Preview

The CNC Machinist: Quiz

Powerful Essays
Open Document
Open Document
7255 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The CNC Machinist: Quiz
Quiz Submissions - Quiz 12 (Chap 8)

Attempt 1
Written: Apr 17, 2014 5:48 PM - Apr 17, 2014 6:24 PM
Submission View
Your quiz has been submitted successfully.
Chapter 8
Question 1 1 / 1 point
An architectural firm's blueprints, sketches and other proprietary documents are examples of ____. Question options: A) public property

B) intellectual property

C) real property

D) immovable property

View Feedback

Question 2 1 / 1 point
A virus is software that is written with malicious intent to cause annoyance or damage. Question options: A) True B) False View Feedback

Question 3 1 / 1 point
Which of the following should a person do to protect their personal information? Question options: A) Avoid using special characters in passwords.

B) Do not provide information to people who contact you by e-mail.

C) Avoid providing answers that are hard to guess as responses to security questions.

D) Do not enter those Web sites where https:// appears in the Web browser.

View Feedback

Question 4 0 / 1 point
_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software. Question options: A) Pirated software

B) File sharing

C) Torrent poisoning

D) Phishing

Hide Feedback

Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Software piracy costs businesses billions of dollars a year in lost revenue. Question 5 1 / 1 point
_____ is the right to be left alone when one wants to be, to have control over one's own personal possessions, and not to be observed without one's consent. Question options: A) Non-disclosure

B) Intellectual property

C) Personalization

D) Privacy

View Feedback

Question 6 1 / 1 point
The _____ sought to regulate interstate commerce by imposing limitations and penalties on businesses sending unsolicited e-mail to consumers.

You May Also Find These Documents Helpful

  • Powerful Essays

    JOUR 371 chapter notes

    • 2505 Words
    • 11 Pages

    A. There is no specific mention of a right to privacy, by that name, in the…

    • 2505 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Cypop 5 Task 1 Legislation

    • 4661 Words
    • 19 Pages

    * Right to Respect for Private Life- protects against unnecessary surveillance or intrusion into your private and family life.…

    • 4661 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    English Final Review

    • 834 Words
    • 4 Pages

    5. Thomas Jefferson described life, liberty, and the pursuit of happiness as __unalienable___ rights because they could not be taken away.…

    • 834 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Privacy: You have the right to privacy, and to keep and use your personal belongings and property as long as it doesn't interfere with the rights,…

    • 1536 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    3

    • 825 Words
    • 3 Pages

    The general right of the individuals to be shielded from unjustifiable hunt and seizures in their own particular homes by police and other law requirement.…

    • 825 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    12. Natural rights rights that existed prior the govts and society thus they cannot be taken away…

    • 1145 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    4. Guarantees the right to be free from unreasonable searches and seizures of our homes, our bodies, or our property, conducted by government officials…

    • 1053 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mla Format - Abortion

    • 821 Words
    • 4 Pages

    The right of the people to be secure in their persons, houses, papers, and effects, against…

    • 821 Words
    • 4 Pages
    Good Essays
  • Good Essays

    4. Legal Rights – everyone granted a right to life, liberty, and security of person. Secure from unreasonable search and seizure, detention or…

    • 989 Words
    • 4 Pages
    Good Essays
  • Good Essays

    - they put at stake their own life in order to have or to show a strong character.…

    • 2064 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Violation of software also known as “Software Piracy” is a worldwide problem. People copy the software for commercial uses or maybe just for personal gain. The software companies have tried many methods to prevent violation of license agreements. They have tried many copy protected schemes and many have failed.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays

Related Topics