Exam 11: Technology Terminology and Concepts
Exam 1: Understanding Informatics and Philosophy of Information24 Questions
Exam 2: Technology and Information Science24 Questions
Exam 3: Consciousness and Philosophy of Mind25 Questions
Exam 4: Behaviorism and Functionalism in Psychology and Philosophy25 Questions
Exam 5: Philosophy of Mind and Artificial Intelligence25 Questions
Exam 6: Samkhya, Computational Biology, and Internet Search Techniques25 Questions
Exam 7: Copyright Policies, E-Learning, Cybersecurity, and Cyber Laws23 Questions
Exam 8: Computer and Internet25 Questions
Exam 9: Software and Computer Basics20 Questions
Exam 10: Technology and the Internet: Understanding the Basics25 Questions
Exam 11: Technology Terminology and Concepts24 Questions
Exam 12: Internet Use, Ethics, and Technology17 Questions
Select questions type
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
C
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.
(Multiple Choice)
5.0/5
(44)
What is the first step in protecting yourself from identity theft?
(Multiple Choice)
4.9/5
(26)
Which of the following is a step that all computer users should take to protect against virus attacks?
(Multiple Choice)
4.8/5
(35)
------- can be referred as the use or application of computational devices in the field of biological sciences and research.
(Multiple Choice)
4.8/5
(34)
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
(Multiple Choice)
4.9/5
(36)
Computers are programmed to make decisions in real-life situations are known as
(Multiple Choice)
4.8/5
(24)
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
(Multiple Choice)
5.0/5
(43)
How could hacker use information about you found through Internet searches?
(Multiple Choice)
4.8/5
(41)
Why do you not want too much personal data about you on the Internet?
(Multiple Choice)
4.8/5
(32)
------ uses software to allow people to interact with three-dimensional simulated environment.
(Multiple Choice)
4.9/5
(36)
This unlawful acts wherein the computer is either a tool or target or both
(Multiple Choice)
4.9/5
(33)
Which of the following is annoying, but really doesn't render any harm to our computer?
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 24
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)