You are on page 1of 2

any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering the

computer. NIOSE
A(n) ____ occurs when the electrical supply or voltage drops, often defined as more than five
percent, below the normal volts UNDERVOLTAGE

Perpetrators of back doors trick their victims into interacting with phony websites.FALSE

A surge protector absorbs small overvoltages — generally without damage to the


computer or equipment. TRUE

In the case of system failure or the discovery of corrupted files, what do users do to the
backed-up files when they bring the files to their original location on a computer?
RESTORE

• Although eyestrain associated with CVS (computer vision syndrome) is not thought to
be disruptive or unpleasant, it has serious long-term consequences. FALSE

Many businesses use which of the following to limit employees' web access? Content
Filtering

To remove spyware, users need to obtain a special program that can detect and delete
it. TRUE

A ______is someone who uses e-mail as a vehicle for extortion. Cyberextortionist

A ___ scans for programs that attempt to modify the boot program, the OS, and other programs
that are normally read but not modified. FALSE

Personal firewalls constantly monitor all transmissions to and from a computer and may
inform a user of any attempted intrusion. t/f TRUE

some security systems for notebook computers shut down the computer and sound an
alarm if the computer moves outside a specified distance TRUE

an online ups switches to battery power when a problem occurs in a power line
FALSE

T/F Some operating systems and email programs allow you to encrypt the contents of
files and messages that are stored on your computer. TRUE
The 1986 _____ provides the same protection that covers mail and telephone
communications to electronic communications such as voice mail. ECPA

The use of computers to observe, record, and review an employee's use of a computer,
including communications such as email messages, keyboarding activity, and websites
visited? MONITORING

____ is the process of restricting access to certain material on the Web.


FILTERING

an injury or disorder of the muscles, nerves, tendons, ligaments, and joints


RSI

It is illegal for employers to use software programs that monitor employees.


FALSE

You might also like