UExcel Business Information Systems: Study Guide & Test Prep  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Personal & Social Impact of Computers Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Which of the following is NOT a program used by employers to monitor employees' computer usage?

Question 2 2. _____ is a small data file stored on a computer hard drive by a website when the user visits the site.

Question 3 3. A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

Question 4 4. Which of the following is NOT something you can do to reduce the risk of cyber crime on your system?

Question 5 5. Which of the following is NOT a type of cyber crime?

Page 2

Question 6 6. Which of the following cyber crimes deals with sending unwanted information to a target or set of targets?

Question 7 7. When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security.

Question 8 8. When Elliot plants malicious code on a corporate computer that will destroy files he is considered a _____.

Question 9 9. Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?

Question 10 10. Malware that is used to steal your information and send it to a third party is known as _____

Page 3

Question 11 11. What type of malware takes over your web browser to change settings, such as your homepage or preferred search engine?

Question 12 12. Malware is used to describe all types of bad software. Malware is a combination of what two words?

Question 13 13. In 2014, testimony before the Senate detailed several major cyber terrorism attacks on the U.S. by various groups. The testimony came from the Executive Assistant Director of this agency:

Question 14 14. When are you, as a private individual, vulnerable to a cyber attack?

Question 15 15. GameOverZeus is a _____, which is a sophisticated piece of software that is illegally inserted into a computer in order to spy on the user.

Page 4

Question 16 16. Which of the following statements about cyberstalking is TRUE?

Question 17 17. What is identity theft?

Question 18 18. Which of the following is an example of phishing?

Question 19 19. A privacy policy may be used by a company so that employees _____.

Question 20 20. How does the COPPA protect the privacy of children?

Page 5

Question 21 21. What corporate officer manages security and privacy technology factors?

Question 22 22. Computers have positively impacted the work process by _____.

Question 23 23. One of the most positive impacts of computers in the work environment includes savings in _____.

Question 24 24. Privacy issues normally raised by employees include _____.

Question 25 25. Which of the following is an example of an intellectual property?

Page 6

Question 26 26. Which term refers to software that is distributed for free with accessible source code that can be modified and improved by anyone?

Question 27 27. Copyright law gives authors the exclusive rights to their work, including the right to make copies for the author's lifetime plus how many years after death?

Question 28 28. Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

Question 29 29. Which of the following is a characteristic of cyber crime?

Question 30 30. Which of the following is an unintentional threat to the security of computer networks?

Personal & Social Impact of Computers Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support