Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
(True/False)
4.9/5
(36)
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
(Multiple Choice)
4.8/5
(27)
Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.
(Essay)
4.9/5
(37)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
(Multiple Choice)
4.7/5
(38)
If a company does not have a formal email policy, it can read email messages without employee notification.
(True/False)
4.8/5
(31)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
In the encryption process, the unencrypted, readable data.
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
ciphertext
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(34)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
(Multiple Choice)
4.8/5
(30)
It is illegal for employers to use software programs that monitor employees.
(True/False)
4.9/5
(46)
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
(Multiple Choice)
4.9/5
(35)
COGNITIVE ASSESSMENT Which of the following does a new federal laboratory use in its high security areas?
(Multiple Choice)
4.8/5
(40)
COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters.What is this technology?
(Multiple Choice)
4.9/5
(40)
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
(Multiple Choice)
4.8/5
(33)
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
(True/False)
4.7/5
(40)
If you are nervous, a signature might not match the one on file in a signature verification system.
(True/False)
5.0/5
(37)
COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
(Multiple Choice)
4.8/5
(32)
If a program or device has a default password, be sure to retain it.
(True/False)
4.8/5
(46)
COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?
(Multiple Choice)
4.8/5
(36)
Critical Thinking Questions Case 5-1 One form of software theft is the theft of the software from software manufacturers, which is known as piracy.Because this has historically been rather easy to do, the practice has become very common.As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples.Which of the following practice IS permissible under a single-user license agreement?
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)