CSIT 101 FINAL EXAM QUESTIONS AND ANSWERS ALREADY PASSED
CSIT 101 FINAL EXAM QUESTIONS AND ANSWERS ALREADY PASSED A Kindle eBook reader is an example of a(n) _____ computer? special-purpose A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? zombie A _____ is an example of a computer assigned to a special task. Kiosk A _____ provides content that is accessible on the World Wide Web. Web server A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. analyze large amounts of data A common form of authentication is a ____. Password A company called ____ provides digital certifications for web transactions. VeriSign A company may hire a ____ hacker to learn about vulnerabilities in its system. White-hat A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world. violent, interactive simulated games A game console relies on a fast _____ to handle the lively animations in a video game. microprocessor A popular encryption method used to protect data that travels over a wireless network is ____. WPA A popular term used to identify devices such as the iPad is _____. Tablet PC A printer requires a ____ installed on the computer in order to operate. Device Driver A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. SSL A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. Transparent A(n) ____ view of data is the way a user thinks about data. Logical AI applications are ways in which AI methodologies are applied to ____ and provide services. Solves Problems All of the following are examples of malware EXCEPT ____. Updates An Internet-based crime is referred to as a(n) ____ crime. Cyber An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true. Libel An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. Phishing An icon on your desktop is a component of a ____ interface. graphical user An important function of a firewall is to protect all the ____ of a network or computer from undesirable data Ports An individual who illegally downloads copyright-protected software is referred to as a ____. Pirate An
Written for
- Institution
- CSIT 101
- Course
- CSIT 101
Document information
- Uploaded on
- December 12, 2023
- Number of pages
- 17
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csit 101 final exam questions and answers already
Also available in package deal