Answer the following statement(s) true (T) or false (F)

1. Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
2. Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user.
3. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
4. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
5. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.


1. True
2. False
3. True
4. True
5. False

Computer Science & Information Technology

You might also like to view...

Cognitive surplus results from combination of leisure time and creativity tools.

Indicate whether the statement is true or false.

Computer Science & Information Technology

If you were using relative cell references, the formula =A3+A4 would change to ____ when copied from cell A5 to cell B5.

A. =B3+B4 B. =B4+B5 C. =$B3+$B4 D. =B$4+B$5

Computer Science & Information Technology

A company is evaluating cloud providers to reduce the cost of its internal IT operations. The company's aging systems are unable to keep up with customer demand. Which of the following cloud models will the company MOST likely select?

A. PaaS B. SaaS C. IaaS D. BaaS

Computer Science & Information Technology

Which of the following WAN technology types provides the FASTEST speeds?

a) OC3 b) SDSL c) ADSL d) T3

Computer Science & Information Technology