Exam 22: Computer Benefits and Risks
Exam 1: Computer Hardware75 Questions
Exam 2: Peripheral Devices75 Questions
Exam 3: System and Application Software75 Questions
Exam 4: Installing Software75 Questions
Exam 5: Getting Started With Windows75 Questions
Exam 6: Working With Windows Settings and Accounts75 Questions
Exam 7: Working With Files75 Questions
Exam 8: Getting Started With Application Software75 Questions
Exam 9: Creating a Document75 Questions
Exam 10: Formatting a Document75 Questions
Exam 11: Finalizing a Document75 Questions
Exam 12: Creating a Worksheet75 Questions
Exam 13: Formatting a Worksheet75 Questions
Exam 14: Finalizing a Worksheet75 Questions
Exam 15: Creating a Presentation75 Questions
Exam 16: Finalizing a Presentation75 Questions
Exam 17: Creating a Database75 Questions
Exam 18: Finalizing a Database75 Questions
Exam 19: Networks75 Questions
Exam 20: Working With E-Mail75 Questions
Exam 21: Browsing the Web75 Questions
Exam 22: Computer Benefits and Risks75 Questions
Select questions type
Microsoft Office provides utilities for saving files in an encrypted format.
(True/False)
4.8/5
(39)
A virus is the technical term for any type of intrusive program.
(True/False)
4.8/5
(43)
Identity ____________________ occurs when someone obtains your personal information and uses it without your permission to commit fraud or other crimes.
(Short Answer)
4.8/5
(31)
Which of the following refers to the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information?
(Multiple Choice)
4.9/5
(28)
The Gramm-Leach-Bliley Act (2002) established financial reporting regulations to prevent corporate fraud.
(True/False)
4.8/5
(46)
The process of eradicating a virus, sometimes called _____, might include deleting the virus code from files or deleting infected files.
(Multiple Choice)
4.7/5
(35)
Explain how you can use a router to protect your computer from intrusions.
(Essay)
4.9/5
(37)
Two networks can interconnect using a device called a(n) router .
(True/False)
4.9/5
(37)
A Web ____________________ is an object, such as tiny graphic, embedded on a Web page that sends a cookie to third-party Web sites.
(Short Answer)
4.8/5
(39)
Which one of the following laws or regulations interprets sections of the Communications Decency Act to mean that ISPs are not responsible for malicious software transmitted over their services by hackers?
(Multiple Choice)
4.8/5
(30)
Which of the following antivirus software is included with Windows 8?
(Multiple Choice)
4.7/5
(36)
In a typical LAN, the firewall is the only protection from the Internet for local devices.
(True/False)
4.9/5
(49)
____________________ software is designed to analyze the flow of traffic entering your computer from a network.
(Short Answer)
4.9/5
(36)
Showing 61 - 75 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)