CSIT 101 FINAL EXAM 2025|COMPLETE EXAM TEST
(questions and verified answers) FREQUENTLY MOST
TESTED QUESTIONS |already graded A+|100%
passed!!
A Kindle eBook reader is an example of a(n) _____ computer? -
(ANSWER)special-purpose
A ____ computer is remotely controlled by a hacker to damage or corrupt a
computer resource? - (ANSWER)zombie
A _____ is an example of a computer assigned to a special task. - (ANSWER)Kiosk
A _____ provides content that is accessible on the World Wide Web. -
(ANSWER)Web server
A challenge for companies such as Google and Facebook is building software that
can ____ over the next few years. - (ANSWER)analyze large amounts of data
A common form of authentication is a ____. - (ANSWER)Password
A company called ____ provides digital certifications for web transactions. -
(ANSWER)VeriSign
, A company may hire a ____ hacker to learn about vulnerabilities in its system. -
(ANSWER)White-hat
A concern over heavy use of ____ is that it may desensitize the individual to the
reality of the real world. - (ANSWER)violent, interactive simulated games
A game console relies on a fast _____ to handle the lively animations in a video
game. - (ANSWER)microprocessor
A popular encryption method used to protect data that travels over a wireless
network is ____. - (ANSWER)WPA
A popular term used to identify devices such as the iPad is _____. -
(ANSWER)Tablet PC
A printer requires a ____ installed on the computer in order to operate. -
(ANSWER)Device Driver
A(n) ____ certificate confirms your credentials when conducting business or other
transactions on the web. - (ANSWER)SSL
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. -
(ANSWER)Transparent
(questions and verified answers) FREQUENTLY MOST
TESTED QUESTIONS |already graded A+|100%
passed!!
A Kindle eBook reader is an example of a(n) _____ computer? -
(ANSWER)special-purpose
A ____ computer is remotely controlled by a hacker to damage or corrupt a
computer resource? - (ANSWER)zombie
A _____ is an example of a computer assigned to a special task. - (ANSWER)Kiosk
A _____ provides content that is accessible on the World Wide Web. -
(ANSWER)Web server
A challenge for companies such as Google and Facebook is building software that
can ____ over the next few years. - (ANSWER)analyze large amounts of data
A common form of authentication is a ____. - (ANSWER)Password
A company called ____ provides digital certifications for web transactions. -
(ANSWER)VeriSign
, A company may hire a ____ hacker to learn about vulnerabilities in its system. -
(ANSWER)White-hat
A concern over heavy use of ____ is that it may desensitize the individual to the
reality of the real world. - (ANSWER)violent, interactive simulated games
A game console relies on a fast _____ to handle the lively animations in a video
game. - (ANSWER)microprocessor
A popular encryption method used to protect data that travels over a wireless
network is ____. - (ANSWER)WPA
A popular term used to identify devices such as the iPad is _____. -
(ANSWER)Tablet PC
A printer requires a ____ installed on the computer in order to operate. -
(ANSWER)Device Driver
A(n) ____ certificate confirms your credentials when conducting business or other
transactions on the web. - (ANSWER)SSL
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. -
(ANSWER)Transparent