Chapter 11

Technology In Action, Complete Version (7th Edition)

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
View Attempt 1 of 1  Title: Chapter 11 Started: December 1, 2007 5:38 PM Submitted: December 1, 2007 6:07 PM Time  spent: 00:29:26  Total  score: 21/25 = 84%   Total score adjusted by 0.0  Maximum possible score: 25  1.   A UPS connects between a computer and a _____.   Student  Response Value Correct  Answer Feedback A.  peripheral device 100%      B.  disk drive 0%    Incorrect.  C.  communications device 0%      D.  power source 0%      Score: 0/1    2.   The term _____ refers to online or Internet-based illegal acts.   Student  Response Value Correct  Answer Feedback A.  malicious- logic program 0%      B.  computer crime 0%      C.  cybercrime 100%    Correct.  D.  system failure 0%     
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Score: 1/1    3.   The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems.   Student  Response Value Correct  Answer Feedback A.  cookie 0%      B.  proxy 0%      C.  zombie 100%    Correct.  D.  standby 0%      Score: 1/1    4.   To _____ a program file, an antivirus program records information such as the file size and file creation date in a separate file.   Student  Response Value Correct  Answer Feedback A.  quarantine 0%      B.  decrypt 0%      C.  blackout 0%      D.  inoculate 100%    Correct.<br/><br/>  Score: 1/1    5.   Symptoms of a user with computer addiction include all of the following except _____.   Student  Value Correct  Feedback
Background image of page 2
  Student  Response Value Correct  Answer Feedback B.  unable to stop computer activity 0%      C.  neglects family and friends 0%      D.  irritable when at the computer 100%    Correct.<br/><br/>  Score: 1/1    6.   Many businesses use _____ to limit employees’ Web access.   Student  Response Value Correct  Answer Feedback A.  content filtering 100%    Correct.  B.  Web bugs 0%      C.  honeypots 0%      D.  spyware 0%      Score: 1/1    7.   The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.   Student Response Value Correct  Answer Feedback A.  Electronic 100%    Correct. 
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Student Response Value Correct  Answer Feedback B.  Fair Credit Reporting Act 0%      C.  Computer Fraud and Abuse Act 0%      D.  Computer Matching and Privacy Protection Act 0%      Score: 1/1    8.   A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action.   Student  Response Value Correct  Answer Feedback A.  computer virus 0%      B.  worm 0%      C.  Trojan horse 100%      D.  all of the above 0%    Incorrect.<br/><br/>  Score: 0/1    9.  
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 54

Chapter 11 - ViewAttempt1of1 Title: Chapter11 Started:...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online