Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
(Multiple Choice)
4.9/5
(38)
Which of the following categories are the rights to which creators are entitled for their work?
(Multiple Choice)
4.8/5
(27)
One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
(True/False)
4.7/5
(33)
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
(Multiple Choice)
4.8/5
(33)
COGNITIVE ASSESSMENT In your encryption algorithm, you removed every third letter.Which algorithm did you use?
(Multiple Choice)
4.7/5
(40)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Protects a network's resources from intrusion.
Responses:
zombie
CA
AUP
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(31)
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
(Multiple Choice)
5.0/5
(45)
Explain three safeguards you can use to secure your wireless networks like the kind in the accompanying figure.

(Essay)
4.8/5
(36)
Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics.There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.Which of the following is NOT a question of computer ethics?
(Multiple Choice)
4.8/5
(28)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An authorized person or company that issues and verifies digital certificates.
Responses:
password
digital certificate
copyright
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(43)
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers.What was that percentage?

(Multiple Choice)
4.9/5
(44)
COGNITIVE ASSESSMENT The term, payload, as it pertains to computer crime, is defined as _____________.
(Multiple Choice)
4.8/5
(44)
COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?
(Multiple Choice)
4.9/5
(38)
Which of the following involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
(Multiple Choice)
4.9/5
(44)
COGNITIVE ASSESSMENT Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
(Multiple Choice)
4.9/5
(35)
COGNITIVE ASSESSMENT Which of the following statements is not true about software theft?
(Multiple Choice)
4.9/5
(34)
To protect yourself from social engineering scams, shred all sensitive or confidential documents.
(True/False)
4.8/5
(37)
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
(True/False)
4.8/5
(40)
Many companies use access controls to minimize the chance that a perpetrator may intentionally access or an employee may accidentally access confidential information on a computer, mobile device, or network.
(True/False)
4.8/5
(38)
Showing 61 - 80 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)