Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
D
Many businesses use which of the following to limit employees' web access?
Free
(Multiple Choice)
5.0/5
(28)
Correct Answer:
A
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
Personal firewalls constantly monitor all transmissions to and from a computer and may inform a user of any attempted intrusion.
(True/False)
4.7/5
(32)
A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
(Short Answer)
4.8/5
(33)
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
(True/False)
4.8/5
(32)
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
(Multiple Choice)
4.8/5
(44)
Which of the following terms means in a location separate from the computer site?
(Multiple Choice)
4.9/5
(36)
____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.
(Short Answer)
4.8/5
(38)
Which of the following copies all of the files in a computer?
(Multiple Choice)
4.9/5
(38)
COGNITIVE ASSESSMENT What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
(Multiple Choice)
4.9/5
(30)
A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.
(Short Answer)
4.7/5
(31)
The most common type of license included with software purchased by individual users is a(n) ____________________.
(Short Answer)
4.7/5
(38)
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
(Multiple Choice)
4.9/5
(33)
COGNITIVE ASSESSMENT In your encryption algorithm, you replaced each letter with another letter.Which algorithm did you use?
(Multiple Choice)
4.9/5
(43)
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
(True/False)
4.8/5
(38)
A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
(Short Answer)
4.7/5
(45)
Discuss the measures you can take to safeguard home computers and devices.
(Essay)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects any tangible form of expression.
Responses:
ciphertext
piracy
DoS attack
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(31)
Showing 1 - 20 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)