CSIT 101 FINAL EXAM QUESTIONS AND ANSWERS ALREADY PASSED
CSIT 101 FINAL EXAM QUESTIONS AND ANSWERS ALREADY PASSED A Kindle eBook reader is an example of a(n) _____ computer? special-purpose A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? zombie A _____ is an example of a computer assigned to a special task. Kiosk A _____ provides content that is accessible on the World Wide Web. Web server A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. analyze large amounts of data A common form of authentication is a ____. Password A company called ____ provides digital certifications for web transactions. VeriSign A company may hire a ____ hacker to learn about vulnerabilities in its system. White-hat A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world. violent, interactive simulated games A game console relies on a fast _____ to handle the lively animations in a video game. microprocessor A popular encryption method used to protect data that travels over a wireless network is ____. WPA A popular term used to identify devices such as the iPad is _____. Tablet PC A printer requires a ____ installed on the computer in order to operate. Device Driver A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. SSL A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. Transparent A(n) ____ view of data is the way a user thinks about data. Logical AI applications are ways in which AI methodologies are applied to ____ and provide services. Solves Problems All of the following are examples of malware EXCEPT ____. Updates An Internet-based crime is referred to as a(n) ____ crime. Cyber An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true. Libel An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. Phishing An icon on your desktop is a component of a ____ interface. graphical user An important function of a firewall is to protect all the ____ of a network or computer from undesirable data Ports An individual who illegally downloads copyright-protected software is referred to as a ____. Pirate An
Escuela, estudio y materia
- Institución
- CSIT 101
- Grado
- CSIT 101
Información del documento
- Subido en
- 12 de diciembre de 2023
- Número de páginas
- 17
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
csit 101 final exam questions and answers already
Documento también disponible en un lote