Exam 10: Computer Security and Risks
Exam 1: Exploring Our Digital Planet133 Questions
Exam 2: Hardware Basics: Inside the Box146 Questions
Exam 3: Hardware Basics: Peripherals133 Questions
Exam 4: Software Basics: the Ghost in the Machine127 Questions
Exam 5: Productivity Applications118 Questions
Exam 6: Graphics, digital Media, and Multimedia110 Questions
Exam 7: Database Applications and Privacy Implications126 Questions
Exam 8: Networking and Digital Communication134 Questions
Exam 9: The Evolving Internet115 Questions
Exam 10: Computer Security and Risks84 Questions
Exam 11: Computers at Work, school, and Home96 Questions
Exam 12: Information Systems in Business129 Questions
Exam 13: E-Commerce and E-Business: the Evolving Internet Economy68 Questions
Exam 14: Systems Design and Development145 Questions
Exam 15: Is Artificial Intelligence Real80 Questions
Exam 16: Computer and Internet Terminology81 Questions
Select questions type
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a
(Multiple Choice)
4.9/5
(42)
A challenge with high-tech weapons is that they reduce the amount of time people have to make life-and-death decisions.
(True/False)
4.7/5
(34)
A program that masquerades as a useful program,but is really a destructive program,is a(n)
(Multiple Choice)
4.9/5
(33)
What was the name of the worm that demonstrated that a system could be infected by email even if the mail wasn't opened?
(Multiple Choice)
4.7/5
(42)
Hackers who hijack legitimate Web sites and redirect users to other sites are called
(Multiple Choice)
4.9/5
(36)
Match the Act on the left to the appropriate explanation on the right.
-Digital Millennium Copyright Act
(Multiple Choice)
4.8/5
(41)
An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a
(Multiple Choice)
4.8/5
(32)
Computer crime often goes unreported because businesses fear negative publicity.
(True/False)
5.0/5
(32)
A public key is only available to the user originating a message.
(True/False)
4.9/5
(35)
The scrambling of code in an email message can be done using
(Multiple Choice)
4.8/5
(31)
________ refers to electronic trespassing or criminal hacking.
(Short Answer)
4.7/5
(40)
Software that allows different levels of security per user is known as access-control software.
(True/False)
4.8/5
(28)
Showing 61 - 80 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)