AND ANSWERS
A Kindle eBook reader is an example of a(n) _____ computer? - ANS special-purpose
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer
resource? - ANS zombie
A _____ is an example of a computer assigned to a special task. - ANS Kiosk
A _____ provides content that is accessible on the World Wide Web. - ANS Web server
A challenge for companies such as Google and Facebook is building software that can ____ over
the next few years. - ANS analyze large amounts of data
A common form of authentication is a ____. - ANS Password
A company called ____ provides digital certifications for web transactions. - ANS VeriSign
A company may hire a ____ hacker to learn about vulnerabilities in its system. - ANS White-
hat
1
Page
@COPYRIGHT BRAINBARTER 2025/2026
, A concern over heavy use of ____ is that it may desensitize the individual to the reality of the
real world. - ANS violent, interactive simulated games
A game console relies on a fast _____ to handle the lively animations in a video game. -
ANS microprocessor
A popular encryption method used to protect data that travels over a wireless network is ____.
- ANS WPA
A popular term used to identify devices such as the iPad is _____. - ANS Tablet PC
A printer requires a ____ installed on the computer in order to operate. - ANS Device Driver
A(n) ____ certificate confirms your credentials when conducting business or other transactions
on the web. - ANS SSL
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. - ANS Transparent
A(n) ____ view of data is the way a user thinks about data. - ANS Logical
AI applications are ways in which AI methodologies are applied to ____ and provide services. -
ANS Solves Problems
All of the following are examples of malware EXCEPT ____. - ANS Updates
An Internet-based crime is referred to as a(n) ____ crime. - ANS Cyber
2
Page
@COPYRIGHT BRAINBARTER 2025/2026