Multiple Choice
Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.
A) a firewall
B) spyware
C) malware
D) a spam filter
Correct Answer:

Verified
Correct Answer:
Verified
Q90: Unlike business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce
Q91: A(n) _ is a network of organizations
Q92: In the context of using information technology
Q93: _ refers to unsolicited commercial emails, usually
Q94: Which of the following is a difference
Q96: Word processing, spreadsheet, and personal information management
Q97: When firms give key stakeholders limited access
Q98: _ uses hardware or software to create
Q99: _ is a network based on fiber-optic
Q100: When product designers use computer-aided design (CAD)