Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A...
-
Upload
marianna-lewis -
Category
Documents
-
view
218 -
download
0
Transcript of Ch15QQ 1.Hardware theft includes the theft of portable computers as well as desktop computers. 2.A...
Ch15QQ1. Hardware theft includes the theft of portable computers as well
as desktop computers. 2. A surge suppressor can be used to protect a computer against
theft. 3. A good disaster-recovery plan includes information about where
backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of
people you write frequently.
Ch15QQ__ 6. Which of the following allows your computer to be used when the
power goes out?a. UPSb. encryptionc. cable lock d. surge protector
e. computer tracking software __ 7. Having control over how information about you is collected and used is
referred to as:a. presence technology b. employee monitoring c. opting out
d. privacy policye. information privacy
Ch15QQa. privacy policyb. software piracy c. backup d. throw-away e-mail addresse. digital counterfeiting
__ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or
damaged. __ 10. The unauthorized copying of a computer program.