Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Digital Literacy: Introducing a World of Technology181 Questions
Exam 2: The Internet: Accessing, Searching, Sharing, and Communicating181 Questions
Exam 3: Computers and Mobile Devices: Evaluating the Possibilities181 Questions
Exam 4: Programs and Apps: Using Software at Work, School, and Home181 Questions
Exam 5: Digital Safety and Security: Identifying Threats, Issues, and Defenses181 Questions
Exam 6: Inside Computers and Mobile Devices: Exploring the Components181 Questions
Exam 7: Input and Output: Examining Popular Devices181 Questions
Exam 8: Digital Storage: Preserving on Media and on the Cloud181 Questions
Exam 9: Operating Systems: Managing, Coordinating, and Monitoring Resources181 Questions
Exam 10: Communications and Networks: Sending and Receiving Digital Content181 Questions
Exam 11: Information and Data Management: Organizing, Verifying, Maintaining, and Accessing181 Questions
Exam 12: Information Systems and Program Development: Designing and Building Solutions181 Questions
Select questions type
A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.
(Short Answer)
4.8/5
(34)
Which of the following categories are the rights to which creators are entitled for their work?
(Multiple Choice)
4.9/5
(36)
With a three-generation backup policy, the grandparent is which of the following?
(Multiple Choice)
4.9/5
(35)
Which of the following is not a security product developer?
(Multiple Choice)
4.8/5
(36)
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
(True/False)
4.8/5
(31)
COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?
(Multiple Choice)
4.9/5
(32)
Which of the following copies all of the files in a computer?
(Multiple Choice)
4.9/5
(39)
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
(Multiple Choice)
4.8/5
(39)
COGNITIVE ASSESSMENT Which of the following does your financial institution use to reduce fraud?
(Multiple Choice)
4.9/5
(37)
Many businesses use which of the following to limit employees' web access?
(Multiple Choice)
4.9/5
(32)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
(Multiple Choice)
4.9/5
(31)
COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter. Which algorithm did you use?
(Multiple Choice)
4.9/5
(36)
A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.
(Short Answer)
4.9/5
(30)
____________________ is the unauthorized and illegal duplication of copyrighted software.
(Short Answer)
4.9/5
(41)
Discuss the four types of software theft.
(Not Answered)
This question doesn't have any answer yet
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
(Multiple Choice)
4.7/5
(30)
Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
(True/False)
4.8/5
(36)
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
(Multiple Choice)
4.8/5
(29)
Websites use which of the following to keep track of items in a user's shopping cart?
(Multiple Choice)
5.0/5
(42)
Showing 141 - 160 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)