Exam 6: Creating, sorting, and Querying a Table

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Emma downloaded a new game from an unfamiliar website.A few days later,Emma realized her system had been hacked and her credit card numbers were stolen.Without Emma knowing,what type of malware might she have downloaded to her computer?

(Multiple Choice)
4.8/5
(41)

Isabel received a message on her computer that appeared to be from the FBI.It informed her that her computer has been locked and she would need to pay a fee to retrieve her data.How would you describe what is happening?

(Multiple Choice)
4.9/5
(36)

Which of the following is a characteristic of a strong password?

(Multiple Choice)
4.9/5
(38)

Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.

(True/False)
4.9/5
(29)

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

(Multiple Choice)
4.8/5
(29)

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

(Multiple Choice)
4.7/5
(36)

After Penny broke up with her boyfriend,he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating.He even lied about their breakup,creating rumors about her behavior.Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated.Penny is a victim of ________.

(Multiple Choice)
4.7/5
(22)

There are various risks from attacks on Wi-Fi networks.These include all of the following EXCEPT _____.

(Multiple Choice)
4.8/5
(33)

Which is a first step to deter thieves from accessing your financial information?

(Multiple Choice)
4.7/5
(31)

To protect your information and help you to remember passwords,use your social media account login information to log into another site.

(True/False)
4.7/5
(38)

How will you decide which browser security settings to allow and which ones to block?

(Multiple Choice)
4.8/5
(40)

How is a worm different from a Trojan?

(Multiple Choice)
4.9/5
(33)
Showing 21 - 32 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)