Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
A computer security risk is defined as any event or action that could cause loss of, or damage to__________
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
A ____ virus replaces the program that is used to start the computer system with a modified, infected version of the startup program.
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
A ____ virus hides within or is designed to look like a legitimate program.
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
Digital native students are those that have been raised with technology all around them.
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
A ____ is a program that is activated on a specific date
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
A ____ virus inserts virus code into program files.
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
Technology should replace hands on experiences since it can bring learning to the students and costs less than labs, equipment and supplies
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
Technology challenges include:
All are correct
False
all are correct
True
Boot Sector
File
Time bomb
Trojan Horse
Check it!