Exam 6: Security and Safety
Exam 1: Impact of Digital Technology64 Questions
Exam 2: The Web76 Questions
Exam 3: Computer Hardware50 Questions
Exam 4: Operating Systems and File Management71 Questions
Exam 5: Software and Apps36 Questions
Exam 6: Security and Safety40 Questions
Exam 7: Digital Media57 Questions
Exam 8: Program and App Use and Development61 Questions
Exam 9: Web Development42 Questions
Exam 10: Networking52 Questions
Exam 11: Digital Communication32 Questions
Exam 12: Digital Transformation: Cloud, E-Commerce, and Ai25 Questions
Exam 13: Databases23 Questions
Exam 14: Digital Ethics and Lifestyle65 Questions
Exam 15: Digital Literacy and Technology345 Questions
Select questions type
In terms of privacy, which of the following is a best practice?
(Multiple Choice)
4.9/5
(34)
Creating a(n)_____ means copying files from a computer's hard drive and storing them in a remote location.
(Multiple Choice)
4.7/5
(41)
Which of the following types of websites typically provides the least security?
(Multiple Choice)
4.9/5
(38)
Technology can lead to all of the following behavioral risks EXCEPT _____.
(Multiple Choice)
4.9/5
(31)
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
(Multiple Choice)
4.9/5
(43)
Which of the following statements about browser security settings is false?
(Multiple Choice)
4.9/5
(35)
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
(Multiple Choice)
4.7/5
(41)
How can you protect a computer from electrical spikes and surges?
(Multiple Choice)
4.9/5
(47)
Which is a first step to deter thieves from accessing your financial information?
(Multiple Choice)
4.9/5
(42)
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
(Multiple Choice)
4.7/5
(38)
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
(True/False)
4.8/5
(30)
A Trojan is a malicious program that uses a computer network to replicate.
(True/False)
4.8/5
(31)
How does discarding computers in a landfill affect the environment?
(Multiple Choice)
4.8/5
(31)
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
(Multiple Choice)
4.9/5
(36)
To prevent a laptop from being stolen, you can use a surge protector.
(True/False)
4.9/5
(39)
In which of the following situations is a digital certificate useful?
(Multiple Choice)
5.0/5
(37)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)