You are on page 1of 7

Technology Now Chapter 8

Safety and Security

TRUE/FALSE

1. A personal health risk that we may face as we use computers is RSIs.

ANS: T PTS: 1 REF: 8-2

2. Hactivists is the study of safe and efficient working environments.

ANS: F PTS: 1 REF: 8-3

3. When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.

ANS: F PTS: 1 REF: 8-4

4. A hoax involves throwing out “bait” in the form of an email or social media post, in the hopes that a
few users will respond.

ANS: F PTS: 1 REF: 8-6

5. An identity thief obtains ersonal information from various online and real-world sources.

ANS: T PTS: 1 REF: 8-10

6. Netiquette invloves humiliation, rumors, lies, taunts, or threats.

ANS: F PTS: 1 DIF: 8-11

7. It is possible to avoid being tracked through your browser when shopping online.

ANS: T PTS: 1 REF: 8-12

8. A username is a unique nine-diget number assigned to each individual in the United States.

ANS: F PTS: 1 REF: 8-13

9. A password is not a personal identification number.

ANS: T PTS: 1 REF: 8-13

10. Using personal features to indentify a person is biometrics.

ANS: T PTS: 1 REF: 8-14

11. Pharming is an illicit activity in which you are direted to a fake site to enter personal information.

ANS: T PTS: 1 REF: 8-15

12. To connect to the Internet in a home network, use a router.


ANS: T PTS: 1 REF: 8-15

13. Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people
and the environment is Energy Star computing.

ANS: F PTS: 1 REF: 8-16

14. The process of authentication is used to verify a user.

ANS: T PTS: 1 REF: 8-14

15. Strong passwords are typically three- to four-digit numbers.

ANS: F PTS: 1 REF: 8-13

16. Just about every site you visit stores a cookie in your computer’s browser.

ANS: T PTS: 1 REF: 8-12

17. Cyberbullying involves the same dynamics as other forms of violence.

ANS: F PTS: 1 REF: 8-11

18. Using your indentity, thievs usually commit financial fraud.

ANS: T PTS: 1 REF: 8-10

19. No legitimate company will ask you for email sign-in or personal information.

ANS: T PTS: 1 REF: 8-9

20. Service packs sensure that your data is scrambled as it travels between you and its Internet destination.

ANS: F PTS: 1 REF: 8-8

MODIFIED TRUE/FALSE

1. Internet addiction ithe excessive use of the Internet for gaming, video, Web surfing, etc.
_________________________

ANS: T PTS: 1 REF: 8-2

2. The study of safe and efficient working environments is ergonomics. _________________________

ANS: T PTS: 1 REF: 8-3

3. Magnetic hard drives have no moving partrs and are relatively stable. _________________________

ANS: F
Solid state
solid state

PTS: 1 REF: 8-3


4. The crime of hacking into and attacking networks is cybercrime. _________________________

ANS: T PTS: 1 REF: 8-4

5. The hacker community includes white hat and grey hat hackers. _________________________

ANS: F, black

PTS: 1 REF: 8-4

6. To provide battery backup during a short period, install an unterruptible power system.
_________________________

ANS: F, supply

PTS: 1 REF: 8-5

7. Rootkits collect bits of data, and can change your default home page. _________________________

ANS: F, Spyware

PTS: 1 REF: 8-6

8. A hoax can be an email that warns about a nonexistant virus in order to get you to click a link that
installs malware. _________________________

ANS: T PTS: 1 REF: 8-6

9. When someone taps into your unprotected Wi-Fi network, it is called Wi-Fi piggybacking.
_________________________

ANS: T PTS: 1 REF: 8-7

10. Fraud can have a long lasting effect on your credit score. _________________________

ANS: T PTS: 1 REF: 8-11

MULTIPLE CHOICE

1. RSIs or ____ are caused by performing the same movement over and over again.
a. repetitive strain immersion c. repetitive syndrome injuries
b. repetitive strain injuries d. repetitive stress injuries
ANS: B PTS: 1 REF: 8-2

2. Internet addiction is the excessive use of the Internet for all but which of the following?
a. video c. blogging
b. gaming d. none of the above
ANS: D PTS: 1 REF: 8-2

3. The study of safe and efficient working environments is ____?


a. ergonomics c. computer vision syndrome
b. white hat d. encryption
ANS: A PTS: 1 REF: 8-3

4. ____ hard drives are especially prone to failure.


a. Wireless c. Solid state
b. Cloud d. Magnetic
ANS: D PTS: 1 REF: 8-3

5. When a hard drive fails, Mac users see the ____.


a. Spinning Hand of Death c. Marble of Doom
b. Grey Fail Screen d. Blue Screen of Death
ANS: C PTS: 1 REF: 8-4

6. People who break into computers and networks are ____?


a. hackers c. worms
b. developers d. rootkits
ANS: A PTS: 1 REF: 8-4

7. Cloud storage systems have ____ at various online locations that provide additional protection.
a. hackers c. encryption
b. backups d. malware
ANS: B PTS: 1 REF: 8-5

8. The effects of a(n) ____ can include physical damage and a general disruption of regular activities.
a. spam c. war driving
b. phishing d. cyberattack
ANS: D PTS: 1 REF: 8-4

9. Make sure your ____ provider uses strong encryption-based security and has a secure physical
environment.
a. antivirus c. cloud
b. hotspot d. spam
ANS: C PTS: 1 REF: 8-5

10. Junk email, is also known as ____.


a. malware c. spyware
b. spam d. worm
ANS: B PTS: 1 REF: 8-5

11. Malware includes all but which of the following?


a. Trojan horse c. Virus
b. Spyware d. Spam
ANS: D PTS: 1 REF: 8-6

12. ___ spread by automatically sending themselves to everyone in your address book.
a. Worms c. Rootkits
b. Viruses d. Spyware
ANS: A PTS: 1 REF: 8-6

13. ____ can lurk undetected in your system, infect it, and spread when you distribute infected files.
a. Spyware c. Viruses
b. Trojan horse d. Worms
ANS: C PTS: 1 REF: 8-6

14. Areas in a wireless network where you can access the Internet are ____.
a. hotspots c. piggybacking
b. trojan horse d. war driving
ANS: A PTS: 1 REF: 8-7

15. When someone taps into your unprotected Wi-Fi network, it is called ____.
a. Wi-Fi war driving c. Wi-Fi hotspot
b. Wi-Fi piggybacking d. Wi-Fi firewall
ANS: B PTS: 1 REF: 8-7

16. Software protection includes all but which of the following?


a. Firewall c. Antispyware
b. Antivirus d. Hotspots
ANS: D PTS: 1 REF: 8-7

17. Software patches provided by the publisher to fix bugs and enhance performance are ____.
a. wireless packs c. encryption packs
b. service packs d. antivirus packs
ANS: B PTS: 1 REF: 8-8

18. The device that sends the signal to connect your wireless devices to the Internet is ____.
a. wireless router c. wireless software
b. wireless firewall d. none of the above
ANS: A PTS: 1 REF: 8-8

19. ____ ensures that your data is scrambled as it travels between you and its Internet destination.
a. Service packs c. Encryption
b. Firewall d. Passwords
ANS: C PTS: 1 REF: 8-8

20. A secure Web site has ____ at the beginning of the URL.
a. http:// c. ftp://
b. https:// d. hssp://
ANS: B PTS: 1 REF: 8-8

21. Cybercriminals take advantage of flaws in all but which of the following?
a. online banking c. shopping sites
b. email notifications d. wireless networks
ANS: B PTS: 1 REF: 8-9

22. A(n) ____ obtains personal information from various online and real-world sources.
a. rootkit c. ATM
b. identity thief d. electronic wallet
ANS: B PTS: 1 REF: 8-10

23. The numeric score that affectrs your future ability to obtain credit is your ____.
a. credit score c. identity
b. netiquette d. pin number
ANS: A PTS: 1 REF: 8-10

24. A set of online communication practices and rules is ____.


a. cyberstalking c. netiquette
b. cyberbullying d. guideline
ANS: C PTS: 1 REF: 8-11

25. School districts often develop policies and guidelines that address ____.
a. social media sharing c. cyberstalking
b. cyberbullying d. cookies
ANS: B PTS: 1 REF: 8-12

26. To avoid being tracked through your browser online, use all but which of the following modes?
a. Incognito c. ImHidden
b. InPrivate d. All of the above
ANS: C PTS: 1 REF: 8-12

27. A(n) ____ is a unique nine-digit number assigned to each individual in the United States.
a. PIN number c. password
b. Social Security number d. username
ANS: B PTS: 1 REF: 8-13

28. A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.
a. ID c. username
b. password d. none of the above
ANS: C PTS: 1 REF: 8-13

29. Which of the following does NOT pose a significant threat to your physical, employment, and
financial security?
a. cyberterrorists c. blogger
b. hackers d. spammers
ANS: C PTS: 1 REF: 8-13

30. A PIN or ____ is used to get into accounts through ATM.


a. personal information number c. personal information name
b. personal identification name d. personal identification number
ANS: D PTS: 1 REF: 8-13

31. A good example of a strong password is ____.


a. password1 c. EmilyMay1998
b. 12345 d. DumFDP076
ANS: D PTS: 1 REF: 8-14

32. A bad example of a strong password is ____.


a. Gatsby1129#45 c. Shekels5151$
b. 123RoverDog456 d. JenniferMarch1st1978
ANS: D PTS: 1 REF: 8-14

33. Biometric systems include all but which of the following?


a. fingerprint scanners c. facial recognition technology
b. hair scanners d. retinal scans
ANS: B PTS: 1 REF: 8-14

34. The process of ____ is used to verify a user.


a. authentication c. passwords
b. fingerprinting d. none of the above
ANS: A PTS: 1 REF: 8-14

35. Which of the following prives added security by requiring two distinct items for verification?
a. Two-factor authentication c. Two-factor verification
b. Two-step authentication d. All of the above
ANS: D PTS: 1 REF: 8-15

36. An illicit activity in which you are directed to a fake site to enter personal information is ____.
a. phishing c. pharming
b. routing d. all of the above
ANS: C PTS: 1 REF: 8-15

37. Discarded computers, cell phones, and other electronics are considered ____.
a. electronic trash c. e-trash
b. e-waste d. all of the above
ANS: D PTS: 1 REF: 8-15

38. ____, or environmentally friendly, computing and recycling can reduce the environmental impact of
electronic waszte and ultimately reduce costs.
a. Blue c. Yellow
b. Green d. None of the above
ANS: B PTS: 1 REF: 8-15

39. When conducting online transactions, use a ____ Web site.


a. firewalled c. unsecure
b. secure d. smart
ANS: B PTS: 1 REF: 8-8

40. On a secure Web site, a ____ icon may appear in the address bar.
a. bird c. star
b. padlock d. none of the above
ANS: B PTS: 1 REF: 8-8

You might also like