Digital Media - 1st 9-Weeks Review Part 3 Question Preview (ID: 10744)


Digital Media - 1st 9-Weeks Review Part 3. TEACHERS: click here for quick copy question ID numbers.

Users that access a computer illegally are called
a) Criminals
b) Viruses
c) Hackers
d) Thieves

Companies and organizations employ security systems to protect the integrity of the system. These usually involve
a) Passwords
b) Data Encryption
c) Firewall
d) All Choices

A program or file that infects a system.
a) Worm
b) Virus
c) Trojan Horse
d) Timebomb

To protect against computer viruses, use
a) Firewall
b) Data Encryption
c) Virus Protection Program
d) Hand sanitizer

A program that enters usually through a network and then replicates itself.
a) Worm
b) Trojan Horse
c) Virus
d) Timebomb

Stays on the system until a specific date or event, then it is executed.
a) Worm
b) Trojan Horse
c) Timebomb
d) Virus

Uing ideas and words as your own when they are not your own.
a) Coyright infringement
b) Trademark violation
c) Piracy
d) Plagiarism

Internet etiquette.
a) Manners
b) Interetiquette
c) Netiquette
d) Politeness

Internet Explorer uses what type of icon to indicate a secure site:
a) Key
b) Blue E
c) Padlock
d) Compass

To protect against virus attacks, you should:
a) Scan all attachments via email
b) Do not execute program attachments on an email
c) Scan disks you receive from others
d) All choices

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 10744 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register