Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart as shown in the accompanying figure.

(True/False)
4.9/5
(36)
A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

(Short Answer)
4.9/5
(36)
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
(True/False)
4.8/5
(33)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Most systems require that a user selects this on his or her own.
Responses:
firewall
zombie
clickjacking
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
(True/False)
4.9/5
(48)
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
(Multiple Choice)
4.8/5
(27)
Perpetrators of back doors trick their victims into interacting with phony websites.
(True/False)
4.8/5
(40)
What is the term for a program that performs a repetitive task on a network?
(Multiple Choice)
4.8/5
(40)
COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?
(Multiple Choice)
4.8/5
(36)
With a three-generation backup policy, the grandparent is which of the following?
(Multiple Choice)
4.8/5
(46)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A group of compromised computers.
Responses:
digital signature
iris recognition system
piracy
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
Programmers often build trapdoors into programs during system development.
(True/False)
4.9/5
(26)
Which of the following terms refers to making a copy of a file?
(Multiple Choice)
4.7/5
(39)
What is the term for a website that uses encryption techniques to protect its data?
(Multiple Choice)
4.7/5
(40)
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
(True/False)
4.9/5
(30)
A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
(Short Answer)
4.8/5
(41)
Any illegal act involving a computer generally is referred to as a computer crime.
(True/False)
4.7/5
(41)
COGNITIVE ASSESSMENT Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
(Multiple Choice)
4.7/5
(38)
Showing 181 - 200 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)