Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
(True/False)
4.8/5
(42)
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
(Multiple Choice)
4.8/5
(28)
What is the term for a program that performs a repetitive task on a network?
(Multiple Choice)
4.9/5
(42)
Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware
(Not Answered)
This question doesn't have any answer yet
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.8/5
(32)
COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
(Multiple Choice)
4.8/5
(41)
Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. Which of the following practice IS permissible under a single-user license agreement?
(Multiple Choice)
4.8/5
(33)
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
(True/False)
4.9/5
(34)
COGNITIVE ASSESSMENT Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
(Multiple Choice)
4.9/5
(33)
Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

(Not Answered)
This question doesn't have any answer yet
Internet advertising firms often use which of the following to collect information about users web browsing habits?
(Multiple Choice)
4.9/5
(38)
COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?
(Multiple Choice)
4.8/5
(32)
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?

(Multiple Choice)
4.9/5
(35)
Some operating systems and email programs allow you to encrypt the contents of files and messages that are stored on your computer.
(True/False)
4.7/5
(39)
Programmers often build trapdoors into programs during system development.
(True/False)
4.7/5
(41)
A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
(Short Answer)
4.9/5
(38)
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
(Multiple Choice)
4.9/5
(38)
____________________ occurs when someone steals personal or confidential information.
(Short Answer)
4.8/5
(32)
Showing 21 - 40 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)