Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Language
Study Set
Practical Computer Literacy
Quiz 22: Computer Benefits and Risks
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 21
Multiple Choice
____ software is designed to analyze the flow of traffic entering your computer from a network.
Question 22
Multiple Choice
A ____ uses a home-based computer and telecommunications equipment to perform work-related tasks.
Question 23
Multiple Choice
Small ____ tags sewn into clothing communicate with inventory tracking systems.
Question 24
Multiple Choice
The original wireless encryption was called ____ and was designed to provide a level of confidentiality similar to that of a wired network.
Question 25
Multiple Choice
Most malicious code is stored in executable files, usually with ____ file name extensions.
Question 26
Multiple Choice
____ is the study of work and work environments, with the goal being to make work environments safer and healthier.
Question 27
Multiple Choice
-Referring to the figure above, if these were your settings, ____ would be scanned for viruses.
Question 28
Multiple Choice
A ____ is a snapshot of your computer settings and are essentially backups of the Windows Registry.
Question 29
Multiple Choice
A ____ worm makes use of information on an infected computer to mail itself to everyone listed in the e-mail address book.
Question 30
Multiple Choice
-Referring to the figure above, you have 229 days of the Norton subscription remaining, and LiveUpdate was run eight minutes ago.To stay current, always make sure your ____ is/are up-to-date.
Question 31
Multiple Choice
A computer ____ is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
Question 32
Multiple Choice
-In the figure above, the Norton Smart firewall is marked on.If Windows Firewall is also turned on, you would ____.
Question 33
Multiple Choice
Some Trojan horses contain a virus or a worm, which can replicate and spread.Virus experts call this a ____ threat because it combines more than one type of malicious code.
Question 34
Multiple Choice
A ____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.