E-Commerce

Chapter 6: Ethical, Legal, and Social Responsibilities in E-Commerce

Chapter Practice Tests

Select the best answer for the questions below.

1
A ______ is a form of protection for the original works of an author.
A)trademark
B)copyright
C)patent
D)cyberlaw
2
The _____ is a written, legally binding statement informing users about how their personal information will be managed.
A)privacy policy
B)copyright
C)patent
D)cyberlaw
3
A person who uses technical expertise to break into a computer system is called a _____.
A)worm
B)virus
C)spammer
D)hacker
4
People who register domain names of well-known companies with the sole purpose of selling the names back to the rightful owner at a profit are called _____.
A)worms
B)cybersquatters
C)hackers
D)fraud techs
5
A(n) _____ is a combination of hardware and software used to block hackers.
A)firewall
B)stonewall
C)encryption device
D)PGP device
6
A software program that limits access to Web sites on the Internet is called a(n) _____.
A)computer virus
B)worm
C)Internet filter
D)encryption device
7
_____ is the scrambling of data from plain text into code once it is sent from the computer.
A)An Internet filter
B)Encryption
C)A firewall
D)Spam
8
A program designed to inflict harm on a computer system is called a _____.
A)firewall
B)spam
C)PGP
D)virus
9
A program that replicates itself exponentially is called a _____.
A)firewall
B)spam
C)worm
D)virus
10
A programming code added to a software program on the computer that lies dormant until a predetermined time is called a(n) _____.
A)logic bomb
B)spam
C)bastion host
D)EFF
Glencoe Online Learning CenterBusiness Administration HomeProduct InfoSite MapContact Us

The McGraw-Hill CompaniesGlencoe