McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Acronyms
Exercise Files
Link to Jerry Post
Additional Appendixes
Discussion Issues
Rolling Thunder
End of Text Cases
Additional Models
Chapter Objectives
PowerPoint Presentations
Chapter Outline
Chapter Summary
Multiple Choice Quiz
True or False
Fill in the Blanks
Chapter Exercises
Internet Links/References
Chapter Review Questions
Feedback
Help Center


Management Information Systems: Solving Business Problems with Information Technology, 3/e
Gerald V. Post, University of the Pacific
David L. Anderson, DePaul U/McGowan Center

Security, Privacy, and Anonymity

Chapter 4 True or False



1

More money can be stolen at gunpoint in a bank than can be stolen by computer finagling.
A)True
B)False
2

Microsoft's Visual Basic for Applications is a major vulnerable point to the Office suite of programs.
A)True
B)False
3

It is much easier to locate hidden data within written files stored in locked storage areas than it is to locate it on a computer system.
A)True
B)False
4

US government top-secret information is stored on computers that generate incredibly complex passwords.
A)True
B)False
5

Free steganography tools can be found on the Internet.
A)True
B)False
6

One way to encrypt messages is with the RSA algorithm, which uses super-keys to protect your message from all comers, so that nothing can happen to it between source and target.
A)True
B)False
7

With good encryption techniques more common, a major target of computer criminals has become servers.
A)True
B)False




McGraw-Hill/Irwin