Discovering Computers Ch. 5

26 June 2023
4.6 (164 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
The term CAPTCHA is _____________ -the average time it takes a computer to discover a password based on the number of characters -a series of distorted characters that a user is required to enter correctly to continue using a website -a private combination of words associated with a user name that allows access to computer resources -a digital image used to help decipher a faded or blurry word in digitized news archives
answer
a series of distorted characters that a user is required to enter correctly to continue using a website
question
In your encryption algorithm, you removed every third letter. Which algorithm did you use? -expansion -compaction -transposition -substitution
answer
compaction
question
In order to safeguard your personal information, which of the following is recommended? -Clear your history file when you are finished browsing -Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them -Use shopping club and buying cards when shopping to remain anonymous -Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase
answer
Clear your history file when you are finished browsing.
question
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. -software theft -information theft -decryption -digital forensics
answer
information theft
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? -veiling -phishing -spoofing -costuming
answer
spoofing
question
Which of the following copies all of the files in a computer? -differential backup -selective backup -full backup -incremental backup
answer
full backup
question
Which of the following is the least likely motive for a DDoS? -negative recognition -extortion -political anger -spoofing
answer
spoofing
question
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer? -They reset the files. -They resource the files. -The index the files. -They restore the files.
answer
They restore the files.
question
Which of the following is not a possessed object? -key -PIN -smart card -badge
answer
PIN
question
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? -substitution -expansion -compaction -transposition
answer
substitution
question
Which of the following is an authorized person or company that issues and verifies digital certificates? -certificate office -certificate bureau -certificate authority -certificate agency
answer
certificate authority
question
Which of the following does your financial institution use to reduce fraud? -digital forensics system -signature verification system -iris recognition system -hand geometry system
answer
signature verification system
question
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? -decryption -digitization -re-securing -assessment
answer
decryption
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? -acceptable -ethical -practical -permissible
answer
ethical
question
With a three-generation backup policy, the grandparent is which of the following? -most recent copy of the file -second oldest copy of the file -original file -oldest copy of the file
answer
oldest copy of the file
question
Social engineering, as it pertains to computers, is _____________. -filtering Internet content to targeted users based on their personal preferences -creating consumer and personal profiles by tracking website history and electronic purchases -compiling data from multiple computer users in order to make predictions about computer trends -gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
answer
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? -a software license -fair use -an IT code of conduct -digital rights management
answer
an IT code of conduct
question
Which of the following can be used to create a software registration number, sometimes illegally? -keygen -decryption key -BSA -public key
answer
keygen
question
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate? -assigned -secure -protected -digital
answer
digital
question
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public? -Computer Abuse Amendments Act -COPPA -CAN-SPAM Act -Electronic Communication Privacy Act
answer
Electronic Communication Privacy Act
question
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos? -IP -DoS -PGP -TCP
answer
IP
question
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? -cyberextortionist -cyberterrorist -hacker -script kiddie
answer
cyberterrorist
question
Which of the following does your new smartphone use to unlock the device? -iris recognition system -hand geometry system -digital forensics system -face recognition system
answer
face recognition system
question
Which of the following can transmit germs? -digital forensics systems -iris recognition systems -face recognition systems -hand geometry systems
answer
hand geometry systems
question
Which of the following statements is not a safeguard against the failure of hardware? -UPS -device-tracking apps -fault-tolerant computers -surge protectors
answer
device-tracking apps
question
Personal computers, display devices, and printers should comply with guidelines of which of the following programs? -ENERGY STAR -ACCEPTABLE USE -SECURE ELECTRONICS -GREEN COMPUTING
answer
ENERGY STAR
question
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? -network compromise -technical terrorism -digital security risk -information liability
answer
digital security risk
question
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer? -spike -cookie -worm -payload
answer
cookie
question
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children? -iris recognition system -hand geometry system -face recognition system -digital forensics system
answer
hand geometry system
question
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions? -expansion algorithm -compaction algorithm -Caesar cipher -transposition algorithm
answer
Caesar cipher