Name: 
 

IC3 - Lesson 29



True/False
Indicate whether the statement is true or false.
 

 1. 

Theft of a computer is considered a computer crime.
 

 2. 

Because two people are involved, using a computer to stalk someone is not considered a crime.
 

 3. 

The number of computer crimes has increased since networking has become popular.
 

 4. 

A responsible computer user recycles products, such as computer paper and ink cartridges.
 

 5. 

If your company does not provide you with a copy of its computer policies, it is not your responsibility to locate the guidelines.
 

 6. 

A virus that makes many copies of itself is known as a logic bomb.
 

 7. 

E-mail attachments can carry viruses.
 

 8. 

E-mail that you send at work is company property.
 

 9. 

Firewalls comprise both hardware and software.
 

 10. 

The Computer Fraud and Abuse Act addresses issues related to financial communications.
 

 11. 

Once you have established a computer password, it is not necessary to ever change the password again.
 

 12. 

If someone accesses your computer for financial or personal gain, the crime of hacking has occurred.
 

 13. 

To combat piracy, some software now has a license number that must be used to install the program correctly.
 

 14. 

Shareware is free software that can be used for as long as you want without any cost.
 

 15. 

Data diddling is a computer crime that involves using someone else’s identification to deceive or defraud.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 16. 

Which may be an indicator that computer fraud exists?
a.
staff members with new cars
b.
staff members loaning their new cars to other staff members
c.
low employee turnover
d.
unusual work patterns
 

 17. 

A program that has been written to cause corruption of data on a computer is called a ____.
a.
virus
c.
spreadsheet
b.
database
d.
query
 

 18. 

The damage that is caused by a time bomb virus often is triggered when the system has been ____ a certain number of times.
a.
put into hibernation
c.
reinstalled
b.
shut down
d.
booted
 

 19. 

A virus that makes many copies of itself is known as a ____.
a.
logic bomb
c.
replicator
b.
worm
d.
trojan bomb
 

 20. 

Computer crime is not new; the first computer crime, electronic embezzlement, was committed in the ____.
a.
1930s
c.
1950s
b.
1940s
d.
1960s
 

 21. 

Which statement about viruses is NOT true?
a.
Viruses replicate themselves.
b.
The appearance of specified data can trigger a logic bomb.
c.
Viruses must be attached to other files.
d.
A trojan horse can appear on a network.
 

 22. 

Which is NOT a computer crime?
a.
authorized use of a computer for private business
b.
stalking someone at work via the network
c.
copying information without permission
d.
implementing a worm
 

 23. 

Before you open an e-mail attachment, you should ____.
a.
run it through a time bomb
c.
scan it
b.
read it
d.
access it
 

 24. 

If you work at a company, your e-mail ____.
a.
is your private property
b.
is the property of the company
c.
cannot be read without your permission
d.
cannot be stored or replicated without your permission
 

 25. 

Which of the following would NOT be examined by a biometric security system?
a.
a driver’s license
c.
voice pattern
b.
fingerprint
d.
retina of the eye
 

 26. 

If your security system records retina patterns, you are using ____ security measures.
a.
scanning
c.
biometric
b.
visual
d.
off-site
 

 27. 

Which of the following laws regulates how federal data can be used to determine whether an individual is entitled to federal benefits?
a.
the Software Piracy and Counterfeiting Amendment
b.
the Copyright Act of 1976
c.
the Electronic Communication Privacy Act
d.
the Computer Matching & Privacy Act
 

 28. 

Which of the following laws directly protects software developers?
a.
the Copyright Act of 1976
b.
the Electronic Communication Privacy Act
c.
the Computer Fraud and Abuse Act
d.
the Systems Integrity Act of 1991
 

 29. 

Free software that can be used for a given period of time is known as ____.
a.
currency
c.
shareware
b.
accessware
d.
fair use
 

 30. 

Which of the following is NOT a guideline for creating secure passwords?
a.
Have the same password for all accounts and applications.
b.
Use numbers as well as letters.
c.
Mix uppercase and lowercase letters in the password.
d.
Add punctuation marks to the password.
 

Completion
Complete each statement.
 

 31. 

Computer ____________________ is conduct that involves the manipulation of a computer or its data it order to trick others out of their money or property.
 

 

 32. 

Invading someone else’s computer is known as computer ____________________.
 

 

 33. 

Viruses are attached to ____________________ files.
 

 

 34. 

A virus that does not cause damage until a certain date is known as a(n) ____________________ bomb.
 

 

 35. 

Data ____________________ occurs when data is changed either before or after it enters the computer.
 

 

 36. 

When an employee does personal business on a computer while he or she is at work, that employee is stealing computer ____________________.
 

 

 37. 

A(n) ____________________ virus is one that does something different from what users expect it to do.
 

 

 38. 

Computer security is needed to keep software, data, and ____________________ safe.
 

 

 39. 

____________________ are the most common form of restricting access to data.
 

 

 40. 

The Electronic Communication Privacy Act prohibits the ____________________ of data communications.
 

 

 41. 

There are effective ____________________ technologies to keep your credit card numbers safe from fraud.
 

 

 42. 

A criminal act committed through the use of a computer is known as ____________________.
 

 

 43. 

Software ____________________ is the illegal copying or using of programs.
 

 

 44. 

You can avoid computer _____________________ by scanning files from floppy disks or those downloaded from the Internet before opening them.
 

 

 45. 

A sudden power outage can cause you to lose unsaved ____________________ on your computer.
 

 

 46. 

A type of program that can be downloaded from a Web site without your knowledge and then can take over control of your computer is called ____________________.
 

 

 47. 

____________________ is a growing problem that involves acquiring credit and conducting transactions using someone else’s personal information.
 

 

 48. 

While not illegal, pranks and hoaxes perpetrated by e-mail or on a Web site are examples of ____________________ computer behavior.
 

 

 49. 

People who use computers frequently may suffer from _________________________ injuries caused by moving a joint the same way over and over again.
 

 

 50. 

Setting up computer equipment properly is a simple way to ensure a(n) ____________________ working environment.
 

 



 
Check Your Work     Start Over