Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

1
The rapid advances in technology being experienced today make it difficult for people to maintain online anonymity or distance between themselves and powerful:
A)sales.
B)interests.
C)forces.
D)departments.
2
Online marketers of products and services have quickly recognized that learning about consumers' online behavior presents a real opportunity to increase their:
A)sales.
B)interests.
C)forces.
D)departments.
3
There are _______ distinct rights of privacy generally recognized in the United States.
A)six
B)four
C)five
D)two
4
A file that is imbedded on the hard drive of a computer, often without a person's knowledge, that collects and stores information about the user and his or her behavior, including the Web sites that have been visited, is known as a:
A)spoof.
B)cookie.
C)crunch.
D)froth.
5
The process in which a legitimate Web site is reproduced in order to fool users into thinking that they are connected to a trusted site is known as:
A)spoofing.
B)cookie.
C)crunch.
D)froth.
6
Consumers who believe that their right to privacy is being violated by the embedding of software can complain to the:
A)Federal Tort Curbing Agency.
B)Administration and Trade Commission.
C)Agency against Unfair Trade Practices.
D)Federal Trade Commission.
7
The ECPA also grants an Internet service provider (ISP) the right to __________ e-mail messages without the subscriber's consent.
A)monitor
B)screen
C)block
D)redirect
8
A bank employee who programs the bank's computer to make deductions from one or several accounts, and to deposit the funds to an account set up and controlled by the employee, could be prosecuted for ______________even though he or she had not touched actual currency.
A)counterfeiting
B)embezzlement
C)falsification
D)fraud
9
Many computer crimes, particularly those in which the computer is used as a means of engaging in criminal activity, are simply technologically advanced versions of:
A)precipitate crimes.
B)statutory crimes.
C)standard crimes.
D)narcissistic crimes.
10
Unauthorized access to computers invites violation of:
A)objectives.
B)duties.
C)rights.
D)goals.







liuzzo7eOnline Learning Center

Home > Chapter 27 > Multiple Choice Quiz