Digital Media - 1st 9-Weeks Review Part 3 Question Preview (ID: 10744)
Digital Media - 1st 9-Weeks Review Part 3.
TEACHERS: click here for quick copy question ID numbers.
Users that access a computer illegally are called
a) Criminals
b) Viruses
c) Hackers
d) Thieves
Companies and organizations employ security systems to protect the integrity of the system. These usually involve
a) Passwords
b) Data Encryption
c) Firewall
d) All Choices
A program or file that infects a system.
a) Worm
b) Virus
c) Trojan Horse
d) Timebomb
To protect against computer viruses, use
a) Firewall
b) Data Encryption
c) Virus Protection Program
d) Hand sanitizer
A program that enters usually through a network and then replicates itself.
a) Worm
b) Trojan Horse
c) Virus
d) Timebomb
Stays on the system until a specific date or event, then it is executed.
a) Worm
b) Trojan Horse
c) Timebomb
d) Virus
Uing ideas and words as your own when they are not your own.
a) Coyright infringement
b) Trademark violation
c) Piracy
d) Plagiarism
Internet etiquette.
a) Manners
b) Interetiquette
c) Netiquette
d) Politeness
Internet Explorer uses what type of icon to indicate a secure site:
a) Key
b) Blue E
c) Padlock
d) Compass
To protect against virus attacks, you should:
a) Scan all attachments via email
b) Do not execute program attachments on an email
c) Scan disks you receive from others
d) All choices
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 10744 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 10744 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register