Exam 4: Technology and Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why do you not want too much personal data about you on the Internet?

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

B

Wireless mobile computing is

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

D

Academic website end with

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

Theft of software comes under ......

(Multiple Choice)
5.0/5
(45)

Which among is not to help bridge the digital divide:

(Multiple Choice)
4.7/5
(38)

INFLIBNET is

(Multiple Choice)
4.9/5
(38)

..... is social networking site

(Multiple Choice)
4.8/5
(33)

This unlawful acts wherein the computer is either a tool or target or both

(Multiple Choice)
4.8/5
(41)

Google earth is --------

(Multiple Choice)
4.9/5
(36)

Software piracy comes under

(Multiple Choice)
4.8/5
(41)

What is the top rule for avoiding Internet fraud?

(Multiple Choice)
4.9/5
(43)

Which of the following is annoying, but really doesn't render any harm to our computer?

(Multiple Choice)
4.7/5
(43)

Which among shows IT for national integration

(Multiple Choice)
4.8/5
(38)

In order to be considered "OSI Certified" a product which criteria among the following is not applicable?

(Multiple Choice)
5.0/5
(31)

When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

(Multiple Choice)
4.8/5
(34)

The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle's recovery if stolen.

(Multiple Choice)
4.8/5
(40)

----- is free online software for creating flowcharts, floor plans or other similar diagrams.

(Multiple Choice)
4.8/5
(49)

Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

(Multiple Choice)
4.8/5
(23)

------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

(Multiple Choice)
4.8/5
(27)

One scam that lures internet users into revealing personal information is

(Multiple Choice)
4.9/5
(48)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)