1. Most computer-related mistakes are caused by machine error.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.01
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
2. As information technology becomes faster, more complex, and more powerful, the risk of computer-related mistakes decreases tremendously.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.01
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
3. The first step to prevent computer-related waste is to review existing policies and procedures and determine whether they are adequate.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.02
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
4. Relaxing controls for changes to critical tables, HTML, and URLs is a useful policy to minimize computer-related waste and mistakes.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.02
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
5. Many computer crimes go unreported because companies do not want bad publicity or don’t think that law enforcement can help.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
6. The ready availability of personal computers, coupled with the development of mapping and analysis software, has led law enforcement agencies to use crime-related data, powerful analysis techniques, and geographic information systems (GIS) to better understand and even diminish crime risks.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
7. The Department of Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate serves as a focal point for threat assessment, warning, investigation, and response to cyberterrorism threats or attacks against the country’s critical infrastructure.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
8. The public cannot gain online access to information about registered sex offenders online because of various privacy laws.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
9. A computer hacker is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
10. A script bunny is a young, female computer hacker.
a. True
b. False
ANSWER: False
POINTS: 1
DIFFICULTY: Easy
LEARNING OBJECTIVES: 09.03
NATIONAL STANDARDS: United States – BUSPROG – BUSPROG: Reflective Thinking
KEYWORDS: Bloom’s: Knowledge
Reviews
There are no reviews yet.