Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 8c - 9a
Test Description: ,,,
Instructions: Answer all questions to get your test result.
1) Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
A
an end-user license agreeement.
B
a trademark violation.
C
a non-disclosure agreement.
D
a licensing agreement.
2) Because spam is sent to you uninvited, it can be considered:
A
copyright infringement.
B
a licensing agreement.
C
an invasion of privacy.
D
a trademark violation.
3) What is an update?
A
A file or collection of software tools that resolves system liabilities and improves software performance
B
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
C
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
D
A graphic or moving image that appears on your screen when your computer is idle
4) What is a hash?
A
A number generated by an algorithm from a string of text
B
A file or collection of tools that resolves system liabilities and improves software performance
C
A small text file that stores user preferences and information, for websites to use
D
A file of programming code that is inserted into an existing executable program to fix a bug
5) Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
A
all other computing processes will stop until the user deletes the message.
B
the virus will alter code in the Windows registry files.
C
the virus will replicate itself until the entire disk is full as soon as the user opens the message.
D
the user need only receive the virus for it to cause damage.
6) Which of the following is the most effective way to spread viruses?
A
Downloading program updates and patches
B
Connecting your computer to the Internet through a firewall
C
Sending email attachments
D
Connecting your computer to a LAN
7) Question 37 :The Right to be Forgotten debate revolves around what?
A
Protecting your data that resides in the cloud
B
Protecting your data from computer viruses
C
Protecting your image and personal information in the world of social networking
D
Hiding your image and personal information from potential spammers
8) Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
A
Firewalls do not encrypt or authenticate data so users on the LAN do not need to track public and private encryption keys.
B
Users on the LAN may not be able to access an external email provider, thus removing the temptation to abuse email privileges
C
Users on the LAN may not be able to upload files to external servers, thus conserving bandwidth.
D
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
9) What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
A
Patch
B
Hash
C
Activation code
D
key
10) What is ciphertext?
A
Updated data
B
Encrypted data
C
Authenticated data
D
Unencrypted data
11) Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
A
Decryption
B
Digital certificate
C
User name and password
D
Encryption
12) What is a worm?
A
An application that installs hidden services on systems
B
A malicious program that assumes control of system operations, and damages or destroys data
C
A self-replicating program or algorithm that consumes system resources
D
A program that appears to be harmless but actually produces harmful results
13) Why should you use automatic cookie handling in most browsers?
A
To accept third-party cookies but reject first-party cookies
B
To display warnings pending the receipt of first-party and third-party cookies
C
To broadly control when and from whom cookies are accepted
D
To accept first-party cookies but reject third-party cookies
14) You can use screen savers to:
A
hide your work while you are away from your desk, providing a measure of security.
B
prevent outsiders from accessing a private network.
C
resolve system liabilities and improve software performance.
D
insert programming code into an existing executable program to fix a known problem.
15) The FTP navigational structure:
A
can be accessed only through command-line FTP clients.
B
provides access only to binary files.
C
is similar to the hierarchical directory structure of a hard drive.
D
requires you to click links to access the topics in which you are interested.
16) Which of the following do end users most commonly download from FTP sites?
A
Application source files
B
Binary Files
C
Archives of information
D
Files that have unknown MIME types
17) Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
A
The tracert command
B
The get command
C
The ipconfig command
D
The ping command
18) What is a peer-to-peer network?
A
A network in which each computer has both server and client capabilities
B
A network that offers mass email and texting services
C
A network that allows you to control client computers at a remote location
D
A network that allows you to control the server of a remote network
19) Which of the following should you use when you want to test connectivity between your computer and a destination computer?
A
The ping command
B
The ipconfig command
C
The get command
D
The tracert command
20) What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
A
Copyleft
B
Copyright
C
Project fork
D
Dual licensing
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?