Exam 9: Securing Your System: Protecting Your Digital Data and Devices
Exam 1: The Impact of Technology in a Changing World120 Questions
Exam 2: Looking at Computers: Understanding the Parts140 Questions
Exam 3: Using the Internet: Making the Most of the Webs Resources129 Questions
Exam 4: Application Software: Programs That Let You Work and Play124 Questions
Exam 5: System Software: the Operating System, Utility Programs, and File Management133 Questions
Exam 6: Understanding and Assessing Hardware: Evaluating Your System134 Questions
Exam 7: Networking: Connecting Computing Devices132 Questions
Exam 8: Managing a Digital Lifestyle: Challenges and Ethics128 Questions
Exam 9: Securing Your System: Protecting Your Digital Data and Devices135 Questions
Exam 10: Behind the Scenes: Software Programming130 Questions
Exam 11: Behind the Scenes: Databases and Information Systems134 Questions
Exam 12: Behind the Scenes: Networking and Security in the Business World127 Questions
Exam 13: Behind the Scenes: How the Internet Works124 Questions
Exam 14: Technology In Action Complete: Appendix A41 Questions
Exam 15: Technology In Action Complete: Appendix B36 Questions
Select questions type
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
(Multiple Choice)
4.8/5
(34)
________ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
(Short Answer)
4.9/5
(35)
A(n) ________-hat hacker illegally penetrates a system simply to demonstrate the hacker's expertise to the system administrator.
(Short Answer)
4.7/5
(32)
Taking someone's personal information and posing as that person for financial or legal transactions is known as ________.
(Multiple Choice)
4.8/5
(33)
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________.
(Short Answer)
4.9/5
(34)
________ is malware that tries to convince you that your computer is infected with a virus.
(Short Answer)
4.8/5
(33)
Using a ____program, hackers can access and delete all the files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
(Short Answer)
4.9/5
(38)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(42)
A firewall designed specifically for home networks is called a ________ firewall.
(Short Answer)
4.8/5
(31)
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ________ program.
(Short Answer)
4.9/5
(38)
________ occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses.
(Short Answer)
4.8/5
(39)
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
(Multiple Choice)
4.9/5
(37)
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________.
(Short Answer)
4.8/5
(25)
Match each of the following terms to its meaning:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(32)
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
(Multiple Choice)
4.7/5
(19)
Showing 41 - 60 of 135
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)