How will you decide which browser security settings to allow and which ones to block quizlet

Recommended textbook solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Munson, Young and Okiishi's Fundamentals of Fluid Mechanics

8th EditionAndrew L. Gerhart, John I. Hochstein, Philip M. Gerhart

1,344 solutions

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (45)

Chapter 6

.....

After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.

cyberbullying

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

A Trojan

How can an attacker execute malware through a script?

An attacker can attach a script to a program that you download which then infects your computer.

How can you protect a computer from electrical spikes and surges?

Use a surge protector.

How does encryption work?

It scrambles the information until the key is used to unscramble it.

How is a worm different from a Trojan?

A worm spreads through a network, whereas a Trojan hides inside another program.

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

In terms of privacy, which of the following is a best practice?

Keeping your Social Security number hidden in a locked box in your home

Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?

It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps.

Technology can lead to all of the following behavioral risks EXCEPT _____.

higher satisfaction with life

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

What is a digital certificate?

Technology used to verify a user's identity

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

What would a password manager allow you to do?

Create and store multiple strong passwords.

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

To protect your information and help you to remember passwords, use your social media account login information to log into another site.

False

Chapter 14

...

Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

Wikis can be heavily biased.

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

digital inclusion

Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

digital citizenship

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

digital detox

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

the digital divide

Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

Verify the content with an authoritative source.

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury

Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

Screen reader

Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

Digital rights management (DRM)

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

digital footprint

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

Acceptable use policy (AUP)

Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

Reset the old phone to factory settings.

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

a hoax

Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

People with color blindness

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette

When Hafsa writes a research paper for her psychology class, ________________ allow (s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.

the fair use doctrine

Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Remove the battery and throw it in the trash.

Which of the following problematic behaviors relies on the use of digital technology?

Cyberbullying

Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.

-Switch to a standing desk.
-Take frequent breaks.

A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.

False

Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.

False

Students also viewed

Computer Concepts, Module 14

22 terms

study_bug23

Computer Concepts Module 14

22 terms

Pepepepepepepepepepo

ITE 115 Chapter 14

20 terms

focusonsuccess8Plus

CMIS

22 terms

an-dee

Other sets by this creator

Abnormal Psychology Chapter 4 Terms

34 terms

klaudiaklaudia0127

Abnormal Psychology Chapter 3 Terms

16 terms

klaudiaklaudia0127

Abnormal Psychology Chapter 2 Terms

33 terms

klaudiaklaudia0127

Abnormal Psychology Chapter 1 Terms

15 terms

klaudiaklaudia0127

Verified questions

biology

For each question, select the best answer from the four alternatives. Which of the following sets of materials consists of good electrical conductors? (a) copper, aluminum, nickel, (b) platinum, rubber, ebonite, (c) plastic, wood, paper, (d) porcelain, wax, carbon.

Verified answer

engineering

Transconductance indicates how effectively the input voltage controls the\ a. Voltage gain\ b. Input resistance\ c. Supply voltage\ d. Output current

Verified answer

chemistry

Calculate the probability of finding the electron in a shell $1.0 \mathrm{pm}$ thick at distances from the nucleus of $0.50 \mathrm{a}_1$ and $4 \mathrm{a}_{a-}$. Compare the results with the probabilities at $a_0$. Are these probabilities in accord with the surface density plot shown in Figure 6.12b?

Verified answer

health

Define the term bullying.

Verified answer

Recommended textbook solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Fundamentals of Engineering Economic Analysis

1st EditionDavid Besanko, Mark Shanley, Scott Schaefer

215 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Chemistry for Engineering Students

2nd EditionLawrence S. Brown, Thomas A. Holme

945 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Chemical Reaction Engineering

3rd EditionOctave Levenspiel

228 solutions

How will you decide which browser security settings to allow and which ones to block quizlet

Chemistry for Engineering Students

3rd EditionBrown

1,047 solutions

What is the process of ensuring that the person requesting access to a computer or other resources is not an imposter?

Authentication enables organizations to keep their networks secure by permitting only authenticated users or processes to gain access to their protected resources. This may include computer systems, networks, databases, websites and other network-based applications or services.

How can you protect personal information gathered?

6 Ways to Protect Your Personal Information Online.
Create strong passwords. ... .
Don't overshare on social media. ... .
Use free Wi-Fi with caution. ... .
Watch out for links and attachments. ... .
Check to see if the site is secure. ... .
Consider additional protection..

How can you protect a computer from electrical spikes and surges?

The most effective way to protect your computer from a power surge is to use a surge protector. Not to be confused with a power strip, a surge protector is a device with one or more outlets in which you plug electronic devices to protect them from power surges.

Why would you include a banner on your website quizlet?

Why would you include a banner on your website? It makes the website more easily identifiable to visitors. Which of the following specifies the format and appearance of page content on webpages? Nicholas updates his company's website to include a hyperlink to its event calendar on the homepage.