Chapter 10 Multiple Choice

Select the best answer for each question below. When you are finished, check your answers. You can refresh this page to try a new multiple choice activity.

1. The Virus Radar On-line project is
create worm killers
monitor compliance with the Gramm-Leach-Bliley Act
designed to track the most serious virus threats
defend computer users from unlawful punishment under the Computer Fraud and Abuse Act
2. This virus recreates itself using Microsoft Outlook
Love Bug
3. This type of spyware may be a small image or line of HTML code hidden in an e-mail message
keystoke logger
Web bug
adware cookie
4. Outlaws transmission of viruses and other harmful computer code.
Trojan horse
electronic monitoring
Computer Abuse Amendments Act of 1994
5. Category of injuries resulting from fast, repetitive work that causes neck, wrist, hand, and arm pain.
adware cookie
cumulative trauma disorder
ad network cookie
6. The URLs of Web sites you visit is recorded in the browser's
anonymity preferences
security file
history file
electronic profile
7. Protection of software and data from unauthorized tampering or damage.
keystroke logger
data security
Internet scam
8. This law allows you to gain access to records held by credit bureaus
United States Privacy and Security Provision
Freedom of Information Act
Credit Security Proviso
American Credit Consumer Protection Declaration
9. Activity concerned with protecting hardware from possible human and natural disasters.
physical security
traditional cookies
Green PC
Software Copyright Act of 1980
10. Excess of electricity, which may destroy chips or other electronic computer components.
virus checker
voltage surge

Check answers