chapter 11 - Your results have been saved to the Universal...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Your results have been saved to the Universal Grade Book! 1 out of 20 correct Study Page: 590 1. ____ is the process of restricting access to certain material on the Web. a. Spyware b. Employee monitoring c. Content filtering d. Social engineering 2 out of 20 correct Study Page: 574 2. The ____ code usually consists of the user's name and a hash of all or part of the message. a. digital certificate b. compaction c. transposition d. digital signature 3 out of 20 incorrect Study Page: 571 3. One type of ____ can occur when a programmer is terminated from, or stops working for, a company. a. hardware theft b. information theft c. software theft d. hardware vandalism 4 out of 20 correct Study Page: 581 4. Someone with computer addiction may ____. a. neglect family and friends b. blink his eyes every five seconds c. look into the distance and focus on an object d. roll his eyes in a circle 5 out of 20 correct Study Page: 576 5. Sometimes resembling a power strip, the computer and other devices plug in the ____, which plugs in the power source. a. surge protector
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/01/2011 for the course CSI 111 taught by Professor Lavoie during the Spring '09 term at Holyoke CC.

Page1 / 4

chapter 11 - Your results have been saved to the Universal...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online