Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 8c - 9a
Test Description: ,,,
Instructions: Answer all questions to get your test result.
1) Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
A
a trademark violation.
B
a licensing agreement.
C
a non-disclosure agreement.
D
an end-user license agreeement.
2) Because spam is sent to you uninvited, it can be considered:
A
an invasion of privacy.
B
copyright infringement.
C
a licensing agreement.
D
a trademark violation.
3) What is an update?
A
A graphic or moving image that appears on your screen when your computer is idle
B
A file or collection of software tools that resolves system liabilities and improves software performance
C
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
D
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
4) What is a hash?
A
A number generated by an algorithm from a string of text
B
A file or collection of tools that resolves system liabilities and improves software performance
C
A small text file that stores user preferences and information, for websites to use
D
A file of programming code that is inserted into an existing executable program to fix a bug
5) Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
A
the virus will alter code in the Windows registry files.
B
the user need only receive the virus for it to cause damage.
C
all other computing processes will stop until the user deletes the message.
D
the virus will replicate itself until the entire disk is full as soon as the user opens the message.
6) Which of the following is the most effective way to spread viruses?
A
Downloading program updates and patches
B
Connecting your computer to a LAN
C
Connecting your computer to the Internet through a firewall
D
Sending email attachments
7) Question 37 :The Right to be Forgotten debate revolves around what?
A
Protecting your data that resides in the cloud
B
Protecting your image and personal information in the world of social networking
C
Hiding your image and personal information from potential spammers
D
Protecting your data from computer viruses
8) Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
A
Users on the LAN may not be able to upload files to external servers, thus conserving bandwidth.
B
Firewalls do not encrypt or authenticate data so users on the LAN do not need to track public and private encryption keys.
C
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
D
Users on the LAN may not be able to access an external email provider, thus removing the temptation to abuse email privileges
9) What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
A
key
B
Hash
C
Activation code
D
Patch
10) What is ciphertext?
A
Authenticated data
B
Updated data
C
Encrypted data
D
Unencrypted data
11) Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
A
Decryption
B
User name and password
C
Digital certificate
D
Encryption
12) What is a worm?
A
An application that installs hidden services on systems
B
A malicious program that assumes control of system operations, and damages or destroys data
C
A program that appears to be harmless but actually produces harmful results
D
A self-replicating program or algorithm that consumes system resources
13) Why should you use automatic cookie handling in most browsers?
A
To display warnings pending the receipt of first-party and third-party cookies
B
To broadly control when and from whom cookies are accepted
C
To accept first-party cookies but reject third-party cookies
D
To accept third-party cookies but reject first-party cookies
14) You can use screen savers to:
A
prevent outsiders from accessing a private network.
B
insert programming code into an existing executable program to fix a known problem.
C
hide your work while you are away from your desk, providing a measure of security.
D
resolve system liabilities and improve software performance.
15) The FTP navigational structure:
A
can be accessed only through command-line FTP clients.
B
provides access only to binary files.
C
requires you to click links to access the topics in which you are interested.
D
is similar to the hierarchical directory structure of a hard drive.
16) Which of the following do end users most commonly download from FTP sites?
A
Binary Files
B
Application source files
C
Files that have unknown MIME types
D
Archives of information
17) Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
A
The ping command
B
The get command
C
The tracert command
D
The ipconfig command
18) What is a peer-to-peer network?
A
A network that offers mass email and texting services
B
A network in which each computer has both server and client capabilities
C
A network that allows you to control client computers at a remote location
D
A network that allows you to control the server of a remote network
19) Which of the following should you use when you want to test connectivity between your computer and a destination computer?
A
The ping command
B
The get command
C
The ipconfig command
D
The tracert command
20) What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
A
Dual licensing
B
Copyright
C
Project fork
D
Copyleft
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?