Computers ch. 5

Your page rank:

Total word count: 1088
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

What is used to describe a set of steps that can convert readable plaintext into unreadable sihetext?

an encryption algorithum

Can users purchase a software porgram that selectively blocks cookies?


The term zombie is…

a computer or device whose owner is unaware that the computer or device is being controlled remotelly by an ousider

The term, PIN, is an acronym for which of the follwing?

personal identification number

What does your financial service institution use to secure the transactions you make using their phone banking service?

voice verification system

In your encryption algorithm, you swapped adjacent character. What algorithm did you use?


What does your company use to track your time and attendance?

hand geometry system

A perpetraaotr is using a botnet. Which of the follwing is the least likely use of his botnet?

authoring ActiveX scripts

Which of the following does a new federal laboratory use in its high secruity areas?

iris recognition system

The term botnet means….

a group of compromised computers connected to a network that attackes the other networks

What is not a safeguard against the failure of hardware?

device tracking apps

What is a small text file that a web server stores on a user’s computer?


What does your colege use to verify your identity?

hand geometry system

In your encryption algorithm, yo removed every third letter. Which algorithm did you use?


What term refers to a written list of guidlines that might includes rules that prevent employees from using software illegally or using computers to steal?

an IT code of conduct

One study found that a certain percentage of wireless connections are unsecured, leaving them susceptible to hackers. What was that percentage?


What term is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

a worm

Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of teh message sender?

a digital signature

What term refers to someone who uses the internet or network to destory or damage compters for political reasons?


The term payload means….

the destructive even or prank the program is intended to deliver

In your encryption algorithm, you replaced each letter wiht another letter. Which algorithm did you use?


What term is used to describe a scam in which a website uncludes a button, image or link that contains a malicious program?


What is the least likely motive for a DDoS?


Social engineering, as it pertains to computers, is…

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

What happens during a DDoS attack?

a zombie army is used to attack computers or computer network

Does the Computer Abuse Amendments Act outlaw transmissions of harmful computer codes?


What statement is not true about Internet and netwokr attacks?

Information kept on an organizaton’s premises has a higher security risk than information transmitted over networks.

Which of the following statemens is not true about intellectual property rights?

the term fair use refers to the rights which creators are entitled for their works

What best describes the term cybercrime?

online or Internet-based illegal acts

What statement is not true about biometeric devices?

biometeric devies are an unreliable method of identification and notification

the term back door, as it refers to computer crime, is…

a program or set of instructions that alll users to bypass security controls when accessing a program, computer, or network

What term is used to describe software used by cybercriminals?


What can be used to create a software registration number, sometimes illegally?


What does your daughter’s daycare use to verify the identity of parents who pick up with children?

hand geometry system

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

digital foresnsics

What term is used to describe a small text file that a web server stores on your computer?

a cookie

What does your new smartphone use to unlock the device?

face recognition system

What is an EULA intended to do?

license software for individula use

Which of the following terms refers to somone who accesses a computer or network illegally with the intent of malicious action?


Which of the following statements is not true about software theft?

a keygen distributes user names and passowrds to those who register their legally puraches copies of a software program

In order to safeguard your personal information, which of the follwoing is recommended?

clear your history fie when you are finished browsing

What refers to a technique intruders use to make thier network or Internet transmission appear legitamte to a victim computer or network?


You have encountered a technolyg that s effective in blocking computer-generated attempts to acces a website because it is generally easy for humans to recognize distorted characters. What is this technology?


What statement is not true about backing up?

wiht a selective backup, all of the files in the computer automatically are chosen to be copied.

The term firewall is….

hardware and/or software that protects a nework’s resources from intrusion

The term CAPTCHA is…

a series of distoted characters that a user is required to enter correctly to continue using a website

When a waiter at a restaurent steals credit card numbers to make fraudulent purchaes, it is called..

information theft

Do online shopping sites generally use a session cooke to keep track of items in a user’s shoppinng cart?


What is an AUP intended to do?

outline computer acitivites for which the cimputer and wetwork may or may not be used

What term is used to describe a file a computer creates that records successful and unsuccessful access attempts?

an audit trail

What does yor financial institution use to reduce faurd?

signature verification system

What is the general term for programs that act a user’s knowledge and deliberately alter the computer’s operations?


You have just provided the identification number that associates your new software purchase wiht the mobile device on which you installed the software. What is the term for this process?

product activation

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?


What term is used to describe e the process of restricting access to certain materiel on the web?

content filtering

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message