Filters
Question type

Study Flashcards

____________________ is the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information.

Correct Answer

verifed

verified

A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book.


A) post office
B) address book
C) e-mail
D) mass-mailing

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

You should configure _____ to set Windows to display file extensions.


A) Internet Explorer
B) View Explorer
C) File Explorer
D) Extension Explorer

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Compression utilities scramble the data in a file by using a multi-digit key.

A) True
B) False

Correct Answer

verifed

verified

A key characteristic of viruses is their ability _____.


A) to see the contents of your screen
B) to perform one function while actually doing something else
C) to spread themselves from one computer to another
D) to replicate themselves on the host computer

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

On networks, ____________________ works by scrambling data as it leaves your computer so that data is in encrypted format while in transit.

Correct Answer

verifed

verified

A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.


A) rampage
B) mass-mailing
C) denial of service
D) stampede

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The most popular computer magazines include all of the following, EXCEPT _____.


A) PC World
B) Computers
C) Computer Power User
D) Wired

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The most prevalent types of malicious code include all of the following, EXCEPT _____.


A) spam
B) viruses
C) Trojan horses
D) computer worms

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Modern antivirus software attempts to locate viruses by watching for a virus _____.


A) code
B) fingerprint
C) signature
D) pattern

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Subscribing to a mailing list or RSS feed from Computer Weekly or InfoWorld can bring computer news and commentary right to your desktop.

A) True
B) False

Correct Answer

verifed

verified

Windows Defender is included with Windows 8.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is another term for "telecommuter"?


A) teleworker
B) remote worker
C) on-line worker
D) distant worker

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Refining is the technical method used to carry out electronic censorship by blocking Web sites, blogs, forums, or other Internet content from reaching certain audiences.

A) True
B) False

Correct Answer

verifed

verified

The practice of searching the Internet for unprotected computers is called a(n) ____________________.

Correct Answer

verifed

verified

Another name for a Web bug is a _____.


A) mini-GIF
B) clear GIF
C) GIF cookie
D) clear JPG

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

One of the forms of malicious code is a worm. Please briefly describe a worm, a mass-mailing worm, and a denial of service attack.

Correct Answer

verifed

verified

- A computer worm is malicious software ...

View Answer

Circumventing copyright law and illegally copying, distributing, or modifying protected works is sometimes referred to as _____.


A) hijacking
B) piracy
C) bootlegging
D) plagiarism

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A Trojan horse might allow a hacker to _____.


A) see the contents of your screen
B) capture your login keystrokes
C) control your Webcam
D) all of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

  Referring to the accompanying figure, which of the following allows a work to be used for personal purposes? A)  BY B)  SA C)  ND D)  NC Referring to the accompanying figure, which of the following allows a work to be used for personal purposes?


A) BY
B) SA
C) ND
D) NC

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 60 of 75

Related Exams

Show Answer