Contents

The “What you are” criteria to access computer system is called…….
a) badge                                               
b) biometrics
c) magnetic hard 
d) password

b

Computer crimes are usually…..
a) committed by insider   
b) prosecuted
c) easy to detect  
d) none of these


a

Which of the following method is used to minimize junk email?
a) software                           
b) 
do not reply message
c) use a separate name
d) all of these


d

What refers to human factors related to the use of computers?
a) employee monitoring    
b) ergonomic
c) child monitoring             
d) 
energy management


b

Which of the following refer to the addressing the environmental impact of computer use in an environmentally responsible manner?
a) ethical computing
b) 
green computing
c) fair use                             
d) both a & b


b

What standard are required by many organizations for all newly purchased computer equipment?
a) energy star     
b) ACM
c) HUD
d) DNR


a