Exam 22: Computer Benefits and Risks
Exam 1: Computer Hardware75 Questions
Exam 2: Peripheral Devices75 Questions
Exam 3: System and Application Software75 Questions
Exam 4: Installing Software75 Questions
Exam 5: Getting Started With Windows 775 Questions
Exam 6: Working With Windows Settings and Accounts75 Questions
Exam 7: Working With Files75 Questions
Exam 8: Getting Started With Application Software75 Questions
Exam 9: Creating a Document75 Questions
Exam 10: Formatting a Document75 Questions
Exam 11: Finalizing a Document75 Questions
Exam 12: Creating a Worksheet75 Questions
Exam 13: Formatting a Worksheet75 Questions
Exam 14: Finalizing a Worksheet75 Questions
Exam 15: Creating a Presentation75 Questions
Exam 16: Finalizing a Presentation75 Questions
Exam 17: Creating a Database75 Questions
Exam 18: Finalizing a Database75 Questions
Exam 19: Networks75 Questions
Exam 20: Working With E-Mail75 Questions
Exam 21: Browsing the Web75 Questions
Exam 22: Computer Benefits and Risks75 Questions
Select questions type
To access Windows Firewall when using Windows, type "____" in the Start menu's Search box.
(Multiple Choice)
4.9/5
(26)
A Trojan ant is a computer program that seems to perform one function while actually doing something else, and is not designed to make copies of itself._________________________
(True/False)
5.0/5
(31)
____ software is designed to analyze the flow of traffic entering your computer from a network.
(Multiple Choice)
4.9/5
(29)
You can make copies for your own use and you can make copies under ____________________ regulations, which allow you to copy small excerpts of copyrighted works for use in educational materials and critical reviews.
(Short Answer)
4.8/5
(31)
Web site ____________________, the process of intentionally blocking access to certain sites, is controversial.
(Short Answer)
4.8/5
(26)
A virus clue is a section of code, such as a unique series of instructions, that can be used to identify a known virus or worm, much as a fingerprint is used to identify an individual._________________________
(True/False)
4.9/5
(31)
Gossip is defined as false and malicious statements published for the purpose of damaging the reputation of a living person._________________________
(True/False)
4.9/5
(31)
Many businesses that collect data online offer a(n) privacy policy that describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access._________________________
(True/False)
4.9/5
(30)
Personal information about your health, grades, charitable donations, and purchases is stored in a very limited number of places.
(True/False)
4.8/5
(31)
Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.
(Multiple Choice)
4.7/5
(42)
A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.
(Multiple Choice)
4.9/5
(33)
____ key, also referred to as "personal mode," is a type of WPA used on most home networks.
(Multiple Choice)
4.8/5
(33)
____ violations take place when your personal information is distributed or your online activities are tracked without your permission.
(Multiple Choice)
4.8/5
(35)
Explain how you can use a router instead of a firewall to protect your computer from intrusions.
(Essay)
4.9/5
(31)
One of the forms of malicious code is worms.Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.
(Essay)
4.8/5
(41)
In the United States, ____ prevents health care organizations from distributing patient information without written permission, and gives patients the right to amend incorrect or missing information in their records.
(Multiple Choice)
4.7/5
(36)
____________________ is any technology that surreptitiously gathers information.
(Short Answer)
4.9/5
(38)
The process of eradicating a virus-sometimes called "____"-might include deleting the virus code from files or deleting infected files.
(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)