Exam 22: Computer Benefits and Risks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The practice of searching the Internet for unprotected computers is called a(n) ____________________.

(Short Answer)
4.9/5
(34)

You should configure _____ to set Windows to display file extensions.

(Multiple Choice)
4.8/5
(34)

A Trojan horse might allow a hacker to _____.

(Multiple Choice)
4.8/5
(47)

Modern antivirus software attempts to locate viruses by watching for a virus _____.

(Multiple Choice)
4.8/5
(45)

Which of the following is another term for "telecommuter"?

(Multiple Choice)
4.8/5
(32)

Compression utilities scramble the data in a file by using a multi-digit key.

(True/False)
4.9/5
(36)

Another name for a Web bug is a _____.

(Multiple Choice)
4.7/5
(33)

A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

(Multiple Choice)
4.8/5
(29)

Subscribing to a mailing list or RSS feed from Computer Weekly or InfoWorld can bring computer news and commentary right to your desktop.

(True/False)
4.9/5
(39)

The most popular computer magazines include all of the following, EXCEPT _____.

(Multiple Choice)
4.8/5
(41)

  Referring to the accompanying figure, which of the following allows a work to be used for personal purposes? Referring to the accompanying figure, which of the following allows a work to be used for personal purposes?

(Multiple Choice)
4.9/5
(39)

The most prevalent types of malicious code include all of the following, EXCEPT _____.

(Multiple Choice)
4.9/5
(34)

Refining is the technical method used to carry out electronic censorship by blocking Web sites, blogs, forums, or other Internet content from reaching certain audiences.

(True/False)
4.8/5
(43)

On networks, ____________________ works by scrambling data as it leaves your computer so that data is in encrypted format while in transit.

(Short Answer)
4.8/5
(38)

A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book.

(Multiple Choice)
4.8/5
(44)

One of the forms of malicious code is a worm. Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.

(Essay)
4.9/5
(42)

____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.

(Short Answer)
4.9/5
(40)

A key characteristic of viruses is their ability _____.

(Multiple Choice)
4.8/5
(32)

Circumventing copyright law and illegally copying, distributing, or modifying protected works is sometimes referred to as _____.

(Multiple Choice)
4.8/5
(36)

Windows Defender is included with Windows 8.

(True/False)
4.8/5
(33)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)