Exam 2: Computer Terminology and History
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
Free
(Short Answer)
4.8/5
(41)
Correct Answer:
Peer-to-peer networking
Which of the following is known as the "baby" of computer operating systems and is freely distributed?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
D
Software is composed of components that are physical or tangible in nature.
(True/False)
4.9/5
(31)
Which of the following is the first modern digital computer?
(Multiple Choice)
5.0/5
(38)
Which of the following devices introduces commands and information to the computer?
(Multiple Choice)
4.8/5
(42)
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
(Short Answer)
4.7/5
(31)
Which of the following refers to the unauthorized attempt to gain access to information about a system?
(Multiple Choice)
4.9/5
(36)
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?
(Multiple Choice)
4.7/5
(40)
Match the innovator in computer technology with his contribution.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(41)
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
(Short Answer)
4.9/5
(34)
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
(True/False)
4.9/5
(36)
Which of the following tells the computer in which order to access drives?
(Multiple Choice)
4.7/5
(38)
For users, 24-hour accessibility equates to 24-hour vulnerability.
(True/False)
4.7/5
(36)
Explain how the Internet has become the backbone for global communications and transnational capitalism.
(Essay)
4.9/5
(34)
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
(Short Answer)
4.9/5
(40)
In which Mac OS did Apple introduce its first Unix-based operating system?
(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)