Filters
Question type

Study Flashcards

Proximity sharing gives websites access to your current location.

A) True
B) False

Correct Answer

verifed

verified

Biometric objects are entirely foolproof.

A) True
B) False

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following can be used to create a software registration number, sometimes illegally?


A) BSA
B) decryption key
C) keygen
D) public key

E) None of the above
F) All of the above

Correct Answer

verifed

verified

PINs are not the same as passwords.

A) True
B) False

Correct Answer

verifed

verified

Critical Thinking Questions Case 5-2 In your introductory course on computers, your professor has decided to dedicate a lecture to computer ethics. There is a lot of ambiguity in this topic, and she has presented a range of circumstances for you and your classmates to review. Which of the following is NOT a question of computer ethics?


A) Users are required to provide a software product's 25-character identification number before installing software.
B) A student copies text from the web and uses it in a research paper for his English class.
C) A student who has been expelled from school installs a computer virus on a computer in the student lab.
D) Someone copies The DaVinci Code to the web and encourages others to read it.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

Correct Answer

verifed

verified

online sec...

View Answer

Many businesses use spyware to limit employees' web access.

A) True
B) False

Correct Answer

verifed

verified

During virtual browsing, your browser does not keep track of the websites you are visiting.

A) True
B) False

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT Which of the following does your new smartphone use to unlock the device?


A) hand geometry system
B) face recognition system
C) iris recognition system
D) digital forensics system

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?


A) ENERGY STAR
B) SECURE ELECTRONICS
C) ACCEPTABLE USE
D) GREEN COMPUTING

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?


A) CAPTCHA
B) CERT/CC
C) two-step verification
D) serial authentication

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?


A) distributed
B) delayed
C) limited
D) staggered

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

   As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network. As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

A) True
B) False

Correct Answer

verifed

verified

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

A) True
B) False

Correct Answer

verifed

verified

Websites use which of the following to keep track of items in a user's shopping cart?


A) session cookie
B) zombie
C) adware
D) shopping bot

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

Correct Answer

verifed

verified

COGNITIVE ASSESSMENT What is an AUP intended to do?


A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Any device that connects to the Internet is susceptible to mobile malware.

A) True
B) False

Correct Answer

verifed

verified

If a program or device has a default password, be sure to retain it.

A) True
B) False

Correct Answer

verifed

verified

With a three-generation backup policy, the grandparent is which of the following?


A) most recent copy of the file
B) second oldest copy of the file
C) oldest copy of the file
D) original file

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 41 - 60 of 181

Related Exams

Show Answer