Quiz 8c - 9a Question Preview (ID: 48605)


,,,. TEACHERS: click here for quick copy question ID numbers.

Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
a) a licensing agreement.
b) a non-disclosure agreement.
c) an end-user license agreeement.
d) a trademark violation.

Because spam is sent to you uninvited, it can be considered:
a) a licensing agreement.
b) an invasion of privacy.
c) copyright infringement.
d) a trademark violation.

What is an update?
a) A file or collection of software tools that resolves system liabilities and improves software performance
b) A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
c) A graphic or moving image that appears on your screen when your computer is idle
d) A software application that is secretly placed on a user's system to gather information and relay it to outside parties

What is a hash?
a) A file or collection of tools that resolves system liabilities and improves software performance
b) A file of programming code that is inserted into an existing executable program to fix a bug
c) A number generated by an algorithm from a string of text
d) A small text file that stores user preferences and information, for websites to use

Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
a) the virus will replicate itself until the entire disk is full as soon as the user opens the message.
b) all other computing processes will stop until the user deletes the message.
c) the user need only receive the virus for it to cause damage.
d) the virus will alter code in the Windows registry files.

Which of the following is the most effective way to spread viruses?
a) Sending email attachments
b) Connecting your computer to a LAN
c) Connecting your computer to the Internet through a firewall
d) Downloading program updates and patches

Question 37 :The Right to be Forgotten debate revolves around what?
a) Protecting your image and personal information in the world of social networking
b) Hiding your image and personal information from potential spammers
c) Protecting your data from computer viruses
d) Protecting your data that resides in the cloud

Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
a) Users on the LAN may not be able to upload files to external servers, thus conserving bandwidth.
b) Users on the LAN may not be able to access an external email provider, thus removing the temptation to abuse email privileges
c) Firewalls do not encrypt or authenticate data so users on the LAN do not need to track public and private encryption keys.
d) Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.

What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
a) Activation code
b) key
c) Patch
d) Hash

What is ciphertext?
a) Unencrypted data
b) Updated data
c) Encrypted data
d) Authenticated data

Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
a) Digital certificate
b) Decryption
c) User name and password
d) Encryption

What is a worm?
a) An application that installs hidden services on systems
b) A malicious program that assumes control of system operations, and damages or destroys data
c) A program that appears to be harmless but actually produces harmful results
d) A self-replicating program or algorithm that consumes system resources

Why should you use automatic cookie handling in most browsers?
a) To accept third-party cookies but reject first-party cookies
b) To accept first-party cookies but reject third-party cookies
c) To display warnings pending the receipt of first-party and third-party cookies
d) To broadly control when and from whom cookies are accepted

You can use screen savers to:
a) prevent outsiders from accessing a private network.
b) resolve system liabilities and improve software performance.
c) insert programming code into an existing executable program to fix a known problem.
d) hide your work while you are away from your desk, providing a measure of security.

The FTP navigational structure:
a) can be accessed only through command-line FTP clients.
b) is similar to the hierarchical directory structure of a hard drive.
c) provides access only to binary files.
d) requires you to click links to access the topics in which you are interested.

Which of the following do end users most commonly download from FTP sites?
a) Files that have unknown MIME types
b) Binary Files
c) Archives of information
d) Application source files

Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
a) The ping command
b) The ipconfig command
c) The get command
d) The tracert command

What is a peer-to-peer network?
a) A network that allows you to control client computers at a remote location
b) A network that allows you to control the server of a remote network
c) A network that offers mass email and texting services
d) A network in which each computer has both server and client capabilities

Which of the following should you use when you want to test connectivity between your computer and a destination computer?
a) The ipconfig command
b) The get command
c) The ping command
d) The tracert command

What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
a) Copyright
b) Project fork
c) Dual licensing
d) Copyleft

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 48605 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register