Lesson 31: Computer Ethics and Safety Flashcards

1
Q

Used to protect against unwanted access or use to or form a network

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For your personal computer. It should not contain personal information such as a name or birthdate

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Require more information than a password to authenticate your identity

A

Two-Step Verifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to block content coming into and going out to the Internet

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Used to block content coming into and going out to the Internet

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to any software that is designed to cause damage to a single computer, server, or computer network

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program that had been written to corrupt data on a computer; attached to a file and spreads from file to file when program is executed

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Makes many copies of itself, so that computer slows down or halts tasks

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does not cause damage until a specified date or until the system has been launched a certain number of times

A

Time Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Triggered by the appearance or disappearance of specified data

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does something different from what is expected to do; performs one task but is actually doing another task

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious program that records keystrokes; aids identity theft

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fraudulently installed on a personal computer to collect information about the user

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asksa link in the email to update personal info

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asks a link in the email to update personal info

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Before providing personal info in an e-commerce site, first verify if the site is secure

A

E-Commerce Safety

17
Q

E-commerce websites usually use _________ _____________ to make them secure

A

Encrypted Communication

18
Q

Before you make a financial transaction, you need to confirm that you have a secure and encrypted connection

A

E-Commerce Safety

19
Q

TLS

A

Transport Layer Security

20
Q

SSL

A

Secure Sockets Layer

21
Q

Technology encrypt sensitive information and authenticate servers and clients to ensure a secure connection

A

TLS and SSL

22
Q

___ and ___ use public key encryption to authenticate the server to the client

A

TLS and SSL

23
Q

Encrypts information

A

Public Key

24
Q

Deciphers the information

A

Private Key

25
Q

An electronic document that verifies the identity of a person or company and confirms that they own a public key

A

Digital Certificate

26
Q

Use certificate authorities to confirm that the certificate comes from a trusted party

A

Digital Certificate: TLS and SSL

27
Q

A small text file that a Web site’s server puts on your computer to store information about you and your preferences

A

Cookie

28
Q

The suppression of Web content that is considered offensive or a threat to security

A

Internet Censorship

29
Q

___ __________ censors the content published on the Web to protect citizens and businesses

A

The Government

30
Q

An unlawful reproduction and/or distribution of any copyrighted digital files including videos, music, e-books, and software; is stealing

A

Software Piracy

31
Q

Belongs to the public, so the software licensing has no restrictions

A

Public Domain Software

32
Q

Allows you to download and use the software at no cost, or for a voluntary fee; usually allows unlimited copying and distribution but for bids any changes to the program

A

Freeware

33
Q

Initially available for a free trial for a specified period of time; generally requires that users pay a fee for continued use

A

Shareware

34
Q

The source code is available free of charge to the general public for use and/or modification

A

Open Source

35
Q

Provide remote access to software applications hosted on the Internet

A

Software as a Service and Application Service Provider (SaaS) and (ASP)

36
Q

Normally restrict usage and require you to register and login with a username and a password

A

Software as a Service and Application Service Provider (SaaS) and (ASP)