Digital Media - 1st 9-Weeks Review Part 3: Question Preview (ID: 10744)


Below is a preview of the questions contained within the game titled DIGITAL MEDIA - 1ST 9-WEEKS REVIEW PART 3: Digital Media - 1st 9-Weeks Review Part 3 .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]


Play games to reveal the correct answers. Click here to play a game and get the answers.

Users that access a computer illegally are called
a) Criminals b) Viruses c) Hackers d) Thieves
Companies and organizations employ security systems to protect the integrity of the system. These usually involve
a) Passwords b) Data Encryption c) Firewall d) All Choices
A program or file that infects a system.
a) Worm b) Virus c) Trojan Horse d) Timebomb
To protect against computer viruses, use
a) Firewall b) Data Encryption c) Virus Protection Program d) Hand sanitizer
A program that enters usually through a network and then replicates itself.
a) Worm b) Trojan Horse c) Virus d) Timebomb
Stays on the system until a specific date or event, then it is executed.
a) Worm b) Trojan Horse c) Timebomb d) Virus
Uing ideas and words as your own when they are not your own.
a) Coyright infringement b) Trademark violation c) Piracy d) Plagiarism
Internet etiquette.
a) Manners b) Interetiquette c) Netiquette d) Politeness
Internet Explorer uses what type of icon to indicate a secure site:
a) Key b) Blue E c) Padlock d) Compass
To protect against virus attacks, you should:
a) Scan all attachments via email b) Do not execute program attachments on an email c) Scan disks you receive from others d) All choices
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 10744 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register