Exam 4: Technology and Cybersecurity
Exam 1: Computer and Technology23 Questions
Exam 2: Computer and Internet Terminology23 Questions
Exam 3: Information Technology and Communication25 Questions
Exam 4: Technology and Cybersecurity25 Questions
Exam 5: Computer Science and Ethics28 Questions
Select questions type
Why do you not want too much personal data about you on the Internet?
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
B
This unlawful acts wherein the computer is either a tool or target or both
(Multiple Choice)
4.8/5
(41)
Which of the following is annoying, but really doesn't render any harm to our computer?
(Multiple Choice)
4.7/5
(43)
In order to be considered "OSI Certified" a product which criteria among the following is not applicable?
(Multiple Choice)
5.0/5
(31)
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
(Multiple Choice)
4.8/5
(34)
The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle's recovery if stolen.
(Multiple Choice)
4.8/5
(40)
----- is free online software for creating flowcharts, floor plans or other similar diagrams.
(Multiple Choice)
4.8/5
(49)
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
(Multiple Choice)
4.8/5
(23)
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.
(Multiple Choice)
4.8/5
(27)
One scam that lures internet users into revealing personal information is
(Multiple Choice)
4.9/5
(48)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)