CIS 100 Introduction to Computers Final Exam
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. Select one: a. computer savvy b. technology literate c. computer competent d. computer literate correct answer: d. computer literate The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called: Select one: a. HALO animation. b. computer forensics. c. robotics. d. RFID simulation. correct answer: b. computer forensics. ________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements. Select one: A.. RFID b. PPS c. POS d. GPS correct answer: A.. RFID Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually. Select one: a. robotics b. forecasting c. simulation d. computer forensics correct answer: a. robotics All of the following are examples of real security and privacy risks EXCEPT Select one: a. viruses. b. hackers. c. spam. d. identity theft. correct answer: c. spam.
Geschreven voor
- Instelling
-
Liberty University
- Vak
-
CIS 100
Documentinformatie
- Geüpload op
- 12 december 2022
- Aantal pagina's
- 16
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cis 100 introduction to computers final exam
Ook beschikbaar in voordeelbundel