A) the assurance that messages and information are available only to those who are authorized to view them
B) policies and procedures that address the ethical use of computers and Internet usage in the business environment
C) the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
D) the principles and standards that guide our behavior toward other people
Correct Answer
verified
Multiple Choice
A) spyware
B) hacker
C) drive-by hacking
D) adware
Correct Answer
verified
Multiple Choice
A) opt out
B) website name stealing
C) Internet censorship
D) teergrubing
Correct Answer
verified
Multiple Choice
A) information privacy policy
B) acceptable use policy
C) internet use policy
D) ethical computer use policy
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) pharming
B) phishing
C) phishing expedition
D) vishing
Correct Answer
verified
Multiple Choice
A) informed; collaborate
B) consent; informed
C) informed; consent
D) consent; information
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 321 - 331 of 331
Related Exams