CSIT 101 FINAL EXAM | well elaborated questions and answers | updated
CSIT 101 FINAL EXAM | well elaborated questions and answers | updated A Kindle eBook reader is an example of a(n) _____ computer? - special-purpose A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? - zombie A _____ is an example of a computer assigned to a special task. - Kiosk A _____ provides content that is accessible on the World Wide Web. - Web server A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. - analyze large amounts of data A common form of authentication is a ____. - Password A company called ____ provides digital certifications for web transactions. - VeriSign A company may hire a ____ hacker to learn about vulnerabilities in its system. - White-hat A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world. - violent, interactive simulated games A game console relies on a fast _____ to handle the lively animations in a video game. - microprocessor A popular encryption method used to protect data that travels over a wireless network is ____. - WPA A popular term used to identify devices such as the iPad is _____. - Tablet PC A printer requires a ____ installed on the computer in order to operate. - Device Driver A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. - SSL A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. - Transparent A(n) ____ view of data is the way a user thinks about data. - Logical AI applications are ways in which AI methodologies are applied to ____ and provide services. - Solves Problems All of the following are examples of malware EXCEPT ____. - Updates An Internet-based crime is referred to as a(n) ____ crime. - Cyber An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true. - Libel An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. - Phishing An icon on your desktop is a component of a ____ interface. - graphical user An important function of a firewall is to protect all the ____ of a network or computer from undesirable data - Ports An individual who illegally downloads copyright-protected software is referred to as a ____. - Pirate An industrial operating system works with a large computer system requiring a(n) ____. - Server An item such as a smart card is an example of the ____ form of authentication. - Som
Escuela, estudio y materia
- Institución
- CSIT 101
- Grado
- CSIT 101
Información del documento
- Subido en
- 2 de noviembre de 2023
- Número de páginas
- 5
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
csit 101 final exam well elaborated questions an
Documento también disponible en un lote