Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?
(Multiple Choice)
4.8/5
(30)
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
(Short Answer)
4.8/5
(34)
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
(Multiple Choice)
4.8/5
(22)
During virtual browsing, your browser does not keep track of the websites you are visiting.
(True/False)
4.9/5
(43)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
(Multiple Choice)
4.8/5
(28)
As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

(True/False)
4.9/5
(32)
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
(Multiple Choice)
4.7/5
(36)
To read encrypted data, the recipient must decipher it into a readable form.What is the term for this process?
(Multiple Choice)
4.9/5
(41)
COGNITIVE ASSESSMENT Which of the following statements is not true about Internet and network attacks?
(Multiple Choice)
4.8/5
(34)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
Makes it illegal to circumvent antipiracy schemes in commercial software.
Responses:
iris recognition system
piracy
Digital Millennium Copyright Act (DCMA)
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(41)
COGNITIVE ASSESSMENT Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
(Multiple Choice)
4.8/5
(43)
A(n) ____________________ object is any item that must be carried to gain access to a computer or computer facility.
(Short Answer)
4.8/5
(44)
COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.
(Multiple Choice)
4.9/5
(40)
COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
(Multiple Choice)
4.8/5
(33)
COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
(Multiple Choice)
4.8/5
(45)
COGNITIVE ASSESSMENT Which of the following statements is not true about intellectual property rights?
(Multiple Choice)
4.8/5
(43)
COGNITIVE ASSESSMENT Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
(Multiple Choice)
4.9/5
(31)
Showing 81 - 100 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)