In your encryption algorithm, you removed every third letter. Which algorithm did you use?
Compaction
Substitution
Expansion
Transposition
answer
compaction
question
Which of the following does your college use to verify your identity?
Face Recognition System
Hand Geometry System
Iris Recognition System
Digital Forensics System
answer
hand geometry system
question
The term, PIN, is an acronym for which of the following?
answer
personal identification number
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
Sending spam via email
Spreading viruses
Committing a DDoS
Authoring AcitveX scripts
answer
authoring ActiveX scripts
question
All of the following are guidelines about the appearance of letterhead elements EXCEPT ____.
Choose Colors that convey your goal
Use fonts that are easy to read
Make the font size of your name the same size as the rest of the text in the letterhead
Consider formatting your name in bold
answer
make the font size of your name the same size as the rest of the text in the letterhead
question
Which of the following terms is used to describe a small text file that a web server stores on your computer?
A breadcrumb
A cookie
A nugget
A cracker
answer
a cookie
question
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
Information theft
Software theft
Digital forensics
Decryption
answer
information theft
question
A(n) ____________________ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
answer
backup
question
The term, botnet, means _____________.
A program that performs a repetitive task on a network
Spam sent via email to spread viruses or commit a distributed denial of service attack
A group of compromised computers connected to a network that attacks other networks
A computer whose owner is unaware that the computer is being controlled remotely by an outsider
answer
a group of compromised computers connected to a network that attacks other networks
question
A(n) ____________________ website offers exciting, challenging avenues for formal and informal teaching and learning.
answer
educational
question
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
Hand geometry system
Iris Recognition system
Face recognition system
Digital forensics system
answer
hand geometry system
question
Which of the following statements is not true about backing up?
Backup programs are available from many sources.
Continuous data protection typically is used only by large enterprises.
With a selective backup, all of the files in the computer automatically are chosen to be copied.
A backup is a duplicate of a file, program, or disk.
answer
With a selective backup, all of the files in the computer automatically are chosen to be copied.
question
A(n) ____________________ is a type of software for computers and mobile devices that reads a user's specified web feeds and collects their most recent content.
answer
feed reader
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Cybersleuthing
Digital Forensics
System Analysis
Data Mining
answer
digital forensics
question
If no name is present what comes after in MLA format?
answer
title of source
question
By default, the Normal style inserts a vertical space equal to ____ line(s) between each line of text.
1
1.08
2
2.08
answer
1.08
question
What is an EULA intended to do?
License software for individual use
Outline computer activities for which the computer and network may or may not be used
Contract with an outside organization to provide security and recovery services for a network
Establish a network of computers, such as a homegroup
answer
license software for individual use
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
digital forensics system
voice verification system
iris recognition system
hand geometry system
answer
voice verification system
question
Which of the following can be used to create a software registration number, sometimes illegally?
BSA
decryption key
keygen
public key
answer
keygen
question
All social networking sites have a specialized audience.
true
false
answer
false
question
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer?
Chat
VoIP
Quick talk
Confab
answer
Chat
question
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
a certificate authority
a digital signature
an encryption key
a hash
answer
a digital signature
question
A thesaurus can be used to look up a(n) _____, or a word similar in meaning to a given word.
answer
synonym
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
script kiddie
cracker
cyberextortionist
cyberterrorist
answer
cracker
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
a software license
an IT code of conduct
digital rights management
fair use
answer
IT code of conduct
question
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following?
resources
systems
links
media
answer
resources
question
What happens during a DDoS attack?
An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
Antivirus software disables a virus and protects the computer or network from unauthorized access.
The police use a virus and other measures to take down a network of computer criminals.
A zombie army is used to attack computers or computer networks.
answer
A zombie army is used to attack computers or computer networks.
question
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
worm
spike
cookie
payload
answer
a cookie
question
Which of the following does your company use to track your time and attendance?
face recognition system
iris recognition system
hand geometry system
digital forensics system
answer
hand geometry system
question
Although you can use a dialog box to indent paragraphs, Word provides a quicker way through the ____.
Quick Access Toolbar
Office Button menu
vertical ruler
horizontal ruler
answer
horizontal ruler
question
A(n) ____________________ is a motion you make on a touch screen with the tip of one or more fingers or your hand.
answer
gesture
question
The term firewall is _____________.
The access point a hacker uses to intrude on a computer or network
A program that searches for cybercriminals by looking for patterns in attacks
Hardware and/or software that protects a network's resources from intrusion
A virus that prevents the computer or network from accessing outside resources
answer
hardware and/or software that protects a network's resources from intrusion
question
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
25
45
55
75
answer
25
question
A(n) ____________________ is a portable storage device that is small and lightweight enough to be transported on a keychain or in a pocket.
answer
USB flash drive
question
A(n) ____________________ address is a number that uniquely identifies the location of each computer or device connected to the Internet.
answer
internet protocol
question
Which of the following statements is not true about software theft?
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
Software theft includes disabling or removing programs from company computers.
answer
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
question
Which of the following statements is not true about intellectual property rights?
The term fair use refers to the rights which creators are entitled for their work.
Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
A copyright protects any tangible form of expression.
Digital rights management is a strategy designed to prevent illegal distribution of digital content.
answer
The term fair use refers to the rights which creators are entitled for their work.
question
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
malware
cybersoft
evilapp
viralware
answer
malware
question
A web ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
answer
search engine
question
By default, the Normal style places ____ points of blank space after each paragraph.
8
10
12
14
answer
8
question
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a virus
a worm
a Trojan horse
a rootkit
answer
a rootkit
question
A(n) ____________________ is an input device that converts printed material into a form the computer can process.
answer
scanner
question
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
PIN
password
secure key
passterm
answer
password
question
As an alternative to using the Color button on the PICTURE TOOLS FORMAT tab to display the Color gallery, you can right-click the graphic, click ____ on the shortcut menu, click the Picture button, expand the PICTURE COLOR section, and select the desired options.
Format Picture
Image Options
Colors and Themes
Change Colors
answer
format picture
question
According to the MLA style, the _____ is a list of sources that are referenced directly in a research paper.
parenthetical citations page
works cited page
explanatory notes page
superscript reference page
answer
works cited page
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?
substitution
transposition
expansion
compaction
answer
substitution
question
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
an access control
an attempt log
an attack index
an audit trail
answer
an audit trail
question
Which of the following does your new smartphone use to unlock the device?
hand geometry system
face recognition system
iris recognition system
digital forensics system
answer
face recognition system
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
spoofing
phishing
veiling
costuming
answer
spoofing
question
A(n) ____________________ name is the text-based name that corresponds to the IP address of a server that hosts a website.
answer
domain
question
A tag name is an identifier that links a(n) ____ to a source.
citation
index
attribute
field
answer
citation
question
What is an AUP intended to do?
License software for individual use
Outline computer activities for which the computer and network may or may not be used
Contract with an outside organization to provide security and recovery services for a network
Establish a network of computers, such as a homegroup
answer
outline computer activities for which the computer and network may or may not be used
question
Which of the following statements is not a safeguard against the failure of hardware?
surge protectors
fault-tolerant computers
device-tracking apps
UPS
answer
device-tracking apps
question
The term ____________________ refers to the worldwide collection of websites (blogs) like the one in the accompanying figure.
answer
blogosphere
question
A(n) ____________________ is a mobile computing device designed for single-player or multiplayer video games.
answer
game console
question
Bing, Google, and Yahoo! are all examples of web ____________________.
answer
search engines
question
A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.
answer
pop-up
question
A note reference mark signals that an explanatory note exists at the bottom of the page as a(n) ____, as shown in the accompanying figure.
keynote
citation
endnote
footnote
answer
footnote
question
The term, payload, as it pertains to computer crime, is defined as _____________.
The money a criminal receives from extortion or other computer crimes
The amount of data loss to a company or individual who is a victim of a computer crime
The destructive event or prank the program is intended to deliver
The financial burden computer crime places on its victims
answer
the destructive event or prank the program is intended to deliver
question
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
a decipher module
a translation tool
an encryption algorithm
a decryption key
answer
an encryption algorithm
question
What term is used to describe the process of restricting access to certain material on the web?
content filtering
information monitoring
data mining
social profiling
answer
content filtering
question
A(n) ____________________ device is a computing device small enough to hold in your hand.
answer
mobile
question
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
war driving
spitting
clickjacking
spimming
answer
clickjacking
question
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?
substitution
transposition
expansion
compaction
answer
transposition
question
A(n) ____________________ is a named collection of stored data, instructions, or information and can contain text, images, video, and audio.
answer
file
question
A(n) ____________________, which is similar to a password, consists of several words separated by spaces.
answer
passphrase
question
Which of the following does a new federal laboratory use in its high security areas?
signature verification system
digital forensics system
hand geometry system
iris recognition system
answer
iris recognition system
question
A(n) ____________________ is an Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, and several other apps (programs).
answer
smartphone
question
In order to safeguard your personal information, which of the following is recommended?
Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
Clear your history file when you are finished browsing.
Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
Use shopping club and buying cards when shopping to remain anonymous.
answer
Clear your history file when you are finished browsing.
question
The term back door, as it refers to computer crime, is _____________.
The area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future
A program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
The vulnerabilities of a computer criminal or criminal network that enable them to be tracked and caught
A weakness in a computer or network's security system that enables criminals to gain unauthorized access
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
question
To select a ____ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow.
cell
row
column
none of the above
answer
cell
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a virus
a worm
a Trojan horse
a rootkit
answer
a worm
question
A(n) ____________________ is a collaborative website that allows users to add to, modify, or delete the website content via their browser.
answer
wiki
question
Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure?
thinbook
quickbook
notebook computer
slimbook
answer
notebook computer
question
A(n) ____ is a book of synonyms.
answer
thesaurus
question
A(n) ____ is a placeholder for data whose contents can change.
attribute
element
field
value
answer
field
question
The term, zombie, is _____________.
A program that performs a repetitive task on a network
Spam sent via email to spread viruses or commit a distributed denial of service attack
A group of compromised computers connected to network that attacks other networks
A computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
answer
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
Which of the following is the least likely motive for a DDoS?
political anger
spoofing
extortion
negative recognition
answer
spoofing
question
A ____ symbol is another name for a dot symbol.
bullet
logo
cell
target
answer
bullet
question
Social engineering, as it pertains to computers, is _____________.
Creating consumer and personal profiles by tracking website history and electronic purchases
Compiling data from multiple computer users in order to make predictions about computer trends
Filtering Internet content to targeted users based on their personal preferences
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
answer
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
A computer like the one in the accompanying figure weighs up to ____________________ pounds (depending on the configuration).
answer
10
question
Storage devices like the ____________________ in the accompanying figure hold data, instructions, and information for future use.
answer
hard disk drive
question
Which of the following does your financial institution use to reduce fraud?
Signature Verification System
Digital Forensics System
Iris Recognition System
Hand Geometry System
answer
signature verification system
question
A(n) ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
answer
search engine
question
Automatic page breaks are determined by ____.
paper size
line spacing
margin settings
all of the above
answer
all of the above
question
Because technology changes, you must keep up with the changes to remain digitally ____________________.
answer
literate
question
Which of the following statements is not true about Internet and network attacks?
No central administrator is present on the Internet.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
answer
Information kept on an organization's premises has a higher security risk than information transmitted over networks.
question
To move from the second cell in the table in the accompanying figure back to the previous cell, press the ____ key(s).
TAB
BACKSPACE
SHIFT+TAB
SHIFT+ENTER
answer
SHIFT+TAB
question
An entertainment website contains content that describes a cause, opinion, or idea.
true
false
answer
false
question
When using the MLA style, position in-text parenthetical references either at the _____, as shown in the accompanying figure.
Top of the page as headnotes or at the end of the paper as endnotes
Bottom of the page as footnotes or at the end of the paper as endnotes
Top of the page as headnotes or at the beginning of the paper as frontnotes
Bottom of the page as footnotes or at the beginning of the paper as frontnotes
answer
bottom of the page as footnotes or at the end of the paper as endnotes
question
The term CAPTCHA is _____________.
A private combination of words associated with a user name that allows access to computer resources
The average time it takes a computer to discover a password based on the number of characters
A digital image used to help decipher a faded or blurry word in digitized news archives
A series of distorted characters that a user is required to enter correctly to continue using a website
answer
a series of distorted characters that a user is required to enter correctly to continue using a website
question
Which of the following best describes the term, cybercrime?
Online or Internet-based illegal acts
Any illegal act involving a computer
A type of gaming software that simulates criminal acts
Using the Internet to apprehend and prosecute criminals
answer
online or Internet-based illegal acts
question
Business documents can include all of the following EXCEPT ____.
resumes
personal letters
proposals
newsletters
answer
personal letters
question
All of the following are vertical alignment options EXCEPT ____.
middle
center
top
bottom
answer
middle
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?
practical
permissible
acceptable
ethical
answer
ethical
question
A letterhead should contain all of the following EXCEPT ____.
the complete legal name of the individual or company
the telephone number
the mailing address
the company's objective
answer
the company's objective
question
An effective business document should ____.
have a professional appearance
convey its message concisely
convey its message clearly
all of the above
answer
all of the above
question
Which of the following statements is not true about biometric devices?
Personal characteristics are unique and cannot be forgotten or misplaced.
Biometric devices are an unreliable method of identification and notification.
Examples include fingerprint readers and hand geometry systems.
Biometric devices translate a personal characteristic into a digital code.
answer
Biometric devices are an unreliable method of identification and notification.
question
Business documents can include all of the following EXCEPT ____.
resumes
personal letters
proposals
newsletters
answer
personal letters
question
A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented.
true
false
answer
true
question
A megabyte is equal to approximately one billion characters.
true
false
answer
false
question
Most websites of the kind shown in the accompanying figure require payment for services.
true
false
answer
false
question
The major differences between server computers like the one in the accompanying figure and client computers are that the client typically has more power, more storage space, and expanded communications capabilities.
true
false
answer
false
question
A game console is small enough to fit in one hand, making it more portable than the handheld game device.
true
false
answer
false
question
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music.
true
false
answer
false
question
Breakthroughs in surgery, medicine, and treatments seldom result from scientists' use of computers.
true
false
answer
false
question
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?
client base
baseline
network
server farm
answer
network
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy