A) software deployment
B) software decryption
C) app installation
D) product activation
Correct Answer
verified
Multiple Choice
A) comware
B) postware
C) spyware
D) billware
Correct Answer
verified
Multiple Choice
A) cyberware
B) conware
C) criminalware
D) crimeware
Correct Answer
verified
Multiple Choice
A) Jamie installs Quark Xpress on a single computer.
B) Christine leases her copy of Dreamweaver.
C) Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.
D) Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) green computing
B) information accuracy
C) information authorship
D) codes of conduct
Correct Answer
verified
Multiple Choice
A) content filtering
B) information monitoring
C) data mining
D) social profiling
Correct Answer
verified
Multiple Choice
A) Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them.
B) Clear your history file when you are finished browsing.
C) Preprint your telephone number on your personal checks so businesses can reach you quickly if they determine there is a problem with your purchase.
D) Use shopping club and buying cards when shopping to remain anonymous.
Correct Answer
verified
Multiple Choice
A) spam
B) spit
C) phishing
D) spyware
Correct Answer
verified
Multiple Choice
A) Adobe
B) AVG
C) McAfee
D) Symantec
Correct Answer
verified
Multiple Choice
A) hacker
B) script kiddie
C) cyberextortionist
D) cyberterrorist
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) the money a criminal receives from extortion or other computer crimes
B) the amount of data loss to a company or individual who is a victim of a computer crime
C) the destructive event or prank the program is intended to deliver
D) the financial burden computer crime places on its victims
Correct Answer
verified
Multiple Choice
A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Correct Answer
verified
Multiple Choice
A) network
B) distributed
C) site
D) multipurpose
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) face recognition system
B) iris recognition system
C) hand geometry system
D) digital forensics system
Correct Answer
verified
Short Answer
Correct Answer
verified
Showing 121 - 140 of 200
Related Exams