Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What is a worm?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
What is a hash?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
What is an update?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
What is a peer-to-peer network?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
What is ciphertext?
key
A file or collection of software tools that resolves system liabilities and improves software performance
A number generated by an algorithm from a string of text
A network in which each computer has both server and client capabilities
a licensing agreement.
A self-replicating program or algorithm that consumes system resources
Encrypted data
the user need only receive the virus for it to cause damage.
Check it!