CSIT 101 FINAL EXAM | well elaborated questions and answers | updated
CSIT 101 FINAL EXAM | well elaborated questions and answers | updated A Kindle eBook reader is an example of a(n) _____ computer? - special-purpose A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? - zombie A _____ is an example of a computer assigned to a special task. - Kiosk A _____ provides content that is accessible on the World Wide Web. - Web server A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. - analyze large amounts of data A common form of authentication is a ____. - Password A company called ____ provides digital certifications for web transactions. - VeriSign A company may hire a ____ hacker to learn about vulnerabilities in its system. - White-hat A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world. - violent, interactive simulated games A game console relies on a fast _____ to handle the lively animations in a video game. - microprocessor A popular encryption method used to protect data that travels over a wireless network is ____. - WPA A popular term used to identify devices such as the iPad is _____. - Tablet PC A printer requires a ____ installed on the computer in order to operate. - Device Driver A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. - SSL A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. - Transparent A(n) ____ view of data is the way a user thinks about data. - Logical AI applications are ways in which AI methodologies are applied to ____ and provide services. - Solves Problems All of the following are examples of malware EXCEPT ____. - Updates An Internet-based crime is referred to as a(n) ____ crime. - Cyber An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true. - Libel An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. - Phishing An icon on your desktop is a component of a ____ interface. - graphical user An important function of a firewall is to protect all the ____ of a network or computer from undesirable data - Ports An individual who illegally downloads copyright-protected software is referred to as a ____. - Pirate An industrial operating system works with a large computer system requiring a(n) ____. - Server An item such as a smart card is an example of the ____ form of authentication. - Som
Written for
- Institution
- CSIT 101
- Course
- CSIT 101
Document information
- Uploaded on
- November 2, 2023
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csit 101 final exam well elaborated questions an
Also available in package deal