Questions and CORRECT Answers
A Kindle eBook reader is an example of a(n) _____ computer? - CORRECT ANSWER✔✔-
special-purpose
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer
resource? - CORRECT ANSWER✔✔- zombie
A _____ is an example of a computer assigned to a special task. - CORRECT ANSWER✔✔-
Kiosk
A _____ provides content that is accessible on the World Wide Web. - CORRECT
ANSWER✔✔- Web server
A challenge for companies such as Google and Facebook is building software that can ____
over the next few years. - CORRECT ANSWER✔✔- analyze large amounts of data
A common form of authentication is a ____. - CORRECT ANSWER✔✔- Password
A company called ____ provides digital certifications for web transactions. - CORRECT
ANSWER✔✔- VeriSign
A company may hire a ____ hacker to learn about vulnerabilities in its system. - CORRECT
ANSWER✔✔- White-hat
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the
real world. - CORRECT ANSWER✔✔- violent, interactive simulated games
A game console relies on a fast _____ to handle the lively animations in a video game. -
CORRECT ANSWER✔✔- microprocessor
, A popular encryption method used to protect data that travels over a wireless network is
____. - CORRECT ANSWER✔✔- WPA
A popular term used to identify devices such as the iPad is _____. - CORRECT
ANSWER✔✔- Tablet PC
A printer requires a ____ installed on the computer in order to operate. - CORRECT
ANSWER✔✔- Device Driver
A(n) ____ certificate confirms your credentials when conducting business or other
transactions on the web. - CORRECT ANSWER✔✔- SSL
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. - CORRECT
ANSWER✔✔- Transparent
A(n) ____ view of data is the way a user thinks about data. - CORRECT ANSWER✔✔-
Logical
AI applications are ways in which AI methodologies are applied to ____ and provide
services. - CORRECT ANSWER✔✔- Solves Problems
All of the following are examples of malware EXCEPT ____. - CORRECT ANSWER✔✔-
Updates
An Internet-based crime is referred to as a(n) ____ crime. - CORRECT ANSWER✔✔-
Cyber
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs,
when you know that it's not true. - CORRECT ANSWER✔✔- Libel
An email with a subject heading "Urgent Security Update" that requests a username and
password followed by a link to "re-login and resolve the issue" is a good example of a ____
scam. - CORRECT ANSWER✔✔- Phishing