Exam 22: Computer Benefits and Risks
Exam 1: Computer Hardware75 Questions
Exam 2: Peripheral Devices75 Questions
Exam 3: System and Application Software75 Questions
Exam 4: Installing Software75 Questions
Exam 5: Getting Started With Windows75 Questions
Exam 6: Working With Windows Settings and Accounts75 Questions
Exam 7: Working With Files75 Questions
Exam 8: Getting Started With Application Software75 Questions
Exam 9: Creating a Document75 Questions
Exam 10: Formatting a Document75 Questions
Exam 11: Finalizing a Document75 Questions
Exam 12: Creating a Worksheet75 Questions
Exam 13: Formatting a Worksheet75 Questions
Exam 14: Finalizing a Worksheet75 Questions
Exam 15: Creating a Presentation75 Questions
Exam 16: Finalizing a Presentation75 Questions
Exam 17: Creating a Database75 Questions
Exam 18: Finalizing a Database75 Questions
Exam 19: Networks75 Questions
Exam 20: Working With E-Mail75 Questions
Exam 21: Browsing the Web75 Questions
Exam 22: Computer Benefits and Risks75 Questions
Select questions type
The practice of searching the Internet for unprotected computers is called a(n) ____________________.
(Short Answer)
4.9/5
(34)
You should configure _____ to set Windows to display file extensions.
(Multiple Choice)
4.8/5
(34)
Modern antivirus software attempts to locate viruses by watching for a virus _____.
(Multiple Choice)
4.8/5
(45)
Compression utilities scramble the data in a file by using a multi-digit key.
(True/False)
4.9/5
(36)
A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.
(Multiple Choice)
4.8/5
(29)
Subscribing to a mailing list or RSS feed from Computer Weekly or InfoWorld can bring computer news and commentary right to your desktop.
(True/False)
4.9/5
(39)
The most popular computer magazines include all of the following, EXCEPT _____.
(Multiple Choice)
4.8/5
(41)
Referring to the accompanying figure, which of the following allows a work to be used for personal purposes?

(Multiple Choice)
4.9/5
(39)
The most prevalent types of malicious code include all of the following, EXCEPT _____.
(Multiple Choice)
4.9/5
(34)
Refining is the technical method used to carry out electronic censorship by blocking Web sites, blogs, forums, or other Internet content from reaching certain audiences.
(True/False)
4.8/5
(43)
On networks, ____________________ works by scrambling data as it leaves your computer so that data is in encrypted format while in transit.
(Short Answer)
4.8/5
(38)
A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book.
(Multiple Choice)
4.8/5
(44)
One of the forms of malicious code is a worm. Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.
(Essay)
4.9/5
(42)
____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.
(Short Answer)
4.9/5
(40)
Circumventing copyright law and illegally copying, distributing, or modifying protected works is sometimes referred to as _____.
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)