+ All Categories
Home > Documents > MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers...

MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers...

Date post: 23-Dec-2015
Category:
Upload: scot-washington
View: 267 times
Download: 2 times
Share this document with a friend
Popular Tags:
63
MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010
Transcript
Page 1: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy

Discovering Computers 2010

Page 2: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Multiple Choice Main MenuComputer Security and Safety, Ethics, and Privacy

Question 1

MC Quiz 11PreviousSlide

End Show

Question 2

Question 3Question 4Question 5

Question 8

Question 6Question 7

Question 9Question 10

Question 11Question 12Question 13Question 14

Question 15

Question 16Question 17Question 18

Question 19Question 20

Page 3: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 1

B

A

C

D

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11

Textbook: Page 557

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

cyber extortionist

cyber terrorist

blogger

hacker

Page 4: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 1

B

A

C

D

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11Textbook: Page 557

=================================================================

Incorrect Previous

SlideMainMenu

cyber terrorist

blogger

cyber extortionist

hacker

Click On: A, B, C, or D

Page 5: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 1

D

A

C

B

=================================================================

A __________ is someone who uses e-mail as a vehicle for extortion.

Quiz 11Textbook: Page 557

=================================================================

Correct MainMenu

PreviousSlide

cyber terrorist

cyber extortionist

blogger

hacker

Click On: A, B, C, or D

Click Here For Next Question

Page 6: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11

Textbook: Page 559

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

1,500

5,800

10,500

180,000

Page 7: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11Textbook: Page 559

=================================================================

Incorrect Previous

SlideMainMenu

5,800

1,500

10,500

180,000

Click On: A, B, C, or D

Page 8: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 2

B

A

C

D

=================================================================

Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware.

Quiz 11Textbook: Page 559

=================================================================

Correct MainMenu

PreviousSlide

5,800

1,500

10,500

180,000

Click On: A, B, C, or D

Click Here For Next Question

Page 9: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 3

D

B

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11

Textbook: Page 573

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Packing

Compression

Encryption

Formatting

Page 10: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 3

D

B

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11

=================================================================

Incorrect Previous

SlideMainMenu

Compression

Packing

Encryption

Formatting

Click On: A, B, C, or D

Textbook: Page 573

Page 11: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 3

B

D

C

A

=================================================================

__________ is a process of converting readable data into unreadable characters to prevent unauthorized access.

Quiz 11Textbook: Page 573

=================================================================

Correct MainMenu

PreviousSlide

Compression

Packing

Encryption

Formatting

Click On: A, B, C, or D

Click Here For Next Question

Page 12: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 4

A

B

C

D

=================================================================

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Quiz 11

Textbook: Page 579

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Repetitive

Divergent

Convergent

Encryption

Page 13: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 4

A

B

C

D

=================================================================

Quiz 11Textbook: Page 579

=================================================================

Incorrect Previous

SlideMainMenu

Divergent

Repetitive

Convergent

Encryption

Click On: A, B, C, or D

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Page 14: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 4

D

A

B

C

=================================================================

Quiz 11Textbook: Page 579

=================================================================

Correct MainMenu

PreviousSlide

Divergent

Repetitive

Convergent

Encryption

Click On: A, B, C, or D

Click Here For Next Question

__________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks.

Page 15: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11

Textbook: Page 582

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Community

Intellectual

National

Independent

Page 16: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11Textbook: Page 582

=================================================================

Incorrect Previous

SlideMainMenu

Intellectual

Community

National

Independent

Click On: A, B, C, or D

Page 17: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 5

A

B

C

D

=================================================================

__________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos.

Quiz 11Textbook: Page 582

=================================================================

Correct MainMenu

PreviousSlide

Intellectual

Community

National

Independent

Click On: A, B, C, or D

Click Here For Next Question

Page 18: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11

Textbook: Page 590

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Electrical

Biological

Social

Ethical

Page 19: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11Textbook: Page 590

=================================================================

Incorrect Previous

SlideMainMenu

Biological

Electrical

Social

Ethical

Click On: A, B, C, or D

Page 20: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 6

B

A

C

D

=================================================================

__________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims.

Quiz 11Textbook: Page 590

=================================================================

Correct MainMenu

PreviousSlide

Biological

Electrical

Social

Ethical

Click On: A, B, C, or D

Click Here For Next Question

Page 21: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 7

A

B

C

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11

Textbook: Page 556

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

hypertext

cybercrime

hypercube

virtual crime

Page 22: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 7

A

B

C

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11Textbook: Page 556

=================================================================

Incorrect Previous

SlideMainMenu

cybercrime

hypertext

hypercube

virtual crime

Click On: A, B, C, or D

Page 23: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 7

C

B

A

D

=================================================================

The term __________ refers to online or Internet-based illegal acts.

Quiz 11Textbook: Page 556

=================================================================

Correct MainMenu

PreviousSlide

cybercrime

hypertext

hypercube

virtual crime

Click On: A, B, C, or D

Click Here For Next Question

Page 24: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 8

D

B

C

A

=================================================================

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Quiz 11

Textbook: Page 568

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

photocell

scanner

biometric device

digitizer

Page 25: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 8

D

B

C

A

=================================================================

Quiz 11Textbook: Page 568

=================================================================

Incorrect Previous

SlideMainMenu

scanner

photocell

biometric device

digitizer

Click On: A, B, C, or D

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Page 26: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 8

A

B

C

D

=================================================================

Quiz 11Textbook: Page 568

=================================================================

Correct MainMenu

PreviousSlide

scanner

photocell

biometric device

digitizer

Click On: A, B, C, or D

Click Here For Next Question

A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

Page 27: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11

Textbook: Page 564

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

web host

buffer

honeypot

client

Page 28: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11

=================================================================

Incorrect Previous

SlideMainMenu

buffer

web host

honeypot

client

Click On: A, B, C, or D

Textbook: Page 564

Page 29: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 9

D

B

C

A

=================================================================

A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network.

Quiz 11Textbook: Page 564

=================================================================

Correct MainMenu

PreviousSlide

buffer

web host

honeypot

client

Click On: A, B, C, or D

Click Here For Next Question

Page 30: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11

Textbook: Page 569

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Computer hacking

Digital Forensics

Network Administration

Encryption

Page 31: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11Textbook: Page 569

=================================================================

Incorrect Previous

SlideMainMenu

Digital Forensics

Computer hacking

Network Administration

Encryption

Click On: A, B, C, or D

Page 32: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 10

C

B

A

D

=================================================================

__________ is the discovery, collection and analysis of evidence found on computers and networks.

Quiz 11Textbook: Page 569

=================================================================

Correct MainMenu

PreviousSlide

Digital Forensics

Computer hacking

Network Administration

Encryption

Click On: A, B, C, or D

Click Here For Next Question

Page 33: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11

Textbook: Page 573

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Random

Public

Hyper

Indexed

Page 34: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11Textbook: Page 573

=================================================================

Incorrect Previous

SlideMainMenu

Public

Random

Hyper

Indexed

Click On: A, B, C, or D

Page 35: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 11

D

B

C

A

=================================================================

__________ key encryption, also known as asymmetric key encryption uses two encryption keys.

Quiz 11Textbook: Page 573

=================================================================

Correct MainMenu

PreviousSlide

Public

Random

Hyper

Indexed

Click On: A, B, C, or D

Click Here For Next Question

Page 36: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 12

C

B

A

D

=================================================================

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Quiz 11

Textbook: Page 574

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

stamp

disclaimer

digital signature

copyright

Page 37: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 12

C

B

A

D

=================================================================

Quiz 11Textbook: Page 574

=================================================================

Incorrect Previous

SlideMainMenu

copyright

stamp

disclaimer

digital signature

Click On: A, B, C, or D

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Page 38: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 12

C

B

A

D

=================================================================

Quiz 11Textbook: Page 574

=================================================================

Correct MainMenu

PreviousSlide

copyright

stamp

disclaimer

digital signature

Click On: A, B, C, or D

Click Here For Next Question

A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site.

Page 39: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 13

A

B

C

D

=================================================================

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Quiz 11

Textbook: Page 580

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Encryption

Programming

Forensics

Ergonomics

Page 40: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 13

A

B

C

D

=================================================================

Quiz 11Textbook: Page 580

=================================================================

Incorrect Previous

SlideMainMenu

Programming

Encryption

Forensics

Ergonomics

Click On: A, B, C, or D

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Page 41: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 13

A

B

C

D

=================================================================

Quiz 11Textbook: Page 580

=================================================================

Correct MainMenu

PreviousSlide

Programming

Encryption

Forensics

Ergonomics

Click On: A, B, C, or D

Click Here For Next Question

__________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Page 42: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11

Textbook: Page 587

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

E-cards

Spam

Texting

Postings

Page 43: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11Textbook: Page 587

=================================================================

Incorrect Previous

SlideMainMenu

Spam

E-cards

Texting

Postings

Click On: A, B, C, or D

Page 44: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 14

B

A

C

D

=================================================================

__________ is/are unsolicited e-mail or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail.

Quiz 11Textbook: Page 587

=================================================================

Correct MainMenu

PreviousSlide

Spam

E-cards

Texting

Postings

Click On: A, B, C, or D

Click Here For Next Question

Page 45: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11

Textbook: Page 587

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Cloning

Streaming

Compression

Phishing

Page 46: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11Textbook: Page 587

=================================================================

Incorrect Previous

SlideMainMenu

Streaming

Cloning

Compression

Phishing

Click On: A, B, C, or D

Page 47: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 15

A

B

C

D

=================================================================

__________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

Quiz 11Textbook: Page 587

=================================================================

Correct MainMenu

PreviousSlide

Streaming

Cloning

Compression

Phishing

Click On: A, B, C, or D

Click Here For Next Question

Page 48: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 16

A

B

C

D

=================================================================

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Quiz 11

Textbook: Page 584

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

privacy

retrieval

dispersion

transmission

Page 49: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 16

D

B

C

A

=================================================================

Quiz 11Textbook: Page 584

=================================================================

Incorrect Previous

SlideMainMenu

retrieval

privacy

dispersion

transmission

Click On: A, B, C, or D

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Page 50: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 16

A

B

C

D

=================================================================

Quiz 11Textbook: Page 584

=================================================================

Correct MainMenu

PreviousSlide

retrieval

privacy

dispersion

transmission

Click On: A, B, C, or D

Click Here For Next Question

Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Page 51: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11

Textbook: Page 563

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Cloning

Coding

Spoofing

Encoding

Page 52: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11Textbook: Page 563

=================================================================

Incorrect Previous

SlideMainMenu

Coding

Cloning

Spoofing

Encoding

Click On: A, B, C, or D

Page 53: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 17

C

B

A

D

=================================================================

__________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

Quiz 11Textbook: Page 563

=================================================================

Correct MainMenu

PreviousSlide

Coding

Cloning

Spoofing

Encoding

Click On: A, B, C, or D

Click Here For Next Question

Page 54: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11

Textbook: Page 566

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

password

combination

code key

signature

Page 55: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11Textbook: Page 566

=================================================================

Incorrect Previous

SlideMainMenu

combination

password

code key

signature

Click On: A, B, C, or D

Page 56: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 18

A

B

C

D

=================================================================

A __________ is a private combination of characters associated with the user name that allows access to certain computer resources.

Quiz 11Textbook: Page 566

=================================================================

Correct MainMenu

PreviousSlide

combination

password

code key

signature

Click On: A, B, C, or D

Click Here For Next Question

Page 57: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11

Textbook: Page 564

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

Defrag Utility

Compression Utility

Zip Utility

Personal Firewall

Page 58: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11Textbook: Page 564

=================================================================

Incorrect Previous

SlideMainMenu

Compression Utility

Defrag Utility

Zip Utility

Personal Firewall

Click On: A, B, C, or D

Page 59: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 19

C

B

A

D

=================================================================

A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Quiz 11Textbook: Page 564

=================================================================

Correct MainMenu

PreviousSlide

Compression Utility

Defrag Utility

Zip Utility

Personal Firewall

Click On: A, B, C, or D

Click Here For Next Question

Page 60: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 20

A

B

C

D

=================================================================

A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Quiz 11

Textbook: Page 556

=================================================================

PreviousSlide

MainMenu

Click On: A, B, C, or D

computer security risk

head crash

cyber attack

event horizon

Page 61: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 20

A

B

C

D

=================================================================

Quiz 11Textbook: Page 556

=================================================================

Incorrect Previous

SlideMainMenu

computer security risk

event horizon

head crash

cyber attack

Click On: A, B, C, or D

A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Page 62: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Question 20

A

B

C

D

=================================================================

Quiz 11Textbook: Page 556

=================================================================

Correct MainMenu

PreviousSlide

computer security risk

event horizon

head crash

cyber attack

Click On: A, B, C, or D

Click Here For The Answer Key

An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

Page 63: MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy Discovering Computers 2010.

Answer Key Computer Security and Safety, Ethics, and Privacy

Q1 = A

Quiz 11PreviousSlide

End Show

Q2 = D

Q3 = C

Q4 = AQ5 = B

Q8 = C

Q6 = C

Q7 = B

Q9 = C

Q10 = B

Q11 = B

Q12 = D

Q13 = D

Q14 = B

Q15 = D

Q16 = A Q17 = C Q18 = A

Q19 = D Q20 = B

MainMenu


Recommended