Solved

Identify the Letter of the Choice That Best Matches the Phrase

Question 16

Matching

Identify the letter of the choice that best matches the phrase or definition.

Premises:
A kind of backup policy used to preserve multiple copies of important files.
The act of defacing or destroying computer equipment.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
By far the most common form of software theft.
The discovery, collection, and analysis of evidence found on computers and networks.
A common infringement of copyright.
Often, this links to a cookie stored on the hard disk.
Can include plug-ins for telephone lines and other cables.
Protects any tangible form of expression.
Protects minors from inappropriate content when accessing the Internet in schools and libraries.
Symptoms include extreme pain that extends from the forearm to the hand, along with tingling in the fingers.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
Can protect against worms and Trojan horses.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
Usually does not have advanced computer and technical skills.
It fails to define a legitimate business need.
In the encryption process, the unencrypted, readable data.
Provides specific conditions for use of software, which a user must accept before using the software.
Responses:
CAN-SPAM Act
surge protector
plaintext
virus hoax
hardware vandalism
script kiddie
computer forensics
software piracy
password
CTS
antivirus programs
Children's Internet Protection Act
tendonitis
copyright
third-generation
Web bug
license agreement
piracy
Fair Credit Reporting Act
ciphertext

Correct Answer:

A kind of backup policy used to preserve multiple copies of important files.
The act of defacing or destroying computer equipment.
The inflammation of the nerve that connects the forearm to the palm of the wrist.
Often appears in the form of a chain letter that requests a user to send a copy of the e-mail to as many people as possible.
By far the most common form of software theft.
The discovery, collection, and analysis of evidence found on computers and networks.
A common infringement of copyright.
Often, this links to a cookie stored on the hard disk.
Can include plug-ins for telephone lines and other cables.
Protects any tangible form of expression.
Protects minors from inappropriate content when accessing the Internet in schools and libraries.
Symptoms include extreme pain that extends from the forearm to the hand, along with tingling in the fingers.
In the encryption process, the encrypted (scrambled) data.
Most systems require that a user selects this on his or her own.
Can protect against worms and Trojan horses.
Gives law enforcement the right to impose penalties on people using the Internet to distribute spam.
Usually does not have advanced computer and technical skills.
It fails to define a legitimate business need.
In the encryption process, the unencrypted, readable data.
Provides specific conditions for use of software, which a user must accept before using the software.
Related Questions