Issues in Computing

Dec 6th, 2015
KateS
Category:
Engineering
Price: $10 USD

Question description

Issues in Computing Unit

Available now. Due 12/06/2015 11:59 PM EST

OLI quizzes are based entirely on material in the OLI module content, not on external resources or personal experience.

Question 1

Select one answer. 

10 points

Where would you expect to find the following statement?

“I shall be willing to share my knowledge and expertise with others and always act in such a way that reflects favorably on my profession.”

Question 2

Select one answer. 

10 points

How is “compromise” defined in the context of information technology and information security?

Question 3

Select one answer. 

10 points

Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?

Question 4

Select one answer. 

10 points

Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?

Question 5

Fill in the blanks by selecting one option from each menu. 

: 10 points

: 10 points

: 10 points

30 points

Which of the following would be considered purposes of the Digital Millennium Copyright Act? Select Yes or No for each option.

To discourage internet service providers from allowing file transfers

To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software

To provide scenarios that define when it is legal to copy and sell copyrighted software

Question 6

Select one answer. 

10 points

Would the following behavior most likely be a violation of an employee code of conduct?

Using your work computer to invite friends and co-workers to a party at your home.

Question 7

Fill in the blanks by selecting one option from each menu. 

: 10 points

: 10 points

: 10 points

30 points

You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario? Select Yes or No for each option.

The confidentiality of the data

The integrity of the data

The accessibility of the data

Question 8

Fill in the blanks by selecting one option from each menu. 

10 points

Unsolicited e-mail messages sent from advertisers or cyber criminals are.

Question 9

Select one answer. 

10 points

Which of the following is a sure sign that your computer is compromised?

Question 10

Fill in the blanks by selecting one option from each menu. 

: 10 points

: 10 points

: 10 points

30 points

Which of the following statements are true regarding PII? Select True or False for each option.

PII is information that uniquely identifies you in records that can be obtained online.

PII is always used to illegally gain access to your online records.

PII is safe because only you have this combination of name, social security number, and bank account, credit card numbers, or driver’s license number.

Question 11

Select one answer. 

10 points

Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.

Question 12

Select one answer. 

10 points

Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the middle of placing an online order when friends arrive and she stops her work to visit. What is her best (and most convenient) way to protect the PII that she has already entered (she has only logged onto a site with her ID and password and put some items in her basket for purchase)?

Question 13

Select one answer. 

10 points

Which of the following is the biggest risk of using social networking?

Question 14

Fill in the blanks by selecting one option from each menu. 

10 points

A user access agreement typically is  than the list of employee expected behaviors within an organization.


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UCLA
PREMIUM TUTOR

Studypool has helped 1,244,100 students

Summary
Quality
Communication
On Time
Value
Five Star Tutor
Feb 11th, 2017
" Outstanding Job!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1822 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors