Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Technology for Success Computer Concepts
Exam 6: Managing Data With Data Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
In which of the following situations would you find a data backup helpful?
Question 22
Multiple Choice
Lately you have been noticing more and more ads from clothing stores are popping up on your Facebook page, and when you log into your email there are unsolicited emails from clothing vendors as well. Thinking back, what most likely has changed on your computer to allow these thing to be happening?
Question 23
Multiple Choice
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
Question 24
Multiple Choice
What would a password manager allow you to do?
Question 25
Multiple Choice
What is a digital certificate?
Question 26
Multiple Choice
How is a worm different from a Trojan?
Question 27
Multiple Choice
Which of the following is a characteristic of a strong password?
Question 28
Multiple Choice
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
Question 29
Multiple Choice
How does encryption work?
Question 30
Multiple Choice
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?
Question 31
Multiple Choice
Technology can lead to all of the following behavioral risks EXCEPT _____.
Question 32
Multiple Choice
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
Question 33
Multiple Choice
Which is a first step to deter thieves from accessing your financial information?
Question 34
True/False
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
Question 35
True/False
To prevent a laptop from being stolen, you can use a timelock device.
Question 36
Multiple Choice
How can an attacker execute malware through a script?
Question 37
True/False
To protect your information and help you to remember passwords, use your social media account login information to log into another site.
Question 38
Multiple Choice
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?