with 100% Correct Answers | Latest
Version 2024 | Verified
A Kindle eBook reader is an example of a.. - ✔✔Special-purpose
A___computer is remotely controlled by a hacker to damage or corrupt a computer resource -
✔✔zombie
A___is an example of a computer assigned to a special task - ✔✔kiosk
A___provided content that is accessible on the World Wide Web - ✔✔web server
A challenge for companies such as Google and Facebook is building software that can ___ over the next
few years - ✔✔analyze large amounts of data
A common form of authentication is a ___ - ✔✔password
A company called ___ provides digital certifications for web transactions - ✔✔Verisign
A company may hire a ___ hacker to learn about vulnerabilities in its system - ✔✔white-hat
A concern over heavy use of ___ is that it may desensitize the individual to the reality of the real world -
✔✔violet, interactive stimulated games
A game console relies on a fast___to handle the lively animations in a video game - ✔✔microprocessor
A popular encryption method used to protect data that travels over a wireless network is___ - ✔✔WPA
, A popular term used to identify devices such as the iPad is___ - ✔✔tablet PC
A printer requires a ___ installed on the computer in order to operate - ✔✔device driver
A(n)___ certificate confirms your credentials when conducting business or other transactions on the web
- ✔✔SSL
A(n)___ life style involves ridding oneself of all concerns about privacy - ✔✔transparent
A(n) view of data is the way a user thinks about data - ✔✔logical
Al applications are ways in which AI methodologies are applied to___ and provide services - ✔✔solve
problems
All of the following are examples of malware EXCEPT____ - ✔✔updates
An internet-based crime is referred to as a(n) ____ crime - ✔✔cyber
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know
that it's not true. - ✔✔libel
An email with a subject heading "Urgent Security Update" that requests a username and password
followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. - ✔✔phishing
An icon on your desktop is a component of a ____ interface. - ✔✔graphical user
An important function of a firewall is to protect all the ____ of a network or computer from undesirable
data. - ✔✔ports