Student Center
|
Instructor Center
|
Information Center
|
Home
Making IT Work Videos
Tips
On the Web Explorations
The Buzz in IT
Interactive Companion
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Competencies
Multiple Choice Quiz
True or False
Puzzlers
Flashcards
Using Technology
Feedback
Help Center
Computing Essentials 2002-2003 Intro, 14/e
Timothy J. O'Leary
Linda I. O'Leary
Privacy, Security, Ergonomics, and the Environment
Multiple Choice
Click on the correct response for each question below.
1
The most significant concerns for people who utilize computer technology are privacy, security, environment and:
A)
ergonomics.
B)
economics.
C)
ethics.
D)
anonymity.
2
Specialized programs that are placed on a hard disk that monitor and track the user’s Web activity are called:
A)
trackers.
B)
brownies.
C)
monitors.
D)
cookies.
3
One of the following is not a principle from the Code of Fair Information Practice that was recommended in 1977 as an ethical guide in the absence of existing laws covering information privacy online.
A)
No secret databases
B)
Right of consent
C)
Assurance of reliability and proper use
D)
Right of content
4
A computer virus typically is not spread from computer to computer through:
A)
e-mail.
B)
technological failure.
C)
program downloads.
D)
copied floppy disks.
5
Unauthorized copying of software to be used for personal gain instead of for personal backups is called:
A)
program thievery.
B)
data snatching.
C)
software piracy.
D)
program looting.
6
The device that separates the computer or peripherals from the power source containing a circuit breaker to protect from voltage spikes is called a:
A)
spike breaker.
B)
surge protector.
C)
firewall.
D)
voltage dampener.
7
Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ________ security is concerned with protecting software from unauthorized tampering or damage.
A)
data
B)
cyber
C)
Internet
D)
metaphysical
8
The study of human factors concerning fitting the job to the worker rather than contorting the worker to fit the job is known as:
A)
conformance.
B)
reliance testing.
C)
ergonomics.
D)
productivity economics.
9
A form of a repetitive strain injury common to heavy computer users that consists of damage to nerves and tendons in the hands is:
A)
pulled arm muscles.
B)
arthritis.
C)
carpal tunnel syndrome.
D)
computer elbow.
10
The term used to describe stress associated with computer use that is harmful to people is:
A)
cybersclerosis.
B)
technostress.
C)
computitis.
D)
technology anxiety.
2002 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.