chp 8 checkpoint - 3b. Information theft can occur 4a....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Checkpoint Review Multiple Choice 1. D 2. D 3. B 4. B 5. C 6. D 7. D 8. B 9. D 10. D 11. A 12. D 13. A 14. A Matching 1. H 2. J 3. K 4. B 5. C 6. D
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
7. F 8. G 9. L 10. E Short Answer 1a. An antivirus program detects viruses by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. 1b. A virus hoax is an e-mail message that warns users of a nonexistent virus 2a. Identification verifies that an individual is a valid user. Authentication verifies that the individual is the person he or she claims to be. 2b. user names and passwords, possessed objects, and biometric devices 3a. Product Activation, which is conducted either online or by telephone, users provide the software product’s 25-character identification number to receive an installation identification number unique to the computer on which the sofrtware is installed.
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 3b. Information theft can occur 4a. Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. 4b. Fill in only necessary information on rebate, warranty and registration forms, do not preprint your telephone number or social security number on personal checks, have an unlisted or unpublished telephone number, do not write your telephone number on charge or credit recipts, avoid shopping club and buyers cards 5a. Many businesses use content filtering in order to limit employees Web access. 5b. The rating system works by if the content on the web site goes beyond the rating limits set in the web browser software, a user cannot access the Web site....
View Full Document

Page1 / 3

chp 8 checkpoint - 3b. Information theft can occur 4a....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online