Who invented the movable-type printing press


Questions:

Question 1
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command

Question 2
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent

Question 3
__________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee

Question 4
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling

Question 5
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. "sneak peek"
C. brute-force
D. social engineering

Question 6
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.

Question 7
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.

Question 8
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above

Question 9
__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software

Question 10
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above

Question 11
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.

Question 12
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls

Question 13
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.

Question 14
A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan

Question 15
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.

Question 16
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.

Question 17
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android

Question 18
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.

Question 19
Futurist author Alvin Toffler describes three "waves of change." The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.

Question 20
Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring

Solution Preview :

Prepared by a verified Expert
Microeconomics: Who invented the movable-type printing press
Reference No:- TGS01864490

Now Priced at $25 (50% Discount)

Recommended (98%)

Rated (4.3/5)