McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Click-Alongs
Interactive Companion
Web Summary
Multiple Choice Quiz
Fill in the Blanks
True or False
Click-along
Click-along 9-2
Crossword Puzzle
IT Challenge
Labeling Exercise
IT Word Scramble
Feedback
Help Center


Using Information Technology: A Practical Introduction to Computers and Communications, 5/e
Brian K. Williams
Stacey Sawyer

THE CHALLENGES OF THE DIGITAL AGE: Society & Information Technology Today

Chapter 9 True or False Quiz



1

DES is a federal standard for data encryption.
A)True
B)False
2

The Telecommunications Act of 1996 instituted a number of federal and state communications regulations.
A)True
B)False
3

The gap between those with and those without access to information technology is widening.
A)True
B)False
4

"Phone phreaks" are individuals who break into company voice-mail systems, then use an extension to make long-distance calls.
A)True
B)False
5

A stealth virus is one which can temporarily remove itself from memory to elude capture.
A)True
B)False
6

Hackers are people who illegally break into computers for malicious purposes.
A)True
B)False
7

Retinal scans are one example of biometrics.
A)True
B)False
8

PGP is an encryption standard.
A)True
B)False
9

Security precautions should begin with the screening of job applicants.
A)True
B)False
10

Misuse of technology refers to employees waiting for programs to run, checking computer output for accuracy, helping co-workers use their applications, calling for technical support, etc.
A)True
B)False




McGraw-Hill/Irwin