Presentation is loading. Please wait.

Presentation is loading. Please wait.

Discovering Computers 2010

Similar presentations


Presentation on theme: "Discovering Computers 2010"— Presentation transcript:

1 Discovering Computers 2010
MC-Quiz: Chapter 11 – Computer Security and Safety, Ethics, and Privacy

2 Question 1 Question 8 Question 15 Question 2 Question 9 Question 16
Multiple Choice Main Menu Computer Security and Safety, Ethics, and Privacy Question 1 Question 8 Question 15 Question 2 Question 9 Question 16 Question 3 Question 10 Question 17 Question 4 Question 11 Question 18 Question 5 Question 12 Question 19 Question 6 Question 13 Question 20 Question 7 Question 14 End Show Previous Slide MC Quiz 11

3 A __________ is someone who uses e-mail as a vehicle for extortion.
Question 1 ================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Textbook: Page 557 Main Menu Previous Slide Quiz 11

4 Question 1 ================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Incorrect Previous Slide Textbook: Page 557 Main Menu Quiz 11

5 Click Here For Next Question
================================================================= A __________ is someone who uses as a vehicle for extortion. ================================================================= Click On: A, B, C, or D A cyber extortionist B cyber terrorist C blogger D hacker Correct Click Here For Next Question Previous Slide Textbook: Page 557 Main Menu Quiz 11

6 Question 2 ================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Textbook: Page 559 Main Menu Previous Slide Quiz 11

7 Question 2 ================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Incorrect Previous Slide Textbook: Page 559 Main Menu Quiz 11

8 Click Here For Next Question
================================================================= Currently there are more than __________ known computer viruses, worms, Trojan horses, rootkits, and other malware. ================================================================= Click On: A, B, C, or D A 1,500 B 5,800 C 10,500 D 180,000 Correct Click Here For Next Question Previous Slide Textbook: Page 559 Main Menu Quiz 11

9 Question 3 ================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Textbook: Page 573 Main Menu Previous Slide Quiz 11

10 Question 3 ================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Incorrect Textbook: Page 573 Main Menu Previous Slide Quiz 11

11 Click Here For Next Question
================================================================= __________ is a process of converting readable data into unreadable characters to prevent unauthorized access. ================================================================= Click On: A, B, C, or D A Compression B Formatting C Encryption D Packing Correct Click Here For Next Question Previous Slide Textbook: Page 573 Main Menu Quiz 11

12 Repetitive Divergent Convergent Encryption
Question 4 ================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Textbook: Page 579 Main Menu Previous Slide Quiz 11

13 Incorrect Repetitive Divergent Convergent Encryption
Question 4 ================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Incorrect Main Menu Previous Slide Textbook: Page 579 Quiz 11

14 Click Here For Next Question
================================================================= __________ strain injury is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints that can be associated with computer use and other work tasks. ================================================================= Click On: A, B, C, or D A Repetitive B Divergent C Convergent D Encryption Correct Click Here For Next Question Previous Slide Textbook: Page 579 Main Menu Quiz 11

15 Question 5 ================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Textbook: Page 582 Main Menu Previous Slide Quiz 11

16 Question 5 ================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Incorrect Textbook: Page 582 Main Menu Previous Slide Quiz 11

17 Click Here For Next Question
================================================================= __________ property rights are the rights to which creators are entitled for their work (ideas, inventions, art, writings, processes, company and product names, and logos. ================================================================= Click On: A, B, C, or D A Community B Intellectual C National D Independent Correct Click Here For Next Question Previous Slide Textbook: Page 582 Main Menu Quiz 11

18 Electrical Biological Social Ethical
Question 6 ================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Textbook: Page 590 Main Menu Previous Slide Quiz 11

19 Incorrect Electrical Biological Social Ethical
Question 6 ================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Incorrect Previous Slide Textbook: Page 590 Main Menu Quiz 11

20 Click Here For Next Question
================================================================= __________ engineering, as it relates to the use of computers, is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature and naivety of some victims. ================================================================= Click On: A, B, C, or D A Electrical B Biological C Social D Ethical Correct Click Here For Next Question Previous Slide Textbook: Page 590 Main Menu Quiz 11

21 The term __________ refers to online or Internet-based illegal acts.
Question 7 ================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Textbook: Page 556 Main Menu Previous Slide Quiz 11

22 Question 7 ================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Incorrect Previous Slide Textbook: Page 556 Main Menu Quiz 11

23 Click Here For Next Question
================================================================= The term __________ refers to online or Internet-based illegal acts. ================================================================= Click On: A, B, C, or D A hypertext B cybercrime C hypercube D virtual crime Correct Click Here For Next Question Previous Slide Textbook: Page 556 Main Menu Quiz 11

24 photocell scanner biometric device digitizer
Question 8 ================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Textbook: Page 568 Main Menu Previous Slide Quiz 11

25 Incorrect photocell scanner biometric device digitizer
Question 8 ================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Incorrect Main Menu Previous Slide Textbook: Page 568 Quiz 11

26 Click Here For Next Question
================================================================= A __________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic. ================================================================= Click On: A, B, C, or D A photocell B scanner C biometric device D digitizer Correct Click Here For Next Question Previous Slide Textbook: Page 568 Main Menu Quiz 11

27 Question 9 ================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Textbook: Page 564 Main Menu Previous Slide Quiz 11

28 Question 9 ================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Incorrect Textbook: Page 564 Main Menu Previous Slide Quiz 11

29 Click Here For Next Question
================================================================= A __________ is a vulnerable computer that is set up to entice an intruder to break into it. They look real to an intruder, but are separated from the main network. ================================================================= Click On: A, B, C, or D A web host B buffer C honeypot D client Correct Click Here For Next Question Previous Slide Textbook: Page 564 Main Menu Quiz 11

30 Network Administration
Question 10 ================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Textbook: Page 569 Main Menu Previous Slide Quiz 11

31 Question 10 ================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Incorrect Textbook: Page 569 Main Menu Previous Slide Quiz 11

32 Click Here For Next Question
================================================================= __________ is the discovery, collection and analysis of evidence found on computers and networks. ================================================================= Click On: A, B, C, or D A Computer hacking B Digital Forensics C Network Administration D Encryption Correct Click Here For Next Question Previous Slide Textbook: Page 569 Main Menu Quiz 11

33 Question 11 ================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Textbook: Page 573 Main Menu Previous Slide Quiz 11

34 Question 11 ================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Incorrect Previous Slide Textbook: Page 573 Main Menu Quiz 11

35 Click Here For Next Question
================================================================= __________ key encryption, also known as asymmetric key encryption uses two encryption keys. ================================================================= Click On: A, B, C, or D A Random B Public C Hyper D Indexed Correct Click Here For Next Question Previous Slide Textbook: Page 573 Main Menu Quiz 11

36 Question 12 ================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Textbook: Page 574 Main Menu Previous Slide Quiz 11

37 Question 12 ================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Incorrect Main Menu Previous Slide Textbook: Page 574 Quiz 11

38 Click Here For Next Question
================================================================= A __________ is a notice that guarantees a user or a Web site is a legitimate E-commerce site. ================================================================= Click On: A, B, C, or D A stamp copyright B C disclaimer D digital signature Correct Click Here For Next Question Previous Slide Textbook: Page 574 Main Menu Quiz 11

39 Question 13 ================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Textbook: Page 580 Main Menu Previous Slide Quiz 11

40 Question 13 ================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Incorrect Main Menu Previous Slide Textbook: Page 580 Quiz 11

41 Click Here For Next Question
================================================================= __________ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. ================================================================= Click On: A, B, C, or D A Encryption B Programming C Forensics D Ergonomics Correct Click Here For Next Question Previous Slide Textbook: Page 580 Main Menu Quiz 11

42 Question 14 ================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Textbook: Page 587 Main Menu Previous Slide Quiz 11

43 Question 14 ================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Incorrect Previous Slide Textbook: Page 587 Main Menu Quiz 11

44 Click Here For Next Question
================================================================= __________ is/are unsolicited or newsgroup posting sent to recipients or newsgroups. It is the Internet form of junk mail. ================================================================= Click On: A, B, C, or D A E-cards B Spam C Texting D Postings Correct Click Here For Next Question Previous Slide Textbook: Page 587 Main Menu Quiz 11

45 Question 15 ================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Textbook: Page 587 Main Menu Previous Slide Quiz 11

46 Question 15 ================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Incorrect Previous Slide Textbook: Page 587 Main Menu Quiz 11

47 Click Here For Next Question
================================================================= __________ is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information. ================================================================= Click On: A, B, C, or D A Cloning B Streaming C Compression D Phishing Correct Click Here For Next Question Previous Slide Textbook: Page 587 Main Menu Quiz 11

48 Question 16 ================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Textbook: Page 584 Main Menu Previous Slide Quiz 11

49 Question 16 ================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Incorrect Main Menu Previous Slide Textbook: Page 584 Quiz 11

50 Click Here For Next Question
================================================================= Information __________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them. ================================================================= Click On: A, B, C, or D A privacy B retrieval C dispersion D transmission Correct Click Here For Next Question Previous Slide Textbook: Page 584 Main Menu Quiz 11

51 Question 17 ================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Textbook: Page 563 Main Menu Previous Slide Quiz 11

52 Question 17 ================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Incorrect Previous Slide Textbook: Page 563 Main Menu Quiz 11

53 Click Here For Next Question
================================================================= __________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. ================================================================= Click On: A, B, C, or D A Cloning B Coding C Spoofing D Encoding Correct Click Here For Next Question Previous Slide Textbook: Page 563 Main Menu Quiz 11

54 Question 18 ================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Textbook: Page 566 Main Menu Previous Slide Quiz 11

55 Question 18 ================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Incorrect Previous Slide Textbook: Page 566 Main Menu Quiz 11

56 Click Here For Next Question
================================================================= A __________ is a private combination of characters associated with the user name that allows access to certain computer resources. ================================================================= Click On: A, B, C, or D A password B combination C code key D signature Correct Click Here For Next Question Previous Slide Textbook: Page 566 Main Menu Quiz 11

57 Question 19 ================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Textbook: Page 564 Main Menu Previous Slide Quiz 11

58 Question 19 ================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Incorrect Previous Slide Textbook: Page 564 Main Menu Quiz 11

59 Click Here For Next Question
================================================================= A __________ is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. ================================================================= Click On: A, B, C, or D A Defrag Utility B Compression Utility C Zip Utility D Personal Firewall Correct Click Here For Next Question Previous Slide Textbook: Page 564 Main Menu Quiz 11

60 computer security risk
Question 20 ================================================================= A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Textbook: Page 556 Main Menu Previous Slide Quiz 11

61 Question 20 ================================================================= A/n __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Incorrect Main Menu Previous Slide Textbook: Page 556 Quiz 11

62 Click Here For The Answer Key
Question 20 ================================================================= An __________ is any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability. ================================================================= Click On: A, B, C, or D A event horizon computer security risk B C head crash D cyber attack Correct Click Here For The Answer Key Previous Slide Textbook: Page 556 Main Menu Quiz 11

63 Answer Key Computer Security and Safety, Ethics, and Privacy
Q1 = A Q8 = C Q15 = D Q2 = D Q9 = C Q16 = A Q3 = C Q10 = B Q17 = C Q11 = B Q18 = A Q4 = A Q5 = B Q12 = D Q19 = D Q20 = B Q6 = C Q13 = D Q7 = B Q14 = B Main Menu End Show Previous Slide Quiz 11


Download ppt "Discovering Computers 2010"

Similar presentations


Ads by Google