Exam 8: Safety and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The device that sends the signal to connect your wireless devices to the Internet is ____.

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

A

Cloud storage systems have ____ at various online locations that provide additional protection.

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

A password is not a personal identification number.

Free
(True/False)
4.9/5
(47)
Correct Answer:
Verified

True

Areas in a wireless network where you can access the Internet are ____.

(Multiple Choice)
4.9/5
(34)

Just about every site you visit stores a cookie in your computer's browser.

(True/False)
4.8/5
(36)

A ____ protects your system from intruders.

(Multiple Choice)
4.9/5
(31)

Service packs ensure that your data is scrambled as it travels between you and its Internet destination.

(True/False)
4.9/5
(41)

Using personal features to identify a person is biometrics.

(True/False)
4.8/5
(25)

Junk email, is also known as ____.

(Multiple Choice)
4.8/5
(34)

Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people and the environment is Energy Star computing.

(True/False)
4.8/5
(28)

The crime of hacking into and attacking networks is cybercrime.

(True/False)
4.8/5
(27)

____ is malicious software that blocks access to a computer system until a sum of money is paid.

(Multiple Choice)
4.8/5
(36)

Biometric systems include all but which of the following?

(Multiple Choice)
4.8/5
(29)

____ secretly collects user data, such as web surfing habits.

(Multiple Choice)
4.9/5
(34)

____ on the Internet make up "the cloud."

(Multiple Choice)
5.0/5
(32)

A ____ is a unit of data collected as a package so it can be transmitted in a network path.

(Multiple Choice)
4.8/5
(26)

A PIN or ____ is used to get into accounts through an ATM.

(Multiple Choice)
4.8/5
(33)

The effects of a(n) ____ can include physical damage and a general disruption of regular activities.

(Multiple Choice)
4.8/5
(32)

____ disguise themselves as useful programs or apps but do damage when you run them;

(Multiple Choice)
4.8/5
(37)

When a hard drive fails, Mac users see the ____.

(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 71
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)