by imposing limitations and
penalties on businesses sending unsolicited e-mail to consumers.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-03 Define privacy and describe ways in which it can be threatened.
Level of Difficulty: 1 Easy
Topic: Privacy
119. _____ are knowledgeable computer users who use their knowledge to invade
other people's computers and have varying motives behind their actions.
Hackers
Hackers are generally knowledgeable computer users who use their knowledge
to invade other people's computers. They have varying motives. Some just do it
for the fun of it.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
120. A(n) _____ is a type of virus that spreads itself, not just from file to file, but from
computer to computer via e-mail and other Internet traffic.
worm
A worm is a type of virus that spreads itself, not just from file to file, but from
computer to computer via e-mail and other Internet traffic. It finds your e-mail
address book and helps itself to the addresses and sends itself to your contacts,
using your e-mail address as the return address.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
121. Of the various types of hackers, _____ have philosophical and political reasons
for breaking into systems. They often deface a Web site as a protest.
hacktivists
Hacktivists have philosophical and political reasons for breaking into systems.
They often deface a Web site as a protest.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
122. _____ break into other people's computer systems and may just look around, or
they may steal credit card numbers or destroy information, or otherwise do
damage.
Black-hat hackers
Black-hat hackers break into other people's computer systems and may just look
around, or they may steal credit card numbers or destroy information, or
otherwise do damage.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
123. A(n) _____ floods a server or network with so many requests for service that it
slows down or crashes.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
124. A(n) _____ is hardware and/or software that protects a computer or network
from intruders.
firewall
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
125. _____ is the use of physiological characteristics such as fingerprints, the blood
vessels in the iris of the eye, the sound of a person's voice, or perhaps even
breath, to provide identification.
Biometrics
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security
126. _____ scrambles the contents of a file so that you cannot read it without having
the right decryption key.
Encryption
Encryption scrambles the contents of a file so that you cannot read it without
having the right decryption key. There are various ways of encrypting messages.
You can switch the order of the characters, replace characters with other
characters, or insert or remove characters.
AACSB: Ethics
AACSB: Technology
Blooms: Remember
Learning Objective: 08-04 Describe the ways in which information on your computer or network is vulnerable and list measures
you can take to protect it.
Level of Difficulty: 1 Easy
Topic: Security