Show
Recommended textbook solutions
Fundamentals of Engineering Economic Analysis1st EditionDavid Besanko, Mark Shanley, Scott Schaefer 215 solutions
Advanced Engineering Mathematics10th EditionErwin Kreyszig 4,134 solutions
Chemistry for Engineering Students2nd EditionLawrence S. Brown, Thomas A. Holme 945 solutions Chemical Reaction Engineering3rd EditionOctave Levenspiel 228 solutions NOTE: THIS IS STILL ONGOING. THE FINAL EXAM WILL OPEN ON JUNE 21, 2021. THANK YOU! Correct Mark 1.00 out of 1.00 Flag question It is a
software application that brings potential harm to your computer because it disrupt your computer operation by installing Trojan, viruses, worms, spyware, adware and other software that does malicious intent. Select one: a. Pharming b. Phishing c. Spyware d. Malware Question 2Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Honey Net is the whole set-up of the network infrastructure that has intentional vulnerabilities to attract hackers or intruders. Question 3Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Computer Security is very important to learn because it enables the people to carry out their jobs, education and research, it supports critical business process and lastly it protects personal and sensitive information. Question 4Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Network Security is the process of taking physical and software preventative measure to protect the underlying networking infrastructure from unauthorized access, misuse, malfunctions, modification, destruction or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment. Question 5Correct Mark 1.00 out of 1.00 Flag question Question textIt is a type of software application that is used for surveillance wherein attackers make use of this to record or gather the keystroke made by the users of the infected computer. Select one: a. Key Loggers b. Rootkits c. Worms d. Trojans FeedbackQuestion 6Correct Mark 1.00 out of 1.00 Flag question
Question textThe process of physically organizing the content of the mass storage device into the smallest number of contiguous regions (fragments). Select one: a. Defragmentation b. Software Updates c. Disk Cleanup d. Backup FeedbackQuestion 7Correct Mark 1.00 out of 1.00 Flag question Question textIt is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event. Select one: a. Back-up b. Disk Cleanup c. Software Update d. Defragmentation FeedbackQuestion 8Correct Mark 1.00 out of 1.00 Flag question Question textIt is a software package that automatically renders advertisements in order to generate revenue for its authors. Select one: a. Ransomware b. Driver c. Patch d. Adware FeedbackQuestion 9Correct Mark 1.00 out of 1.00 Flag question Question textIt is a hacking activity that redirects the website visitor from their legitimate websites into fraudulent website without them knowing it. Select one: a. Pharming b. Phishing c. Malware d. Spyware FeedbackQuestion 10Correct Mark 1.00 out of 1.00 Flag question Question textA maintenance utility included in Microsoft Windows that is used to free up disk spaces on the computer hard drive. Select one: a. Backup b. Disk Cleanup c. Software Updates d. Defragmentation FeedbackQuestion 1Correct Mark 1.00 out of 1.00 Flag question Question textIt is a virus that replicates itself to infect the whole computer and typically used by attacker to make a DoS or Denial of Service attack.. Select one: a. Rootkits b. Trojans c. Key Loggers d. Worms FeedbackQuestion 2Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that no errors exist before loading the operating system. Question 3Correct Mark 1.00 out of 1.00 Flag question Question textIt is the fast-growing area of crime because more and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities. Select one: a. Backup b. Ethical Hacking c. Cyber Crime d. Disk Cleanup FeedbackQuestion 4Correct Mark 1.00 out of 1.00 Flag question
Question textIt is a software application installed in your computer that is spying in your data, meaning this software gets information from your computer without you knowing it and sends it to the attacker or the hacker. Select one: a. Pharming b. Phishing c. Spyware d. Malware FeedbackQuestion 5Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Honey Pot is a software application that scans your whole computer’s hard drives and folders for possible malware or virus infections. Question 6Correct Mark 1.00 out of 1.00 Flag question Question textIt is the term used to describe an individual’s anonymity and how safe they feel in a website location. Select one: a. Software Update b. Disk Cleanup c. Defragmentation d. Computer Privacy FeedbackQuestion 7Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Firewall is the process of converting a data or information into another form also known as cipher text. Question 8Correct Mark 1.00 out of 1.00 Flag question Question textIt is a special type of application that prevents its user to access the computer system without paying its creator or subscribing/buying to its creator’s product or services. Select one: a. Adware b. Driver c. Ransomware d. Patch FeedbackQuestion 9Correct Mark 1.00 out of 1.00 Flag question Question textChoose True if the Statement is True and False if the statement is False. Copywright is a legal right credited by law of a country that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time. Question 10Correct Mark 1.00 out of 1.00 Flag question Question textA special type of software that is used to hide malware, bots and worms. This software should be installed in the target computer. Select one: a. Rootkits b. Key Loggers c. Worms d. Trojans FeedbackPopular posts from this blog
TECHNOPRENEURSHIP | MIDTERM QUIZ 1 TO MIDTERM EXAMQuestion 50 Not answered Marked out of 1.00 Flag question Question text Which of the following is not a disadvantage of sole proprietorship? Select one: Unstable business life none of the choices Large personal time commitment Difficulty in attracting qualified employees Question 49 Not answered Marked out of 1.00 Flag question Question text Company’s general business goals and the company’s immediate objectives. Select one: Business Strategy Business and Industry Profile Marketing Strategy Executive Summary Question 48 Not answered Marked out of 1.00 Flag question Question text Formed by people with similar interests, such as customers and suppliers. Select one: stockholders franchises joint ventures Cost and complexity of formation cooperatives Question 47 Not answered Marked out of 1.00 Flag question Question text The purchase of a corporation by another corporation or investment group. Select one: cooperatives joint ventures Acquisition Merger Question 46 Not answered Ma RHYTHMIC ACTIVITIES | MIDTERM QUIZ 1 - MIDTERM EXAM
Which software renders advertisements for the purpose of generating revenue for its author?Adware is an "advertising-supported software" that displays ads on websites and collects data on a user's behavior for marketing purposes. Adware generates revenue for a company through display and pay-per-click advertising.
Is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event?What are Backups? In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
Is the term used to describe an individual's anonymity and how safe they feel in a website location?With the Internet, privacy describes an individual or group's control over their selective anonymity and how safe they feel about the storage and sharing of information.
|