1-5

Your page rank:

Total word count: 2741
Pages: 10

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

substitution

Which of the following can be used to create a software registration number, sometimes illegally?

keygen

Which of the following is a federally funded Internet security research and development center?

CERT/CC

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

Electronic Communication Privacy Act

Which of the following does your financial institution use to reduce fraud?

signature verification system hand geometry system

Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?

cookie

Which of the following is an authorized person or company that issues and verifies digital certificates?

certificate authority

Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?

macros

What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?

malware

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

product activation

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

network

Which of the following can be used to create a software registration number, sometimes illegally?

keygen

Which of the following statements is not true about Internet and network attacks?

Information kept on an organization’s premises has a higher security risk than information transmitted over networks. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

The term, payload, as it pertains to computer crime, is defined as _____________.

the destructive event or prank the program is intended to deliver the financial burden computer crime places on its victims

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

digital forensics

In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use?

transposition

Which of the following is the least likely motive for a DDoS?

spoofing

Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?

Caesar cipher

Websites use which of the following to keep track of items in a user’s shopping cart?

session cookie

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?

a digital signature

Which of the following does your company use to track your time and attendance?

hand geometry system

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

substitution

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

cracker

Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?

clickjacking

Which of the following statements is not true about Internet and network attacks?

Information kept on an organization’s premises has a higher security risk than information transmitted over networks.

Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

an encryption algorithm

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

The term firewall is _____________.

Correct hardware and/or software that protects a network’s resources from intrusion

Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?

an audit trail

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

product activation

Which term is used to describe software used by cybercriminals?

crimeware

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

backup

Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts

Websites use which of the following to keep track of items in a user’s shopping cart?

session cookie

What is another name for public key encryption?

asymmetric key encryption

Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?

an IT code of conduct

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

IP

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

digital forensics

The term, botnet, means _____________.

a group of compromised computers connected to a network that attacks other networks

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

They restore the files.

What is an EULA intended to do?

license software for individual use

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

ethical

Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?

voice verification system

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?

Electronic Communications Privacy Act (ECPA)

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?

phishing

Which of the following statements is not true about Internet and network attacks?

Information kept on an organization’s premises has a higher security risk than information transmitted over networks

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

a worm

Which of the following categories are the rights to which creators are entitled for their work?

intellectual property

Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?

an encryption algorithm

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

a rootkit

The term, zombie, is _____________.

a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

cracker

In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use?

substitution

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

cyberterrorist

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

Many businesses use which of the following to limit employees’ web access?

content filtering

Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?

password

Which term is used to describe software used by cybercriminals?

crimeware

Which of the following terms means in a location separate from the computer site?

off-site

Which of the following is the least likely motive for a DDoS?

spoofing

Which of the following is an authorized person or company that issues and verifies digital certificates?

certificate authority

Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

cyberterrorist

Which of the following does your financial institution use to reduce fraud?

signature verification system

Which of the following can transmit germs?

hand geometry systems

What happens during a DDoS attack?

A zombie army is used to attack computers or computer networks.

What term is used to illustrate the gap between those with and those without access to technology?

digital divide

Which of the following gestures would you use if you want to run a new browser app on your new tablet?

double-tap

Which of the following is an electronic version of a printed book, readable on computers and other digital devices?

e-book

Which of the following works in a manner similar to a copy machine?

scanner

Which of the following category of users works on a computer while away from a main office, home office, or school?

mobile

What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?

software

Which of the following conveys meaning and is useful to users?

information

In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?

point

Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

press and hold

Which of the following is true about a computer?

Its electronic components process data using instructions.

Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?

Position the display about 90 degrees below eye level.

What is a type of personal computer designed so all of its components fit entirely on or under a desk or table?

desktop computer

You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?

cloud storage

How often should you change your password?

Every three months

A leading maker of security software has made a claim that its software blocked a given number of malware attacks in a single year. From your knowledge of malware, which of the following is the likeliest number from that claim?

5 billion

Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

press and hold

If a tablet has no keyboard, how do you type on it?

You use an on-screen keyboard.

Which of the following is a specification that enables web content to be distributed to subscribers?

RSS

You interact with a program through which of the following, thereby controlling how you enter data and instructions and how information is displayed on the screen?

operating system

In which of the following mouse operations do you press and release the secondary mouse button?

right click

Which of the following is NOT a type of message you can send with a smartphone?

media message

Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure?

thinbook

Which of the following gestures would you use if you want to activate a link on your new tablet?

tap

Which of the following enables users to speak to other users over the Internet?

IM

In which of the following mouse operations do you point to an item, hold down the left mouse button, move the item to the desired location on the screen, and then release the left mouse button?

Drag

Which kind of user requires the capabilities of a powerful computer?

power

How do you determine which type of computer — tablet, laptop, or desktop — is best?

it depends on your needs

What involves reducing the electricity consumed and environmental waste generated when using a computer?

green computing

Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called?

convergence

Which of the following is NOT a strategy that supports green computing?

creating web apps instead of desktop apps

Who is Microsoft’s founder?

Bill Gates

If you are looking for an online social network that allows you to share messages and interests with family and friends, which of the following is the best match for you?

Facebook

Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?

optical

Which of the following mouse operations would you use if you want to display a shortcut menu?

right-click

Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?

network

Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?

computer

Which of the following is not one of the reasons that a mobile device can be categorized as a computer?

it can accept output

Which of the following is a popular social networking site?

facebook

In which gesture do you move two fingers together?

pinch

Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network?

wi-fi

Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?

application software

Which of the following is a typical size for a game console?

four pounds

Green computing involves reducing electricity consumed and environmental waste generated when using a computer. Which of the following is a valid strategy for supporting green computing?

Buy a computer from a retailer who will dispose of your old computer properly

Which of the following gestures would you use if you want to move an item around the screen on your new tablet?

slide

A website’s home page is most analogous to which of the following?

cover of a book

Your sister just started a company that provides individuals and organizations access to the Internet for a small fee. Which of the following describes her company?

access provider

You have a new web app and the host for it is going to provide storage for your data on their server. What is this called?

cloud storage

What separates the components of a domain name?

periods

Which of the following allows access to high-speed Internet services through the cable television network?

cable modem

Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online?

nettiquette

Which of the following is a technology that provides high-speed Internet connection using the telephone network?

DSL

Which of the following is a technology that provides high-speed Internet connection using the telephone network?

A Wi-Fi’s Internet service can be dial-up access.

What are two elements found in an email address?

user name and domain name

What is the role of the W3C?

oversee research and set standards for many areas of the Internet

Which of the following is a group of email names and addresses used for mass distribution of a message?

email list

Which of the following is a component of a Uniform Resource Locator?

domain name

For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages?

instant messaging

Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?

satellite modem

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending