MIS Chapter 9

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rvalatnational_e
R
Rvalatnational_e
Community Contributor
Quizzes Created: 5 | Total Attempts: 17,589
Questions: 45 | Attempts: 492

SettingsSettingsSettings
MIS Quizzes & Trivia

MIS Chapter 9


Questions and Answers
  • 1. 

    A spam filter is software that attempts to block unwanted e-mail.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A spam filter is a type of software designed to identify and block unwanted or unsolicited emails. It uses various algorithms and techniques to analyze the content, sender, and other attributes of an email to determine whether it is spam or not. By flagging or blocking spam emails, the filter helps to reduce the amount of unwanted and potentially harmful messages that users receive in their inbox. Therefore, the statement "A spam filter is software that attempts to block unwanted e-mail" is true.

    Rate this question:

  • 2. 

    “Shoulder surfing “occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Shoulder surfing is a form of identity theft where the thief stands close to someone in a public place and watches them as they enter personal information on a form or device. This allows the thief to gather sensitive information without the victim's knowledge. Therefore, the statement that "Shoulder surfing occurs when an identity thief simply stands next to someone at a public office, such as the Bureau of Motor Vehicles, and watches as the person fills out personal information on a form" is true.

    Rate this question:

  • 3. 

                     Originally, a cracker was a person who enjoys computer technology and spends time learning and using computer systems.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the original meaning of a cracker is not someone who enjoys computer technology, but rather someone who breaks into computer systems or networks with malicious intent.

    Rate this question:

  • 4. 

                     Worms can create copies on the same computer or can send the copies to other computers via a network.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Worms are a type of malware that can self-replicate and spread to other computers through a network. They are designed to exploit vulnerabilities in computer systems and can create copies of themselves on the same computer or send copies to other computers. This allows them to quickly spread and infect multiple systems, causing damage and potentially stealing sensitive information. Therefore, the statement that worms can create copies on the same computer or send copies to other computers via a network is true.

    Rate this question:

  • 5. 

    All antivirus software are capable of repairing common virus infections automatically, without interrupting your work.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false. While antivirus software is designed to detect and remove viruses, not all antivirus software have the capability to repair common virus infections automatically. Some antivirus software may require manual intervention or additional steps to remove the virus completely. Therefore, the statement is not accurate.

    Rate this question:

  • 6. 

    Disk defragmentation reorganizes the contents of the disk to store the pieces of each file close together and contiguously.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Disk defragmentation is a process that rearranges the fragmented data on a disk so that the pieces of each file are stored close together and in a contiguous manner. This helps to improve the efficiency and performance of the disk by reducing the time it takes to access and retrieve data. Therefore, the statement is true as it accurately describes the purpose and function of disk defragmentation.

    Rate this question:

  • 7. 

    Criminal hackers sometimes warn the public of a new and devastating virus that does not exist in order to create fear.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Criminal hackers may spread false information about a new and dangerous virus that doesn't actually exist. They do this to instill fear and panic among the public, which can lead to various negative consequences such as people falling for scams or downloading malicious software out of fear. This tactic is often used by hackers to exploit people's emotions and manipulate them for their own gain.

    Rate this question:

  • 8. 

    Using a password sniffer, a criminal hacker can gain access to computers and networks to steal data and information, invade privacy, plant viruses, and disrupt computer operations.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A password sniffer is a tool that allows a hacker to intercept and capture passwords and login credentials. By using this tool, a criminal hacker can gain unauthorized access to computers and networks. Once inside, they can steal sensitive data and information, invade privacy by accessing personal files and communications, plant viruses or malware to cause damage, and disrupt computer operations. Therefore, the statement that a criminal hacker can use a password sniffer to gain access and carry out malicious activities is true.

    Rate this question:

  • 9. 

    A bot is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect because a bot is not a variable value that is applied using an algorithm to encrypt or decrypt text. A bot is actually an automated software program that performs tasks on the internet, such as crawling websites, interacting with users, or providing information. It does not have a direct role in encryption or decryption processes.

    Rate this question:

  • 10. 

    A firewall can include both hardware and software that act as a barrier between an organization’s information system and the outside world.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A firewall is a security measure that protects an organization's information system from unauthorized access and potential threats from the outside world. It can consist of both hardware and software components that work together to create a barrier, monitoring and controlling the incoming and outgoing network traffic. This prevents malicious activities and helps maintain the confidentiality, integrity, and availability of the organization's data and resources. Therefore, the statement is true.

    Rate this question:

  • 11. 

    E-mail messages that have been erased from hard disks can be retrieved and used in lawsuits because the laws of discovery demand that companies produce all relevant business documents.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because the laws of discovery require companies to produce all relevant business documents, including e-mail messages that have been erased from hard disks. This means that even if the messages have been deleted, they can still be retrieved and used as evidence in lawsuits.

    Rate this question:

  • 12. 

    Instead of forcing users to find and read through the privacy policy for each site they visit, the intrusion detection software in a computer’s browser will download the privacy policy from each site, scan it, and notify the user if the policy does not match his or her preferences.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement suggests that intrusion detection software in a computer's browser will download and scan the privacy policy of each site visited, and notify the user if the policy does not match their preferences. However, this statement is false. Intrusion detection software is primarily used to monitor and detect unauthorized access or malicious activities on a computer network. It does not typically have the capability to download and scan privacy policies of websites, nor does it have the ability to notify users about policy mismatches.

    Rate this question:

  • 13. 

                     The Children’s Online Privacy Protection Act (COPPA) was passed by Congress in October 2002.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The Children’s Online Privacy Protection Act (COPPA) was actually passed by Congress in October 1998, not 2002.

    Rate this question:

  • 14. 

    There is currently no federal law that bans unsolicited fax advertisements.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because there is a federal law that bans unsolicited fax advertisements. The Telephone Consumer Protection Act (TCPA) prohibits sending unsolicited fax advertisements without the recipient's prior express invitation or permission. This law was enacted in 1991 to protect consumers from unwanted fax advertisements and to regulate telemarketing practices. Therefore, the correct answer is false.

    Rate this question:

  • 15. 

    CTS involves wrist pain, a feeling of tingling and numbness, and difficulty grasping and holding objects.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CTS, or Carpal Tunnel Syndrome, is a condition that causes wrist pain, tingling, numbness, and difficulty in grasping and holding objects. These symptoms occur due to the compression of the median nerve, which runs through the carpal tunnel in the wrist. The compression is often caused by repetitive hand movements, such as typing or using tools, and can be exacerbated by factors like obesity or pregnancy. Therefore, the given statement is true as it accurately describes the symptoms associated with CTS.

    Rate this question:

  • 16. 

    Many organizations implement ____ to measure actual results against established goals, such as percentage of end-user reports produced on time, percentage of data input errors detected, number of input transactions entered per eight-hour shift, and so on.

    • A.

      Ergonomics

    • B.

      Internal audits

    • C.

      Biometrics

    • D.

      External audits

    Correct Answer
    B. Internal audits
    Explanation
    Internal audits are implemented by many organizations to measure actual results against established goals. These audits help assess the effectiveness of internal controls, identify areas for improvement, and ensure compliance with policies and procedures. They can measure various performance indicators such as the percentage of end-user reports produced on time, percentage of data input errors detected, and number of input transactions entered per eight-hour shift. Internal audits provide valuable insights into the organization's performance and help drive continuous improvement.

    Rate this question:

  • 17. 

    ____ involves the use of one’s social skills to get computer users to provide you with information to access an information system and/or its data.

    • A.

      Dumpster diving

    • B.

      Social engineering

    • C.

      Software piracy

    • D.

      Password sniffing

    Correct Answer
    B. Social engineering
    Explanation
    Social engineering involves the use of one's social skills to manipulate and deceive computer users into providing information that allows unauthorized access to an information system and/or its data. This can be done through techniques such as impersonation, manipulation, or deception to gain the trust of the target and convince them to disclose sensitive information or perform actions that compromise security.

    Rate this question:

  • 18. 

                     ____ are parasitic computer programs that replicate but do not infect other computer program files.

    • A.

      Viruses

    • B.

      Worms

    • C.

      Trojans

    • D.

      Biometrics

    Correct Answer
    B. Worms
    Explanation
    Worms are parasitic computer programs that replicate themselves, but unlike viruses, they do not infect other computer program files. Worms are standalone programs that can spread across networks and systems, often exploiting vulnerabilities to gain unauthorized access. They can cause damage by consuming system resources, slowing down networks, or even deleting files. Unlike viruses, worms do not need a host program to attach themselves to, making them self-contained and capable of spreading independently.

    Rate this question:

  • 19. 

    The term ____ is used to describe software programs that, when loaded into a computer system, will destroy, interrupt, or cause errors in processing.

    • A.

      Ergonomics

    • B.

      Malware

    • C.

      Biometrics

    • D.

      PKI

    Correct Answer
    B. Malware
    Explanation
    Malware is the correct answer because it refers to software programs that are designed to harm or disrupt computer systems. These programs can cause damage by destroying files, interrupting normal processes, or causing errors in the system. Malware includes various types such as viruses, worms, Trojans, ransomware, and spyware, which are intentionally created to compromise the security and functionality of computer systems.

    Rate this question:

  • 20. 

    A ____ is a malicious program that disguises itself as a useful application and purposefully does something the user does not expect.

    • A.

      Virus

    • B.

      Worm

    • C.

      Trojan horse

    • D.

      Biometric

    Correct Answer
    C. Trojan horse
    Explanation
    A Trojan horse is a type of malicious program that pretends to be a legitimate and helpful application, but actually performs actions that the user is not aware of or does not expect. Unlike viruses and worms, which can replicate and spread on their own, a Trojan horse relies on the user to unknowingly download and install it. Once inside a system, it can carry out various harmful activities such as stealing personal information, damaging files, or allowing unauthorized access to the system.

    Rate this question:

  • 21. 

                     ____ law protects authored works such as art, books, film, and music.

    • A.

      Patent

    • B.

      Copyright

    • C.

      Intrusion detection

    • D.

      Internet security

    Correct Answer
    B. Copyright
    Explanation
    Copyright law protects authored works such as art, books, film, and music. It grants the creator of a work exclusive rights to reproduce, distribute, display, and perform their work. This means that others cannot use or profit from the work without the creator's permission. Copyright is important for artists, authors, musicians, and filmmakers as it allows them to control how their work is used and ensures that they receive credit and compensation for their creations.

    Rate this question:

  • 22. 

    ____ laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items.

    • A.

      Intrusion detection

    • B.

      Copyright

    • C.

      Patent

    • D.

      Internet security

    Correct Answer
    C. Patent
    Explanation
    Patent laws protect processes, machines, objects made by humans or machines, compositions of matter, and new uses of these items. These laws grant exclusive rights to inventors, allowing them to prevent others from making, using, or selling their inventions without permission. By obtaining a patent, inventors can protect their intellectual property and have the opportunity to profit from their creations.

    Rate this question:

  • 23. 

                     ____ responds to network security breaches and monitors systems for emerging threats.

    • A.

      DARPA

    • B.

      The World Wide Consortium

    • C.

      CERT

    • D.

      The Software and Information Industry Alliance

    Correct Answer
    C. CERT
    Explanation
    CERT, which stands for Computer Emergency Response Team, is an organization that responds to network security breaches and monitors systems for emerging threats. They work to coordinate responses to cyber incidents, provide vulnerability assessments, and offer guidance and support to organizations and individuals in order to enhance their cybersecurity. CERT is known for its expertise in incident response and plays a crucial role in ensuring the security of networks and systems.

    Rate this question:

  • 24. 

    ____ is the process of converting an original electronic message into a form that can be understood only by the intended recipients.

    • A.

      Decryption

    • B.

      Software piracy

    • C.

      Intrusion detection

    • D.

      Encryption

    Correct Answer
    D. Encryption
    Explanation
    Encryption is the process of converting an original electronic message into a form that can be understood only by the intended recipients. It involves encoding the message using an algorithm and a key, making it unreadable to anyone who does not possess the corresponding key to decrypt it. Encryption is commonly used to protect sensitive information and ensure its confidentiality during transmission or storage.

    Rate this question:

  • 25. 

    A(n) ____ monitors system and network resources and notifies network security personnel when it senses a possible intrusion.

    • A.

      Password sniffer

    • B.

      Intrusion detection system

    • C.

      Trojan horse

    • D.

      Antivirus software

    Correct Answer
    B. Intrusion detection system
    Explanation
    An intrusion detection system is a tool that monitors system and network resources to identify potential intrusions or unauthorized access attempts. It analyzes network traffic, system logs, and other data to detect patterns or anomalies that may indicate a security breach. When it senses a possible intrusion, it alerts network security personnel so that they can take appropriate action to prevent further damage or unauthorized access.

    Rate this question:

  • 26. 

    The specific goals of ____ are to protect children from potentially harmful material, while also safeguarding free speech on the Internet.

    • A.

      CERT

    • B.

      DARPA

    • C.

      The Internet Content Rating Association

    • D.

      The Software and Information Industry Alliance

    Correct Answer
    C. The Internet Content Rating Association
    Explanation
    The Internet Content Rating Association (ICRA) is the correct answer because its specific goals are to protect children from potentially harmful material and at the same time safeguard free speech on the Internet. ICRA is an organization that provides a voluntary content rating system for websites, allowing parents and guardians to filter and control the content their children can access online. This rating system helps in creating a balance between protecting children from inappropriate material and ensuring that freedom of expression is not compromised on the internet.

    Rate this question:

  • 27. 

    ____, an international industry group whose members include Apple, Commerce One, Ericsson, and Microsoft, is supporting the development of P3P.

    • A.

      CERT

    • B.

      DARPA

    • C.

      The World Wide Web Consortium

    • D.

      The Software and Information Industry Alliance

    Correct Answer
    C. The World Wide Web Consortium
    Explanation
    The correct answer is The World Wide Web Consortium. The question asks for the international industry group that is supporting the development of P3P. The World Wide Web Consortium (W3C) is an international community that develops web standards and guidelines, and its members include Apple, Commerce One, Ericsson, and Microsoft. Therefore, it is the most suitable option for the given question.

    Rate this question:

  • 28. 

    The ____ is a screening technology that shields users from Web sites that do not provide the level of privacy protection they desire.

    • A.

      Platform for Privacy Preferences

    • B.

      RFID tag

    • C.

      CTS

    • D.

      Security dashboard

    Correct Answer
    A. Platform for Privacy Preferences
    Explanation
    The Platform for Privacy Preferences is a screening technology that allows users to set their desired level of privacy protection on websites. It enables users to specify their privacy preferences and ensures that websites adhere to these preferences. This technology acts as a shield, preventing users from accessing websites that do not meet their privacy requirements.

    Rate this question:

  • 29. 

    ____ are embedded in many of the products we buy such as medicine containers, clothing, computer printers, car keys, library books, and tires.

    • A.

      RFID tags

    • B.

      Bots

    • C.

      Security dashboards

    • D.

      Geolocation tools

    Correct Answer
    A. RFID tags
    Explanation
    RFID tags are small electronic devices that can be embedded in various products. They are commonly used for tracking and identification purposes. RFID tags can be found in a wide range of products, including medicine containers, clothing, computer printers, car keys, library books, and tires. These tags use radio frequency signals to transmit data, allowing for easy and efficient tracking of the products they are attached to.

    Rate this question:

  • 30. 

    The purpose of the ____ act is to provide certain safeguards for people against an invasion of personal privacy by requiring federal agencies to do a number of things including permitting people to determine what records pertaining to them are collected, maintained, used, or disseminated by such agencies.

    • A.

      PA74

    • B.

      HIPPA

    • C.

      Gramm-Leach-Bliley Financial Services Modernization

    • D.

      Sarbanes-Oxley

    Correct Answer
    A. PA74
    Explanation
    The correct answer is PA74, which refers to the Privacy Act of 1974. This act is designed to protect individuals' privacy by requiring federal agencies to disclose what personal information they collect, maintain, use, and share. It gives individuals the right to access and correct their records, and establishes rules for how agencies can collect and handle personal information. The purpose of the act is to provide safeguards against invasion of personal privacy and give individuals control over their own information.

    Rate this question:

  • 31. 

    The ____ act established a Privacy Study Commission to study existing databases and to recommend rules and legislation for consideration by Congress.

    • A.

      Sarbanes-Oxley

    • B.

      PA74

    • C.

      Gramm-Leach-Bliley

    • D.

      USA Patriot

    Correct Answer
    B. PA74
    Explanation
    PA74 refers to the Privacy Act of 1974, which established a Privacy Study Commission to study existing databases and recommend rules and legislation for consideration by Congress. The Sarbanes-Oxley Act is not related to privacy but rather focuses on corporate governance and financial reporting. The Gramm-Leach-Bliley Act addresses financial privacy and the USA Patriot Act focuses on national security and surveillance. Therefore, the correct answer is PA74.

    Rate this question:

  • 32. 

    Under the ____ Act, Internet service providers and telephone companies must turn over customer information, including numbers called, without a court order if the FBI claims that the records are relevant to a terrorism investigation.

    • A.

      USA Patriot

    • B.

      PA74

    • C.

      Gramm-Leach-Bliley

    • D.

      Sarbanes-Oxley

    Correct Answer
    A. USA Patriot
    Explanation
    The correct answer is USA Patriot. The USA Patriot Act is a law passed in the United States after the 9/11 terrorist attacks. It grants the FBI and other law enforcement agencies broader surveillance and investigative powers in order to combat terrorism. Under this act, internet service providers and telephone companies are required to provide customer information, such as numbers called, to the FBI without a court order if it is deemed relevant to a terrorism investigation.

    Rate this question:

  • 33. 

                     The ____ prohibits transmissions of harmful computer programs and code, including viruses.

    • A.

      Computer Matching and Privacy Act of 1988

    • B.

      Computer Abuse Amendments Act of 1994

    • C.

      Video Privacy Act of 1988

    • D.

      USA Patriot Act of 2001

    Correct Answer
    B. Computer Abuse Amendments Act of 1994
    Explanation
    The Computer Abuse Amendments Act of 1994 is the correct answer because it specifically addresses the prohibition of transmissions of harmful computer programs and code, including viruses. The other options listed do not pertain to this specific issue.

    Rate this question:

  • 34. 

    The hazardous activities associated with poorly designed work environments are collectively referred to as ____.

    • A.

      Malware

    • B.

      Biometrics

    • C.

      Carpal tunnel syndrome

    • D.

      Work stressors

    Correct Answer
    D. Work stressors
    Explanation
    The correct answer is work stressors. Work stressors refer to the various factors and conditions in a poorly designed work environment that can have a negative impact on employees' physical and mental well-being. These stressors can include excessive workload, lack of job control, poor communication, inadequate resources, and other factors that contribute to a hazardous and stressful work environment.

    Rate this question:

  • 35. 

    Practitioners in many professions subscribe to a ____ that states the principles and core values that are essential to their work and thus governs their behavior.

    • A.

      Standard

    • B.

      Protocol

    • C.

      Law

    • D.

      Code of ethics

    Correct Answer
    D. Code of ethics
    Explanation
    Practitioners in many professions follow a code of ethics, which outlines the fundamental principles and core values that are crucial to their work. This code serves as a guide for their behavior and governs their actions in their respective professions. It helps ensure that practitioners maintain high standards of conduct and integrity while carrying out their duties.

    Rate this question:

  • 36. 

    Computer-related ____________________ refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error.

    Correct Answer
    Mistakes
    mistakes
    mistake
    Mistake
    Explanation
    Computer-related mistakes refer to errors, failures, and other computer problems that make computer output incorrect or not useful, caused mostly by human error. These mistakes can include typos, incorrect data entry, programming errors, or incorrect configuration settings. They can lead to inaccurate calculations, faulty outputs, system crashes, or data corruption. It is important to minimize these mistakes through careful attention to detail, proper training, and implementing quality control measures.

    Rate this question:

  • 37. 

    A(n) ____________________ is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.

    Correct Answer
    cyberterrorist
    cyber terrorist
    Cyberterrorist
    Cyber Terrorist
    Cyber terrorist
    Explanation
    A cyberterrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.

    Rate this question:

  • 38. 

    Under the ______________________________ Act, the Federal Trade Commission (FTC) is assigned responsibility to help victims restore their credit and erase the impact of the imposter.

    Correct Answer
    Identity Theft and Assumption Deterrence
    Identity theft and assumption deterrence
    identity theft and assumption deterrence
    ITAD
    Explanation
    The correct answer is "Identity Theft and Assumption Deterrence." Under this act, the Federal Trade Commission (FTC) is responsible for assisting victims in restoring their credit and eliminating the effects of the imposter.

    Rate this question:

  • 39. 

    The U.S. Congress passed the ______________________________ Act of 1998 to fight identity theft.

    Correct Answer
    Identity Theft and Assumption Deterrence
    Identity theft and assumption deterrence
    identity theft and assumption deterrence
    ITAD
    Explanation
    The correct answer is "Identity Theft and Assumption Deterrence". This act was passed by the U.S. Congress in 1998 with the aim of combating identity theft. It was enacted to deter individuals from assuming another person's identity and engaging in fraudulent activities. The act addresses various aspects of identity theft, including prevention, detection, and punishment for offenders. It is an important legislation that has helped in raising awareness about identity theft and implementing measures to protect individuals from this crime.

    Rate this question:

  • 40. 

    ____________________ are wannabe crackers with little technical savvy - crackers who download programs called scripts - that automate the job of breaking into computers.

    Correct Answer
    Script Bunnies
    Script bunnies
    script bunnies
    script Bunnies
    Explanation
    Script bunnies refers to individuals who aspire to be hackers but lack technical knowledge. They rely on downloading scripts, which are programs that automate the process of hacking into computers. The term "script bunnies" is used to describe these wannabe hackers who lack the skills and expertise of experienced crackers.

    Rate this question:

  • 41. 

    A(n) ____________________ is a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code.

    Correct Answer
    Variant
    variant
    Explanation
    A variant is a modified version of a virus that is produced by the virus's author or another person who amends the original virus code. Variants can have different characteristics and behaviors compared to the original virus, making them potentially more dangerous or harder to detect and remove. These modifications can include changes in the way the virus spreads, its payload, or its ability to evade detection by antivirus software. Overall, variants are a common strategy used by virus authors to continuously evolve and adapt their malicious software.

    Rate this question:

  • 42. 

    A(n) ____________________ is a small program hidden in a network or a computer system that records identification numbers and passwords.

    Correct Answer
    Password Sniffer
    Password sniffer
    password sniffer
    password Sniffer
    Explanation
    A password sniffer is a small program that is covertly installed in a network or computer system with the purpose of capturing and recording identification numbers and passwords. It operates in a hidden manner, allowing it to intercept and collect sensitive login information without the user's knowledge or consent.

    Rate this question:

  • 43. 

    ____________________ occurs when someone makes unauthorized use of another’s patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.

    Correct Answer
    Patent infringement
    Patent Infringement
    patent infringement
    patent Infringement
    Explanation
    Patent infringement occurs when someone makes unauthorized use of another's patent. If a court determines that a patent infringement is intentional, it can award up to three times the amount of damages claimed by the patent holder.

    Rate this question:

  • 44. 

                     ____________________ is the aggravation of the pathway for nerves that travel through the wrist.

    Correct Answer
    CTS
    Carpal Tunnel Syndrome
    carpal tunnel syndrome
    Carpal tunnel syndrome
    Explanation
    Carpal tunnel syndrome (CTS) is the aggravation of the pathway for nerves that travel through the wrist. This condition occurs when the median nerve, which runs from the forearm to the hand, becomes compressed or squeezed at the wrist. This compression can cause symptoms such as pain, numbness, tingling, and weakness in the hand and fingers. CTS is commonly caused by repetitive hand and wrist movements, as well as certain medical conditions such as arthritis and diabetes. Treatment options for CTS include wrist splints, medications, physical therapy, and in severe cases, surgery.

    Rate this question:

  • 45. 

    ____________________ screens provide a much better viewing experience for your eyes by virtually eliminating flicker and while still being bright without harsh incandescence.

    Correct Answer
    LCD
    Liquid Crystal Display
    liquid crystal display
    lcd
    Liquid crystal display
    Explanation
    LCD stands for Liquid Crystal Display, which is a type of screen that provides a much better viewing experience for the eyes compared to other types of screens. LCD screens virtually eliminate flickering, which can cause eye strain and fatigue. Additionally, LCD screens are bright without emitting harsh incandescent light, making them easier on the eyes.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 15, 2011
    Quiz Created by
    Rvalatnational_e
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.