Exam Questions Chapter 5 Structures for Strategy - Test Bank | Business Driven Tech 8e by Paige Baltzan by Paige Baltzan. DOCX document preview.
Business Driven Technology, 8e (Baltzan)
Chapter 5 Organizational Structures That Support Strategic Initiatives
1) Ethics and security are two fundamental building blocks for all organizations.
2) Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
3) Information governance is a method or system of government for information management or control.
4) Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
5) Digital rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
6) The Child Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
7) Counterfeit software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
8) Pirated software is software that is manufactured to look like the real thing and sold as such.
9) A patent is the legal protection afforded an expression of an idea, such as a song, book, or video game.
10) Intellectual property is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
11) Copyright is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
12) Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
13) Information management examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
14) Information compliance is the act of conforming, acquiescing, or yielding information.
15) Information property is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
16) Information secrecy is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
17) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
18) Information property is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
19) Spyware is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
20) The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
21) Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
22) Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
23) A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites.
24) Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
25) Smoking areas are targeted by hackers as they regularly use smoking entrances to enter the building where they pose as employees to gain access to the company network.
26) Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons.
27) Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
28) White-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
29) Black-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
30) Ransomware is a form of malicious software that infects your computer and asks for money.
31) Simplelocker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys.
32) A worm is a form of malicious software that infects your computer and asks for money.
33) A worm spreads itself not only from file to file but also from computer to computer.
34) Script-kiddies have criminal intent when hacking.
35) Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
36) White-hat hackers have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
37) Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
38) A worm spreads itself not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.
39) Backdoor programs change their form as they propagate.
40) Backdoor programs open a way into the network for future attacks.
41) Denial-of-service attack (DoS) floods a website with so many requests for service that it slows down or crashes the site.
42) Which of the following represents the two fundamental building blocks that protect organizational information?
A) Security and sales
B) Human resources and security
C) Ethics and security
D) Ethics and technology
43) What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
A) Privacy
B) Confidentiality
C) Intellectual property
D) Copyright
44) What is intangible creative work that is embodied in physical form and includes trademarks and patents?
A) Intellectual software
B) Intellectual property
C) Trademark property
D) Ethical property
45) Trust between companies, customers, partners, and suppliers is the support structure of which of the following?
A) Ebusiness
B) Eharmony
C) Esoftware
D) Epolicies
46) In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
A) Contentment
B) Ethical standard
C) Confidentiality
D) Firewall security
47) Which of the following key terms represents the principles and standards that guide our behavior toward other people?
A) Ethics
B) Intellectual property
C) Standards of living
D) Security
48) What is the difference between pirated and counterfeit software?
A) Counterfeit refers to fake technology products, whereas pirated refers to invisible technological cameras placed online.
B) Pirated refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas counterfeit refers to software that is manufactured to look like the real thing and sold as such.
C) Counterfeit refers to the unauthorized use, duplication, distribution, or sale of copyrighted software, whereas pirated refers to software manufactured to look like the real thing and sold as such.
D) Pirated refers to stolen software used to hack into a company's classified material, whereas counterfeit refers to a fake version of firewall software.
49) Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
A) Ethical information
B) Information technology
C) Information policies
D) Information ethics
50) Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and to not be observed without your consent?
A) Safety
B) Ethical standard
C) Privacy
D) Confidentiality
51) Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________.
A) Legal and confidential
B) Legal and ethical
C) Legal and technical
D) Confidential and open
52) What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A) Digital rights management
B) Counterfeit software
C) Privacy
D) Pirated software
53) Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
A) Information code
B) Information technology
C) Information management
D) Information governance
54) Emily Kent works as a computer programmer for a software company. Her boss, Sam Anderson, is responsible for developing a new software game for the Nintendo Switch. After completion of the project, Sam gives all of the team members a free copy of the game without consent from the company. Emily is a little hesitant and unsure about accepting the game because legally it would be considered ________.
A) Counterfeit software
B) Pirated software
C) Ethical software
D) Governance software
55) What is the method or system of government for information management or control?
A) Information management
B) Information compliance
C) Information governance
D) Information secrecy
56) What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
A) Information management
B) Information compliance
C) Information secrecy
D) Information ethics
57) Which of the following represents the definition of information property?
A) An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organizational resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
58) Which of the following represents the definition of information governance?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
59) Which of the below represents the definition of information secrecy?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The regulation of the definitions, uses, values, and distribution of the organization's resource of information to ensure that the organization has the types of data/information required to function and grow effectively
60) Which of the below represents the definition of information management?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) The protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The examination of an organization's resource of information and the regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
61) Which of the below represents the definition of information compliance?
A) The act of conforming, acquiescing, or yielding information
B) A method or system of government for information management or control
C) Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
D) The organization's resource of information and regulation of its definitions, uses, values, and distribution to ensure that the organization has the types of data/information required to function and grow effectively
62) Which of the following represents the definition of information compliance?
A) The act of conforming, acquiescing, or yielding information
B) The ability to comply with software
C) The understanding of technology
D) The verbalization of information governance in a company's policies and procedures
63) Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
A) Confidentiality
B) Digital information
C) Privacy policies
D) Information ethics
64) Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
A) Eauthorization
B) Emanagement
C) Ediscovery
D) Epolicies
65) In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
A) Employees copying and distributing company-owned software
B) Employees searching other employee's private information without consent
C) Employees intentionally creating or spreading viruses to confuse IT
D) All of these
66) As the president of a local trade company, Lisa is faced with leadership, ethical, and operational decisions on a daily basis. Lisa's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution to ensure the company has the types of information required to function and grow effectively. What is Lisa overseeing for the company?
A) Information codes
B) Information management
C) Information deployment
D) Information security
67) When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
A) Quadrant IV
B) Quadrant II and III
C) Quadrant I
D) Quadrant III
68) Which of the following is included in the four quadrants of ethical and legal behavior?
A) Legal behavior and ethical behavior
B) Illegal behavior and ethical behavior
C) Legal behavior and unethical behavior
D) All of the choices are correct
69) What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
A) Ethics
B) Intellectual property
C) Privacy
D) Confidentiality
70) Which of the following describes privacy?
A) The assurance that messages and data are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
71) Which of the following is an example of acting ethically?
A) Individuals copy, use, and distribute software
B) Employees search organizational databases for sensitive corporate and personal information
C) Individuals hack into computer systems to steal proprietary information
D) None of these offers an example of acting ethically
72) Which of the following describes confidentiality?
A) The assurance that messages and information are available only to those who are authorized to view them
B) Policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent
D) The principles and standards that guide our behavior toward other people
73) What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
74) What was passed to protect minors from accessing inappropriate material on the Internet?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
75) What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
76) What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A) Ediscovery
B) Child Online Protection Act
C) Digital rights management
D) Pirated software
77) What is ediscovery?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
78) What is the Child Online Protection Act?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
79) What is digital rights management?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) Law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
80) What is pirated software?
A) The unauthorized use, duplication, distribution, or sale of copyrighted software
B) The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
C) A law passed to protect minors from accessing inappropriate material on the Internet
D) A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
81) Which of the following refers to a period of time when a system is unavailable?
A) Downtime
B) MIS down
C) Direct data loss
D) Downtown
82) Which of the following is not an example of unplanned system downtime?
A) Power outages
B) Tornadoes
C) A system upgrade
D) Network failure
83) Which of the following is a cost of downtime in addition to lost revenue?
A) Legal expenses
B) Loss in financial performance
C) Damage to reputation
D) All of these
84) A company should be able to calculate the cost of downtime by which of the following?
A) Per hour, per day, and per week
B) Per employee, per computer, and per company
C) Per stock, per stockholder, and per investment capital
D) None of these
85) Which category of the cost of downtime includes equipment rental, overtime costs, and travel expenses?
A) Fiscal responsibility
B) Damaged reputation
C) Other expenses
D) Regeneration quadrant
86) Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to break into the computer system of one of Cyber Protect's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Matt?
A) Cracker
B) White-hat hacker
C) Script bunnies
D) Black-hat hacker
87) Which of the following defines information security?
A) A broad term encompassing the protection of information
B) Protection of information from accidental misuse
C) Protection of information from intentional misuse
D) All of these
88) What are experts in technology who use their knowledge to break into computers and networks for profit or just as a challenge known as?
A) Elevation of privilege
B) Virus
C) Hacker
D) Worm
89) What is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information?
A) Script kiddies
B) Black-hat hacker
C) White-hat hacker
D) Cracker
90) Which of the following is the correct list of the six different types of hackers listed in your text?
A) Black-hat, cracker, cyberterrorist, hactivist, script kiddies, and white-hat hackers
B) Black-top, cookie, script kids, environment, Web 3.0, and white-top hackers
C) Black-hat, script kiddies, script bats, spider crawlers, Ad spiders, and white-hat hackers
D) None of these
91) What is software written with malicious intent to cause annoyance or damage?
A) Elevation of privilege
B) Spoofing
C) Sniffer
D) Virus
92) What includes a variety of threats such as viruses, worms, and Trojan horses?
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
93) What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
A) Malicious code
B) Hoaxes
C) Spoofing
D) Sniffer
94) What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
A) Sniffer
B) Spyware
C) Spoofware
D) Splog
95) What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys?
A) Sniffer
B) Spyware
C) Spoofware
D) Simplelocker
96) What is a form of malicious software that infects your computer and asks for money?
A) Sniffer
B) Spyware
C) Spoofware
D) Ransomware
97) What is ransomware?
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
98) What is Simplelocker?
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
99) What is adware?
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
100) What is spyware?
A) A form of malicious software that infects your computer and asks for money
B) A new ransomware program that encrypts your personal files and demands payment for the file's decryption keys
C) Software that allows Internet advertisers to display advertisements without the consent of the computer user
D) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
101) What is the primary difference between a worm and a virus?
A) A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer
B) A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites
C) A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer
D) All of these
102) What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
A) Elevation of privilege
B) Packet tampering
C) Spoofing
D) Spyware
103) A DDoS stands for one of the common forms of viruses that attack multiple computers to flood a website until it slows or crashes. What does DDoS stand for?
A) Data distribution of systems attack
B) Data denial-of-software attack
C) Distributed data online systems attack
D) Distributed denial-of-service attack
104) Which of the following are all common forms of viruses?
A) Packet tampering, worms, cakes, and Trojan viruses
B) Polymorphic, sniffer, splogs, and denial-of-service viruses
C) Backdoor program, worm, Trojan-horse viruses
D) All of these
105) What is the software called that allows Internet advertisers to display advertisements without the consent of the computer user?
A) Sploging
B) Adware
C) Spygloss
D) CPU buzzer
106) Who are hackers with criminal intent?
A) Crackers
B) Black-hat hacker
C) Hoaxes
D) Cyberterrorists
107) Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
A) White-hat hacker
B) Black-hat hacker
C) Cyberterrorists
D) Script bunnies
108) Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?
A) Polymorphic virus
B) Worm
C) Trojan-horse virus
D) Backdoor programs
109) What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?
A) Virus
B) White-hat hackers
C) Dumpster diving
D) All of these
110) Which of the following changes its form as it propagates?
A) Backdoor programs
B) Strikers
C) Polymorphic viruses and worms
D) Splogs
111) Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
A) Backdoor programs
B) Drive-by Hacking
C) Polymorphic viruses and worms
D) Hacker
112) What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
A) Information security
B) Physical security
C) Drive-by hacking
D) Adware
113) Who are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?
A) Information spy
B) Hacker
C) Spyware
D) Adware
114) What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
115) What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
116) What is software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user?
A) Spyware
B) Hacker
C) Drive-by hacking
D) Adware
117) What is spyware?
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
118) What is adware?
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge.
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user.
119) What is drive-by hacking?
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
120) What is a hacker?
A) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
B) Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
121) What is information security?
A) A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
B) A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
C) A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
D) Software that while purporting to serve some useful function and often fulfilling that function also allows Internet advertisers to display advertisements without the consent of the computer user
122) What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
123) What is software that is intended to damage or disable computers and computer systems?
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
124) What is a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
125) What is a form of malicious software that infects your computer and asks for money?
A) Bug bounty program.
B) Malware.
C) Scareware.
D) Ransomware.
126) What is a bug bounty program?
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
127) What is malware?
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
128) What is scareware?
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
129) What is ransomware?
A) A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.
B) Software that is intended to damage or disable computers and computer systems.
C) A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
D) A form of malicious software that infects your computer and asks for money.
130) Explain the ethical issues in the use of information technology.
131) Describe the relationship between ethics and privacy.
132) Describe the relationships and differences between hackers and viruses.
Document Information
Connected Book
Test Bank | Business Driven Tech 8e by Paige Baltzan
By Paige Baltzan
Explore recommendations drawn directly from what you're reading
Chapter 3 Competitive Strategy Plans
DOCX Ch. 3
Chapter 4 Measuring The Success Of Strategic Initiatives
DOCX Ch. 4
Chapter 5 Structures for Strategy
DOCX Ch. 5 Current
Chapter 6 Valuing And Storing Organizational Information—Databases
DOCX Ch. 6
Chapter 7 Accessing Organizational Information—Data Warehouses
DOCX Ch. 7