Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
(Multiple Choice)
4.8/5
(30)
Identify the letter of the choice that best matches the phrase or definition.
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(35)
COGNITIVE ASSESSMENT Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
(Multiple Choice)
4.9/5
(37)
COGNITIVE ASSESSMENT Which of the following does your college use to verify your identity?
(Multiple Choice)
4.9/5
(36)
COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
(Multiple Choice)
4.9/5
(38)
The most common type of license included with software purchased by individual users is a(n) ____________________.
(Short Answer)
4.8/5
(37)
Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
(True/False)
4.8/5
(27)
COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?
(Multiple Choice)
4.9/5
(30)
Your browsing history is a list of all websites you have visited over a period of time.
(True/False)
4.8/5
(30)
Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.
(Short Answer)
4.9/5
(37)
COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?
(Multiple Choice)
4.9/5
(33)
COGNITIVE ASSESSMENT Which term is used to describe software used by cybercriminals?
(Multiple Choice)
4.7/5
(39)
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
(True/False)
4.8/5
(29)
COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
(Multiple Choice)
4.8/5
(36)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?
(Multiple Choice)
4.8/5
(34)
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
(Multiple Choice)
4.9/5
(39)
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
(Multiple Choice)
4.7/5
(25)
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
(True/False)
4.8/5
(28)
Proximity sharing gives websites access to your current location.
(True/False)
4.7/5
(35)
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
(Multiple Choice)
4.8/5
(30)
Showing 81 - 100 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)