Capitulo 8 sistemas de inf gerencial

Solo disponible en BuenasTareas
  • Páginas : 13 (3227 palabras )
  • Descarga(s) : 0
  • Publicado : 6 de febrero de 2012
Leer documento completo
Vista previa del texto
Chapter 8
Protecting People and Information
True/False Questions
T F 1. Ethics are the principles and standards that guide our behavior toward other people.
Answer: True Level: Easy Page: 275
T F 2. Intellectual property is tangible creative work that is embodied in physical form.
Answer: False Level: Medium Page: 277
T F 3. Copyright is the legal protectionafforded an expression of an idea, such as a song, video
game, and some types of proprietary documents.
Answer: True Level: Easy Page: 277
T F 4. The Fair Use Doctrine says that you may not use copyrighted material in certain situations
— for example, in the creation of new work or, within certain limits, for teaching purposes.
Answer: False Level: Medium Page: 278
T F 5.Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted
software.
Answer: True Level: Easy Page: 279
T F 6. Counterfeit software is software that is manufactured to look like the real thing and sold as
such.
Answer: True Level: Easy Page: 279
T F 7. Privacy is the right to be left alone when you want to be, to have control over yourown
personal possessions, and not to be observed without your consent.
Answer: True Level: Easy Page: 279
T F 8. Key logger, or key trapper, software, is software that records sounds.
Answer: False Level: Medium Page: 280
T F 9. A hardware key logger is a hardware device that captures keystrokes on their journey from
the keyboard to the motherboarD)
Answer: TrueLevel: Easy Page: 284
154 Test Bank, Chapter 8 T F 10. A cookie is a small record deposited on your hard disk by a Web site containing
information about you and your Web activities.
Answer: True Level: Easy Page: 286
T F 11. Adware is software to generate ads that installs itself on your computer when you
download some other (usually free) program from the WeB)
Answer:True Level: Medium Page: 288
T F 12. A worm hides your identity from the Web sites you visit.
Answer: False Level: Medium Page: 299
T F 13. Spyware is software that comes hidden in free downloadable software and tracks your
online movements, mines the information stored on your computer, or uses your
computer's CPU and storage for some task you know nothing about.Answer: True Level: Medium Page: 288
T F 14. A Web log consists of one line of information for every visitor to a Web site and is usually
stored on a Web server.
Answer: True Level: Medium Page: 289
T F 15. A clickstream records information about you during a Web surfing session such as what
Web sites you visited, how long you were there, what ads you looked at, and whatyou
bought.
Answer: True Level: Easy Page: 289
T F 16. Anonymous Web browsing (AWB) service gives your identity to the Web sites you visit.
Answer: False Level: Easy Page: 289
T F 17. Safe-harbor principles are a set of rules to which U.S. businesses that want to trade with
Asia must adhere.
Answer: False Level: Medium Page: 291
T F 18. Grid computingharnesses far-flung computers together by way of the Internet or a virtual
private network to share CPU power, databases, and database storage.
Answer: True Level: Medium Page: 297
T F 19. Hackers are generally very knowledgeable computer users who use their knowledge to
invade other people's computers.
Answer: True Level: Easy Page: 298
Haag/Cummings, Information SystemsEssentials 155 T F 20. A worm is written with malicious intent to cause annoyance or damage.
Answer: False Level: Medium Page: 299
T F 21. A computer virus, as defined in this text, is an umbrella term.
Answer: False Level: Medium Page: 298
T F 22. Risk assessment consists of the identification of risks or threats, the implementation of
security measures, and the...
tracking img