Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A...

3
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer against theft. 3. A good disaster-recovery plan includes information about where backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e- mail addresses of people you write frequently.

Transcript of Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A...

Page 1: Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A surge suppressor can be used to protect a computer against.

Ch15QQ1. Hardware theft includes the theft of portable computers as well

as desktop computers. 2. A surge suppressor can be used to protect a computer against

theft. 3. A good disaster-recovery plan includes information about where

backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of

people you write frequently.

Page 2: Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A surge suppressor can be used to protect a computer against.

Ch15QQ__ 6. Which of the following allows your computer to be used when the

power goes out?a. UPSb. encryptionc. cable lock d. surge protector

  e. computer tracking software __ 7. Having control over how information about you is collected and used is

referred to as:a. presence technology b. employee monitoring c. opting out

                d. privacy policye. information privacy

Page 3: Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A surge suppressor can be used to protect a computer against.

Ch15QQa. privacy policyb. software piracy  c. backup d. throw-away e-mail addresse. digital counterfeiting

__ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or

damaged. __ 10. The unauthorized copying of a computer program.