The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
A. Identity theft
B. Auction fraud
Cyberbullying
D. Snoopware
查看答案
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
A. accuracy
B. property
C. privacy
D. access
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
A. Digital Millennium Copyright Act
B. Computer Abuse Amendments Act
C. The Gramm-Leach-Bliley Act
D. Computer Fraud and Abuse Act
Corporations often use this to prevent copyright violations.
A. Digital Millennium Copyright Act
B. Website encryption
C. Digital rights management (DRM)
D. Keystroke loggers
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Encryption
B. Firewall
C. Password
Dictionary attack