30 likes | 149 Views
Ch15QQ. 1 . Hardware theft includes the theft of portable computers as well as desktop computers. 2 . A surge suppressor can be used to protect a computer against theft. 3 . A good disaster-recovery plan includes information about where backup media is located.
E N D
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer against theft. 3. A good disaster-recovery plan includes information about where backup media is located. 4. Only data from online purchases end up in marketing databases. 5. An e-mail filter is used to keep track of the e-mail addresses of people you write frequently.
Ch15QQ __ 6. Which of the following allows your computer to be used when the power goes out? a. UPS b. encryption c. cable lock d. surge protector e. computer tracking software __ 7. Having control over how information about you is collected and used is referred to as: a. presence technology b. employee monitoring c. opting out d. privacy policy e. information privacy
Ch15QQ a. privacy policy b. software piracy c. backup d. throw-away e-mail address e. digital counterfeiting __ 8. Used to prevent spam. __ 9. Used to restore data when the original data is lost or damaged. __ 10.The unauthorized copying of a computer program.