Attempt 1
Written: Apr 17, 2014 5:48 PM - Apr 17, 2014 6:24 PM
Submission View
Your quiz has been submitted successfully.
Chapter 8
Question 1 1 / 1 point
An architectural firm's blueprints, sketches and other proprietary documents are examples of ____. Question options: A) public property
B) intellectual property
C) real property
D) immovable property
View Feedback
Question 2 1 / 1 point
A virus is software that is written with malicious intent to cause annoyance or damage. Question options: A) True B) False View Feedback
Question 3 1 / 1 point
Which of the following should a person do to protect their personal information? Question options: A) Avoid using special characters in passwords.
B) Do not provide information to people who contact you by e-mail.
C) Avoid providing answers that are hard to guess as responses to security questions.
D) Do not enter those Web sites where https:// appears in the Web browser.
View Feedback
Question 4 0 / 1 point
_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software. Question options: A) Pirated software
B) File sharing
C) Torrent poisoning
D) Phishing
Hide Feedback
Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Software piracy costs businesses billions of dollars a year in lost revenue. Question 5 1 / 1 point
_____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. Question options: A) Non-disclosure
B) Intellectual property
C) Personalization
D) Privacy
View Feedback
Question 6 1 / 1 point
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.