The “What you are” criteria to access computer system is called…….
a) badge
b) biometrics
c) magnetic hard
d) password
Computer crimes are usually…..
a) committed by insider
b) prosecuted
c) easy to detect
d) none of these
Which of the following method is used to minimize junk email?
a) software
b) do not reply message
c) use a separate name
d) all of these
What refers to human factors related to the use of computers?
a) employee monitoring
b) ergonomic
c) child monitoring
d) energy management
Which of the following refer to the addressing the environmental impact of computer use in an environmentally responsible manner?
a) ethical computing
b) green computing
c) fair use
d) both a & b
What standard are required by many organizations for all newly purchased computer equipment?
a) energy star
b) ACM
c) HUD
d) DNR