Exam 6: Data Security
Exam 1: Computer and Internet Basics91 Questions
Exam 2: Computer Hardware91 Questions
Exam 3: Computer Software91 Questions
Exam 4: Digital Electronics and File Management91 Questions
Exam 5: Networks and the Internet93 Questions
Exam 6: Data Security91 Questions
Exam 7: The Web and E-Commerce91 Questions
Exam 8: Digital Media91 Questions
Exam 9: The Computer Industry and Careers91 Questions
Exam 10: Trends in Technology61 Questions
Select questions type
____________________ are rules that limit the directories and files that each user can access.
(Short Answer)
4.9/5
(30)
Hand-geometry scanners and voice recognition are examples of ____________________ devices.
(Short Answer)
4.7/5
(40)
Which of the following is NOT a method used in a disaster recovery plan?
(Multiple Choice)
4.8/5
(32)
A ____ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files on the same computer.
(Multiple Choice)
4.9/5
(39)
Developing steps to recover from an unavoidable disaster is one step in the process of risk management.
(True/False)
4.9/5
(35)
Which of the following is NOT one of the steps a worm makes when infecting a computer system?
(Multiple Choice)
4.9/5
(34)
A ____ is the basis for scrambling and unscrambling the data transmission between wireless devices.
(Multiple Choice)
4.9/5
(44)
A power ____ can be caused by a malfunction in the power distribution network.
(Multiple Choice)
4.9/5
(37)
Showing 81 - 91 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)