(Combined) Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam. With Complete Solution 2024.
(Combined) Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam. With Complete Solution 2024. _____ ensures that the person requesting access to a computer is not an imposter. Authentication After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________. cyberbullying Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records? biometric security (?) Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location. data backup Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer? A Trojan How can an attacker execute malware through a script? An attacker can attach a script to a program that you download which then infects your computer How can you protect a computer from electrical spikes and surges? Use a surge protector. How can you protect personal information gathered by legitimate organizations? Create a separate
Written for
- Institution
- Computer Concepts
- Course
- Computer Concepts
Document information
- Uploaded on
- February 15, 2024
- Number of pages
- 14
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
combined module 6 computer concepts exam comput
Also available in package deal