Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 8c - 9a
Test Description: ,,,
Instructions: Answer all questions to get your test result.
1) Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
A
a trademark violation.
B
a non-disclosure agreement.
C
an end-user license agreeement.
D
a licensing agreement.
2) Because spam is sent to you uninvited, it can be considered:
A
copyright infringement.
B
an invasion of privacy.
C
a trademark violation.
D
a licensing agreement.
3) What is an update?
A
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
B
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
C
A file or collection of software tools that resolves system liabilities and improves software performance
D
A graphic or moving image that appears on your screen when your computer is idle
4) What is a hash?
A
A file of programming code that is inserted into an existing executable program to fix a bug
B
A file or collection of tools that resolves system liabilities and improves software performance
C
A small text file that stores user preferences and information, for websites to use
D
A number generated by an algorithm from a string of text
5) Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
A
the user need only receive the virus for it to cause damage.
B
the virus will alter code in the Windows registry files.
C
all other computing processes will stop until the user deletes the message.
D
the virus will replicate itself until the entire disk is full as soon as the user opens the message.
6) Which of the following is the most effective way to spread viruses?
A
Sending email attachments
B
Connecting your computer to a LAN
C
Downloading program updates and patches
D
Connecting your computer to the Internet through a firewall
7) Question 37 :The Right to be Forgotten debate revolves around what?
A
Protecting your image and personal information in the world of social networking
B
Protecting your data from computer viruses
C
Protecting your data that resides in the cloud
D
Hiding your image and personal information from potential spammers
8) Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
A
Firewalls do not encrypt or authenticate data so users on the LAN do not need to track public and private encryption keys.
B
Users on the LAN may not be able to access an external email provider, thus removing the temptation to abuse email privileges
C
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
D
Users on the LAN may not be able to upload files to external servers, thus conserving bandwidth.
9) What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
A
Hash
B
Activation code
C
Patch
D
key
10) What is ciphertext?
A
Authenticated data
B
Unencrypted data
C
Encrypted data
D
Updated data
11) Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
A
Digital certificate
B
Decryption
C
User name and password
D
Encryption
12) What is a worm?
A
A malicious program that assumes control of system operations, and damages or destroys data
B
An application that installs hidden services on systems
C
A self-replicating program or algorithm that consumes system resources
D
A program that appears to be harmless but actually produces harmful results
13) Why should you use automatic cookie handling in most browsers?
A
To accept first-party cookies but reject third-party cookies
B
To broadly control when and from whom cookies are accepted
C
To display warnings pending the receipt of first-party and third-party cookies
D
To accept third-party cookies but reject first-party cookies
14) You can use screen savers to:
A
prevent outsiders from accessing a private network.
B
insert programming code into an existing executable program to fix a known problem.
C
resolve system liabilities and improve software performance.
D
hide your work while you are away from your desk, providing a measure of security.
15) The FTP navigational structure:
A
provides access only to binary files.
B
can be accessed only through command-line FTP clients.
C
is similar to the hierarchical directory structure of a hard drive.
D
requires you to click links to access the topics in which you are interested.
16) Which of the following do end users most commonly download from FTP sites?
A
Archives of information
B
Application source files
C
Binary Files
D
Files that have unknown MIME types
17) Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
A
The get command
B
The tracert command
C
The ipconfig command
D
The ping command
18) What is a peer-to-peer network?
A
A network that allows you to control the server of a remote network
B
A network in which each computer has both server and client capabilities
C
A network that allows you to control client computers at a remote location
D
A network that offers mass email and texting services
19) Which of the following should you use when you want to test connectivity between your computer and a destination computer?
A
The get command
B
The ipconfig command
C
The tracert command
D
The ping command
20) What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
A
Dual licensing
B
Copyleft
C
Copyright
D
Project fork
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?