Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses
Exam 1: Office 2013 and Windows 8 Essential Concepts and Skills112 Questions
Exam 2: Digital Literacy: Introducing a World of Technology200 Questions
Exam 3: The Internet: Accessing, Searching, Sharing, and Communicating200 Questions
Exam 4: Computers and Mobile Devices: Evaluating the Possibilities200 Questions
Exam 5: Programs and Apps: Using Software at Work, School, and Home200 Questions
Exam 6: Digital Safety and Security: Identifying Threats, Issues, and Defenses200 Questions
Exam 7: Access: Databases and Database Objects: an Introduction112 Questions
Exam 8: Access: Querying a Database112 Questions
Exam 9: Excel: Creating a Worksheet and a Chart112 Questions
Exam 10: Excel: Formulas, Functions, and Formatting112 Questions
Exam 11: Excel: Working With Large Worksheets, Charting, and What-If Analysis111 Questions
Exam 12: Powerpoint: Creating and Editing a Presentation With Pictures112 Questions
Exam 13: Powerpoint: Enhancing a Presentation With Pictures, Shapes, and Wordart112 Questions
Exam 14: Powerpoint: Reusing a Presentation and Adding Media and Animation112 Questions
Exam 15: Word: Creating, Formatting, and Editing a Word Document With a Picture112 Questions
Exam 16: Word: Creating a Research Paper With References and Sources112 Questions
Exam 17: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A program that restricts access to specified websites.
Responses:
bot
ciphertext
firewall
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
Which of the following is the process of restricting access to certain material on the web?
(Multiple Choice)
4.8/5
(37)
Your browsing history is a list of all websites you have visited over a period of time.
(True/False)
4.9/5
(34)
COGNITIVE ASSESSMENT Which of the following statements is not true about backing up?
(Multiple Choice)
4.8/5
(39)
____________________ occurs when someone steals personal or confidential information.
(Short Answer)
4.8/5
(38)
COGNITIVE ASSESSMENT Which of the following statements is not a safeguard against the failure of hardware?
(Multiple Choice)
4.8/5
(36)
Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics.There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review.Which of the following is not a frequently discussed area of computer ethics?
(Multiple Choice)
4.7/5
(43)
Users can purchase a software program that selectively blocks cookies like the kind shown in the accompanying figure.

(True/False)
4.9/5
(35)
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
(Multiple Choice)
4.9/5
(34)
A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
(Short Answer)
4.7/5
(43)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
An assault whose purpose is to disrupt computer access to an Internet service
Responses:
clickjacking
Digital Millennium Copyright Act (DCMA)
AUP
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
Any device that connects to the Internet is susceptible to mobile malware.
(True/False)
4.8/5
(32)
COGNITIVE ASSESSMENT Which of the following does your financial institution use to reduce fraud?
(Multiple Choice)
4.8/5
(38)
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
(Short Answer)
4.8/5
(36)
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
(Multiple Choice)
4.9/5
(28)
COGNITIVE ASSESSMENT Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
(Multiple Choice)
4.8/5
(35)
Into which of the following kinds of ports do external fingerprint readers plug?
(Multiple Choice)
4.7/5
(41)
Information collected and stored about individuals should be limited to what is necessary to carry out the function of the business or government agency collecting the data.
(True/False)
4.9/5
(33)
Showing 141 - 160 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)