help please
26. To minimize the invasion of privacy, a. enable access to one’s personal information to all interested parties. b. keep collected information even after the stated purpose is over. users and organizations should: c. use verification procedures to ensure data accuracy. d. collect both necessary and unnecessary data. 27. To minimize the invasion of privacy, the existence of record-keeping systems storing personal data should not: a. be kept secret. b. have a stated purpose. c. be up-to-date. d. be restricted.
can interfere with users’ control of their computers, through such methods as 29 installing additional software and redirecting Web browsers. a. Kernels b. Spyware C. Cookies d. Log files 30. is the process of capturing and recording network traffic. a. Sniffing b. Phishing c. Spoofing d. Pharming 31. Similar to phishing,_ intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. a. sniffing b. spoofing is directing Internet users to fraudulent Web sites with the c. pharming d. cybersquatting 32. is a computer crime that involves destroying or disrupting computer services. a. Sabotage b. Slander c. Libel d. Keystroke logging
26. To minimize the invasion of privacy, a. enable access to one’s personal information to all interested parties. b. keep collected information even after the stated purpose is over. users and organizations should: c. use verification procedures to ensure data accuracy. d. collect both necessary and unnecessary data. 27. To minimize the invasion of privacy, the existence of record-keeping systems storing personal data should not: a. be kept secret. b. have a stated purpose. c. be up-to-date. d. be restricted.
can interfere with users’ control of their computers, through such methods as 29 installing additional software and redirecting Web browsers. a. Kernels b. Spyware C. Cookies d. Log files 30. is the process of capturing and recording network traffic. a. Sniffing b. Phishing c. Spoofing d. Pharming 31. Similar to phishing,_ intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. a. sniffing b. spoofing is directing Internet users to fraudulent Web sites with the c. pharming d. cybersquatting 32. is a computer crime that involves destroying or disrupting computer services. a. Sabotage b. Slander c. Libel d. Keystroke logging
Answer
26. c. Use verification procedures to ensure data
accuracy is something which users and organizations should
do to minimize the invasion of privacy.
27. a. Be kept secret is something which the
existence of record-keeping systems storing personal data should
not be to minimize the invasion of privacy.
29. b. Spyware can interfere with users’
control of their computers, through such methods as installing
additional software and redirecting web browsers.
30. a. Sniffing is the process of capturing and
recording network traffic.
31. c. Pharming, which is similar to phishing,
is directing internet users to fraudulent web sites with the
intention of stealing their personal information, such as Social
Security numbers, passwords, bank account numbers, and credit card
numbers.
32. a. Sabotage is a computer crime that
involves destroying or disrupting computer services.