MIS Chapter 8 Quiz Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By An_losoya
A
An_losoya
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,566
Questions: 43 | Attempts: 283

SettingsSettingsSettings
MIS Chapter 8 Quiz Questions - Quiz

.


Questions and Answers
  • 1. 

    An ethical ______ is when one's responsibilites seem to lead in opposite directions.

    • A.

      Dilemma

    • B.

      Ethics

    • C.

      Violations

    • D.

      Consequences

    Correct Answer
    A. Dilemma
    Explanation
    An ethical dilemma occurs when an individual is faced with a situation where their responsibilities or obligations seem to conflict or point in different directions. This can create a difficult decision-making process as one must weigh the potential consequences and ethical implications of each possible action. In such cases, individuals may feel torn between doing what is morally right and fulfilling their duties, leading to a sense of ethical dilemma.

    Rate this question:

  • 2. 

    ____- are the principles and standards that guide our behavior toward other people.

    • A.

      Dilemma

    • B.

      Ethics

    • C.

      Violations

    • D.

      Snoopware

    Correct Answer
    B. Ethics
    Explanation
    Ethics refers to the principles and standards that guide our behavior toward other people. It involves understanding what is right and wrong and making decisions that are morally acceptable. Ethics help individuals determine how they should treat others and what actions are considered morally acceptable in different situations. By following ethical principles, individuals can ensure that their behavior is respectful, fair, and considerate towards others.

    Rate this question:

  • 3. 

    At the innermost middle ring of your ethical structure you are faced with very serious ethical ________.

    • A.

      Violations

    • B.

      Reach of results

    • C.

      Likeihood of effect

    • D.

      Consequences

    Correct Answer
    A. Violations
    Explanation
    At the innermost middle ring of your ethical structure, you are faced with very serious ethical violations. This suggests that at this level, the actions or decisions being considered go against established ethical principles or standards. These violations may involve actions that are considered morally wrong or unethical, and they can have significant negative consequences for individuals or society as a whole. It is important to address and rectify these violations to maintain a strong ethical foundation.

    Rate this question:

  • 4. 

    With respect to the circumstances that surround making an ethical decision, your preception of how many people will be affected by your intended action is called ______.

    • A.

      Reach of results

    • B.

      Likeihood of effect

    • C.

      Time of consequences

    • D.

      Relatedness

    Correct Answer
    A. Reach of results
    Explanation
    The term "reach of results" refers to the perception of how many people will be impacted by the intended action when making an ethical decision. It implies considering the potential consequences and effects of the action on a broader scale, beyond just immediate or direct outcomes. Understanding the reach of results helps individuals evaluate the ethical implications of their choices and consider the potential impact on a larger group of people.

    Rate this question:

  • 5. 

    With respect to the circumstances that surround making an ethical decision, _____ refers to the probability of the harm or benefit that will occur if you take an action.

    • A.

      Likeihood effect

    • B.

      Reach of results

    • C.

      Time of consequences

    • D.

      Relatedness

    Correct Answer
    A. Likeihood effect
    Explanation
    The term "likelihood effect" refers to the probability of the harm or benefit that will occur if you take an action in the context of making an ethical decision. It suggests that when considering the potential consequences of an action, one must assess the likelihood or probability of those consequences occurring. This helps in evaluating the potential harm or benefit that may result from the action and aids in making an informed ethical decision.

    Rate this question:

  • 6. 

    With respect to the circumstances that surround making an ethical decision, _____ is the length of time it will take for the benefit or harm to take effect.

    • A.

      Time of consequences

    • B.

      Reach of results

    • C.

      Likeihood of effect

    • D.

      Relatedness

    Correct Answer
    A. Time of consequences
    Explanation
    The term "time of consequences" refers to the length of time it will take for the benefit or harm of an ethical decision to be realized. In other words, it considers the timeframe in which the effects of the decision will manifest. This factor is important to consider when making ethical decisions as it helps to evaluate the potential impact and weigh the long-term consequences against short-term gains or harms.

    Rate this question:

  • 7. 

    With respect to the circumstances that surround making an ethical decision, how much you identify with the person or persons who will receive the benefit or suffer the harm of your actions is termed _____.

    • A.

      Relatedness

    • B.

      Consequences

    • C.

      Society opion

    • D.

      Intellectual property

    Correct Answer
    A. Relatedness
    Explanation
    Relatedness refers to the extent to which an individual identifies with the person or persons who will be affected by their actions. It involves understanding and empathizing with others and considering their well-being when making ethical decisions. By considering relatedness, individuals are more likely to make decisions that prioritize the benefit and minimize harm to those who will be impacted by their actions.

    Rate this question:

  • 8. 

    With respect to the circumstances that surround making an ethical decision, _____ refers to how much or how little benefit or harm will come from a particular decision.

    • A.

      Consequences

    • B.

      Society opinion

    • C.

      Copyright

    • D.

      Fair use doctrine

    Correct Answer
    A. Consequences
    Explanation
    The term "consequences" refers to the outcomes or results that may occur as a result of a particular decision. When making an ethical decision, it is important to consider the potential benefits or harms that may arise from that decision. By evaluating the consequences, individuals can determine whether the decision aligns with ethical principles and choose the option that will bring about the greatest overall benefit or the least harm.

    Rate this question:

  • 9. 

    With respect to the circumstances that surround making an ethical decision, your perception of what society thinks of your intended action is called _____.

    • A.

      Society opinion

    • B.

      Intellectual property

    • C.

      Copyright

    • D.

      Fair use doctrine

    Correct Answer
    A. Society opinion
    Explanation
    The correct answer is "society opinion". When making an ethical decision, your perception of what society thinks of your intended action is important. Society opinion refers to the collective viewpoint or judgment of the community or society in which you live. It influences your ethical decision-making process as you consider the potential impact and consequences of your actions on others and how they will be perceived by society.

    Rate this question:

  • 10. 

    _____ is intangible creative work that is embodied in physical form.

    • A.

      Intellectual property

    • B.

      Copy right

    • C.

      Fair use doctrine

    • D.

      Key logger

    Correct Answer
    A. Intellectual property
    Explanation
    Intellectual property refers to intangible creative work that is expressed in a physical form. This includes original ideas, inventions, designs, logos, and artistic works that are protected by copyright, trademarks, and patents. Intellectual property rights grant creators exclusive ownership and control over their work, allowing them to profit from their creations and prevent others from using or copying them without permission.

    Rate this question:

  • 11. 

    _____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents. 

    • A.

      Copyright

    • B.

      Patent

    • C.

      Fair use doctrine

    • D.

      Key logger

    Correct Answer
    A. Copyright
    Explanation
    Copyright is the legal protection given to the expression of an idea, such as a song, video game, or proprietary documents. It grants the creator exclusive rights to reproduce, distribute, and publicly display their work. This protection allows creators to control and monetize their creations, preventing others from using or copying them without permission.

    Rate this question:

  • 12. 

    _____ law protects an idea. 

    • A.

      Copy right

    • B.

      Patent

    • C.

      Fair use doctrine

    • D.

      Security

    Correct Answer
    A. Copy right
    Explanation
    Copyright law protects an idea by granting exclusive rights to the creator or owner of an original work. It gives them the authority to reproduce, distribute, and display their work, as well as the right to create derivative works based on the original idea. This protection ensures that others cannot copy or use the idea without permission, thus safeguarding the creator's intellectual property rights.

    Rate this question:

  • 13. 

    The _____ says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes. 

    • A.

      Fair use doctrine

    • B.

      Pirated software

    • C.

      Key logger

    • D.

      Screen capture

    Correct Answer
    A. Fair use doctrine
    Explanation
    The fair use doctrine is a legal principle that allows the use of copyrighted material without permission from the copyright owner. It provides exceptions to copyright infringement, allowing for the use of copyrighted material in certain situations such as for the creation of new work or for educational purposes, as long as it is done within certain limits. This doctrine aims to balance the rights of copyright owners with the public's interest in accessing and using copyrighted material.

    Rate this question:

  • 14. 

    _____ software is the unauthorized use, duplication, distribution or sale of copyrighted software. 

    • A.

      Pirated

    • B.

      Privacy

    • C.

      Snoopware

    • D.

      Key logger

    Correct Answer
    A. Pirated
    Explanation
    Pirated software refers to the unauthorized use, duplication, distribution, or sale of copyrighted software. This means that individuals are using or distributing software without obtaining the necessary licenses or permissions from the copyright holder. It is considered illegal and a violation of intellectual property rights.

    Rate this question:

  • 15. 

    _____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. 

    • A.

      Privacy

    • B.

      Pirated

    • C.

      Key logger

    • D.

      Snoopware

    Correct Answer
    A. Privacy
    Explanation
    Privacy is the correct answer because it refers to the right to be left alone when desired, to have control over personal possessions, and to not be observed without consent. It encompasses the idea of personal autonomy and the ability to keep certain aspects of one's life private.

    Rate this question:

  • 16. 

    Many Web sites are offering programs, collectively referred to as _____, to help people monitor what's happening on a computer

    • A.

      Snoopware

    • B.

      Key logger

    • C.

      Screeen capture

    • D.

      Sniffers

    Correct Answer
    A. Snoopware
    Explanation
    Snoopware refers to programs that are designed to monitor and track activities on a computer. These programs allow users to keep an eye on what is happening on their computer, such as websites visited, keystrokes entered, and screenshots taken. Snoopware can be used for various purposes, including monitoring employee activities, parental control, or detecting unauthorized access. It is important to note that the use of snoopware can raise privacy concerns and should be used responsibly and legally.

    Rate this question:

  • 17. 

    _____ is a program, that when installed on a computer, records every keystroke and mouse click. 

    • A.

      Key logger

    • B.

      Screen capture

    • C.

      Sniffers

    • D.

      Identy theft

    Correct Answer
    A. Key logger
    Explanation
    A key logger is a program that, when installed on a computer, records every keystroke and mouse click. This allows the user of the program to monitor and track all activity on the computer, including passwords, personal information, and online activity. It can be used for various purposes, such as monitoring employees or detecting unauthorized access.

    Rate this question:

  • 18. 

    A(n) _____ program captures screen images

    • A.

      Screen capture

    • B.

      Sniffers

    • C.

      Identy theft

    • D.

      Fraud

    Correct Answer
    A. Screen capture
    Explanation
    A screen capture program is a software tool that captures and saves images of what is displayed on a computer screen. It allows users to take screenshots of their desktop, specific windows, or selected areas of the screen. This can be useful for various purposes such as creating tutorials, documenting software issues, or saving important information.

    Rate this question:

  • 19. 

    A(n) _____ examines information passing through switches, hubs, or routers.

    • A.

      Sniffers

    • B.

      Snoopware

    • C.

      Identy theft

    • D.

      Fraud

    Correct Answer
    A. Sniffers
    Explanation
    A sniffer is a tool that examines information passing through switches, hubs, or routers. It is used to capture and analyze network traffic, allowing users to monitor and troubleshoot network issues, as well as detect any suspicious or unauthorized activities. Sniffers are commonly used by network administrators and security professionals to ensure the integrity and security of a network.

    Rate this question:

  • 20. 

    _____ occurs when someone forges your identity for fraudulent purposes. 

    • A.

      Identy theft

    • B.

      Fraud

    • C.

      Pharming

    • D.

      Cookie

    Correct Answer
    A. Identy theft
    Explanation
    Identity theft occurs when someone forges your identity for fraudulent purposes. This can involve stealing personal information such as your name, social security number, or financial details, and using it to commit various crimes, such as opening credit accounts, making unauthorized purchases, or even filing fraudulent tax returns. The perpetrator may use this stolen identity to impersonate you and carry out illegal activities, causing significant financial and emotional harm to the victim. It is important to safeguard personal information and be vigilant against potential identity theft threats.

    Rate this question:

  • 21. 

    _____ is a technique used to gain personal information for the purpose of identity theft. 

    • A.

      Fraud

    • B.

      Identy theft

    • C.

      Snoopware

    • D.

      Pharming

    Correct Answer
    A. Fraud
    Explanation
    Fraud is a technique used to gain personal information for the purpose of identity theft. This involves deceiving individuals into providing sensitive information such as passwords, social security numbers, or credit card details. Perpetrators may use various methods like phishing emails or phone scams to trick their victims. Once they have obtained the personal information, they can then use it for fraudulent activities, such as making unauthorized purchases or opening accounts in the victim's name.

    Rate this question:

  • 22. 

    _____ is a technique which reroutes your request for a legitimate Web site to a fake site that collects information from you. 

    • A.

      Pharming

    • B.

      Phising

    • C.

      Hardware key logger

    • D.

      Cookie

    Correct Answer
    A. pHarming
    Explanation
    Pharming is a technique that redirects a user's request for a genuine website to a fraudulent website, with the intention of collecting sensitive information. This is done by manipulating the DNS (Domain Name System) or by exploiting vulnerabilities in the user's computer or network. Unlike phishing, where the attacker lures the user to a fake website through deceptive emails or messages, pharming directly redirects the user's traffic without their knowledge or consent. This allows the attacker to gather personal information, such as login credentials or financial details, without raising suspicion from the user.

    Rate this question:

  • 23. 

    _____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard. 

    • A.

      Hardware key logger

    • B.

      Key logger

    • C.

      Cookie

    • D.

      Spam

    Correct Answer
    A. Hardware key logger
    Explanation
    A hardware key logger is a device that captures keystrokes made on a keyboard before they reach the motherboard. This device is typically installed between the keyboard and the motherboard, allowing it to record all keystrokes made by the user. It is often used for surveillance or monitoring purposes, and can be difficult to detect as it operates at a hardware level rather than relying on software.

    Rate this question:

  • 24. 

    A(n) _____ is a small record deposited on your hard disk by a Web site containing information about you and your Web activities. 

    • A.

      Cookie

    • B.

      Common cookie

    • C.

      Thojan horse

    • D.

      Hardwar key logger

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a small record deposited on your hard disk by a Web site containing information about you and your Web activities.

    Rate this question:

  • 25. 

    _____ cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites. 

    • A.

      Common

    • B.

      Unique

    • C.

      SPAM

    • D.

      Adware

    Correct Answer
    A. Common
    Explanation
    Common cookies start out as a unique cookie, but the original site sold access to it to a third party that can then change the cookie and track the surfer's activity across many sites.

    Rate this question:

  • 26. 

    _____ is unsolicited e-mail that advertises goods and services. 

    • A.

      SPAM

    • B.

      Adware

    • C.

      Trojan horse

    • D.

      Spyware

    Correct Answer
    A. SPAM
    Explanation
    SPAM is unsolicited e-mail that advertises goods and services. It is commonly used to refer to unwanted or junk emails that are sent in bulk to a large number of recipients without their consent. SPAM emails often contain advertisements, promotions, or links to malicious websites. Adware, trojan horse, and spyware are different types of malicious software that can be delivered through various means, but they do not specifically refer to unsolicited e-mails.

    Rate this question:

  • 27. 

    _____ is software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web. 

    • A.

      Adware

    • B.

      Trojan horse

    • C.

      Spyware

    • D.

      Web log

    Correct Answer
    A. Adware
    Explanation
    Adware is software that generates ads and installs itself on your computer when you download another program from the internet, typically a free program. This type of software is designed to display advertisements on your computer, often in a disruptive or intrusive manner. It is important to be cautious when downloading free programs from the web to avoid inadvertently installing adware on your computer.

    Rate this question:

  • 28. 

    _____ software is software you do not want hidden inside software you do want

    • A.

      Trojan horse

    • B.

      Spyware

    • C.

      Web log

    • D.

      Click stream

    Correct Answer
    A. Trojan horse
    Explanation
    A trojan horse is a type of malicious software that appears to be legitimate or desirable, but actually contains hidden harmful code or functionality. In this context, the statement suggests that trojan horse software is something that you do not want hidden within software that you do want. This means that while you may want and trust the software you are using, the presence of a trojan horse within it can cause harm or compromise the security of your system.

    Rate this question:

  • 29. 

    _____ is software that comes hidden in free downloadable software and collects information about you and your computer and reports it to someone without your permission. 

    • A.

      Spyware

    • B.

      Web log

    • C.

      Trojan horse

    • D.

      Click stream

    Correct Answer
    A. Spyware
    Explanation
    Spyware is a type of software that is often bundled with free downloadable software and remains hidden on a user's computer. Its purpose is to collect information about the user and their computer activities without their knowledge or consent. This information is then reported back to someone else, typically for malicious purposes.

    Rate this question:

  • 30. 

    A(n) _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.

    • A.

      Web log

    • B.

      Click stream

    • C.

      Magic lantern

    • D.

      White collar

    Correct Answer
    A. Web log
    Explanation
    A web log, also known as a "blog," is a type of website that contains a series of entries or posts in reverse chronological order. It consists of one line of information for every visitor to a website and is usually stored on a web server. This log keeps track of various details such as the visitor's IP address, the pages they accessed, the time of their visit, and other relevant information. It is commonly used for website analytics, tracking user behavior, and identifying trends in website traffic.

    Rate this question:

  • 31. 

    A(n) _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought. 

    • A.

      Click stream

    • B.

      Magic lantern

    • C.

      White collar

    • D.

      Hackers

    Correct Answer
    A. Click stream
    Explanation
    A click stream refers to the recording of information about a user's web browsing session, including the websites visited, duration of visit, advertisements viewed, and purchases made. It allows for the analysis of user behavior and preferences, aiding in targeted advertising and improving website design and functionality.

    Rate this question:

  • 32. 

    In 2001, the FBI acknowledged an enhancement to DCS-1000 called _____, which is key logger software.

    • A.

      Magic lantern

    • B.

      White collare

    • C.

      Worm

    • D.

      Black hat

    Correct Answer
    A. Magic lantern
    Explanation
    The correct answer is "Magic lantern". In 2001, the FBI acknowledged an enhancement to DCS-1000, which is key logger software. This enhancement was called Magic lantern.

    Rate this question:

  • 33. 

    _____ crime in general, accounts for at least $ billion in losses among US businesses every year - and information technology makes it easier to accomplish and conceal the crime. 

    • A.

      White collar

    • B.

      Black collar

    • C.

      Gray collar

    • D.

      None of these

    Correct Answer
    A. White collar
    Explanation
    White collar crime refers to non-violent crimes committed by individuals in professional or business settings. These crimes typically involve deceit, fraud, or manipulation for financial gain. The given statement suggests that white collar crime, aided by advancements in information technology, leads to billions of dollars in losses for US businesses annually. This explanation highlights the significance of white collar crime and its impact on the economy, emphasizing the role of technology in facilitating and hiding such criminal activities.

    Rate this question:

  • 34. 

    _____ are generally very knowledgeable computer users who use their knowledge to invade other people's computer

    • A.

      Hackers

    • B.

      Crackers

    • C.

      Worms

    • D.

      Virus

    Correct Answer
    A. Hackers
    Explanation
    Hackers are generally very knowledgeable computer users who use their knowledge to invade other people's computers. They often exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, or cause damage. Unlike crackers, who have malicious intent, hackers can be classified into different categories based on their motivations and actions, such as white hat hackers (ethical hackers) who help organizations identify and fix security vulnerabilities, and black hat hackers who engage in illegal activities. Therefore, hackers are the correct answer in this context.

    Rate this question:

  • 35. 

    A(n) _____ is a type of hacker who is engaged in corporate espionage

    • A.

      Crackers

    • B.

      Hackers

    • C.

      Worms

    • D.

      White collars

    Correct Answer
    A. Crackers
    Explanation
    Crackers are a type of hacker who engage in corporate espionage. They infiltrate computer systems and networks to gain unauthorized access to sensitive information or trade secrets for personal gain or to sell to competitors. Unlike hackers who may have different motivations such as curiosity or activism, crackers specifically target corporate entities for financial or competitive advantage.

    Rate this question:

  • 36. 

    A hacker who has been stealing credit card number would be considered a _____ hacker. 

    • A.

      Black hat

    • B.

      White hat

    • C.

      Gray hat

    • D.

      Yellow hat

    Correct Answer
    A. Black hat
    Explanation
    A hacker who steals credit card numbers would be considered a black hat hacker. This term refers to hackers who engage in illegal activities and use their skills for malicious purposes, such as stealing personal information or causing damage to computer systems. Black hat hackers typically have criminal intent and operate outside the boundaries of the law.

    Rate this question:

  • 37. 

    A(n) _____ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.

    • A.

      Worm

    • B.

      Virus

    • C.

      Trojan horse

    • D.

      Denial of service

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of virus that can spread itself not only through files, but also through computer networks, such as email and other forms of Internet traffic. Unlike other viruses, which typically require user interaction to spread, worms can replicate and spread automatically, making them highly efficient at infecting multiple computers.

    Rate this question:

  • 38. 

    A(n) _____ attack floods a Web site with so many requests for service that it slows down or crashes. 

    • A.

      Denial of service

    • B.

      Anti-virus

    • C.

      Firewall

    • D.

      Biometers

    Correct Answer
    A. Denial of service
    Explanation
    A denial of service attack is a type of cyber attack where a website is flooded with an overwhelming amount of requests for service, causing it to slow down or crash. This is achieved by exploiting vulnerabilities in the website's servers or network infrastructure. The attacker aims to make the website unavailable to its intended users, disrupting its normal functioning.

    Rate this question:

  • 39. 

    _____ software detects and removes or quarantines computer viruses. 

    • A.

      Anti-virus

    • B.

      Denial of service

    • C.

      Firewall

    • D.

      Biometers

    Correct Answer
    A. Anti-virus
    Explanation
    Anti-virus software is designed to detect and remove or isolate computer viruses. It scans files and programs on a computer to identify any malicious code or patterns associated with viruses. Once detected, the software can either remove the virus or quarantine it, preventing it from causing further damage. This software is essential for protecting computers and networks from the harmful effects of viruses.

    Rate this question:

  • 40. 

    Hardware and/or software that protects computers from outsides is called a(n) _____. 

    • A.

      Firewall

    • B.

      Anti-virus

    • C.

      Biometers

    • D.

      Encryption

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security device or software that is designed to protect computers from outside threats. It acts as a barrier between a private internal network and the public internet, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. Firewalls can prevent unauthorized access, filter out malicious content, and detect and block suspicious activities. They are essential in safeguarding computer systems and networks from potential cyber attacks, making the correct answer for this question "firewall".

    Rate this question:

  • 41. 

    _____ use physical characteristics to assess access rights. 

    • A.

      Biometers

    • B.

      Encryption

    • C.

      Public key encryption

    • D.

      Anti-virus

    Correct Answer
    A. Biometers
    Explanation
    Biometers refer to the use of physical characteristics, such as fingerprints or facial recognition, to assess access rights. This means that biometric technology is used to verify a person's identity based on their unique physical traits. By using biometers, organizations can ensure enhanced security and prevent unauthorized access to sensitive information or restricted areas.

    Rate this question:

  • 42. 

    _____ scrambles the contents of a file so you can't read it without having the right decryption key. 

    • A.

      Encryption

    • B.

      Public key encryption

    • C.

      Biometers

    • D.

      Anti-virus

    Correct Answer
    A. Encryption
    Explanation
    Encryption is a process that scrambles the contents of a file in such a way that it becomes unreadable without the correct decryption key. It is a security measure used to protect sensitive information from unauthorized access. By encrypting a file, it ensures that even if someone gains access to the file, they will not be able to understand its contents without the appropriate key.

    Rate this question:

  • 43. 

    _____ is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient. 

    • A.

      Public key encryption

    • B.

      Encryption

    • C.

      Firewall

    • D.

      Biometers

    Correct Answer
    A. Public key encryption
    Explanation
    Public key encryption is a type of encryption system that uses two keys, a public key and a private key. The public key is available to everyone, while the private key is only known to the recipient. This system allows for secure communication between parties, as messages encrypted with the public key can only be decrypted with the corresponding private key. It is commonly used in secure online transactions and communication protocols.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2012
    Quiz Created by
    An_losoya
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.