Ch15QQ1. Hardware theft includes the theft of portable computers as well
as desktop computers. 2. A surge suppressor can be used to protect a computer against
theft. 3. A good disaster-recovery plan includes information about where
backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of
people you write frequently.
Ch15QQ__ 6. Which of the following allows your computer to be used when the
power goes out?a. UPSb. encryptionc. cable lock d. surge protector
e. computer tracking software __ 7. Having control over how information about you is collected and used is
referred to as:a. presence technology b. employee monitoring c. opting out
d. privacy policye. information privacy
Ch15QQa. privacy policyb. software piracy c. backup d. throw-away e-mail addresse. digital counterfeiting
__ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or
damaged. __ 10. The unauthorized copying of a computer program.
Top Related