Avoiding Computing Pitfalls Chapter 17

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By R.aguilar
R
R.aguilar
Community Contributor
Quizzes Created: 3 | Total Attempts: 519
Questions: 23 | Attempts: 124

SettingsSettingsSettings
Avoiding Computing Pitfalls Chapter 17 - Quiz


Questions and Answers
  • 1. 

    Avoiding Computeing Pitfalls Handout

  • 2. 

    What term means a file left on hard drive by a Web site that the user visits?

    • A.

      Cookie

    • B.

      Gui

    • C.

      Infringement

    • D.

      Scan

    Correct Answer
    A. Cookie
    Explanation
    A cookie is a small file that is stored on a user's hard drive by a website they visit. It contains information about the user's browsing activity on that site, such as preferences and login information. Cookies are used to enhance the user experience and provide personalized content. They can also be used for tracking and advertising purposes.

    Rate this question:

  • 3. 

    What term means a unique identfication number that is created by a piece of computer hardware or program?

    • A.

      Backup

    • B.

      Memory shave

    • C.

      Global unique identifier

    • D.

      Cookie

    Correct Answer
    C. Global unique identifier
    Explanation
    A global unique identifier is a term that refers to a unique identification number generated by a computer hardware or program. This identifier is used to uniquely identify a particular entity or object within a system. It helps in ensuring that each entity has a distinct identification, avoiding any confusion or duplication.

    Rate this question:

  • 4. 

    What term means when someone pretends that another person's work is his or her own?

    • A.

      Scan

    • B.

      Infringement

    • C.

      Supperzapper

    Correct Answer
    B. Infringement
    Explanation
    Infringement refers to the act of pretending that another person's work is one's own. It involves using someone else's ideas, words, or creations without giving them proper credit or permission. This can include plagiarism, copyright violation, or intellectual property theft. Infringement is a serious offense and is considered unethical in academic, professional, and creative fields.

    Rate this question:

  • 5. 

    What term means to use a computer program to try and figure out  a computer's password by trying different passwords until one works?

    • A.

      Scanning

    • B.

      Superzapper

    • C.

      Trap door

    • D.

      Gui

    Correct Answer
    A. Scanning
    Explanation
    The term "scanning" refers to the act of using a computer program to attempt to guess a computer's password by systematically trying different passwords until one is successful. This process is often used by hackers or individuals attempting unauthorized access to a system.

    Rate this question:

  • 6. 

    What computer program will allow a user to access a computer network by skipping security measures?

    • A.

      Full backup

    • B.

      Incremental backup

    • C.

      Memory shave

    • D.

      Supperzapper

    Correct Answer
    D. Supperzapper
    Explanation
    The term "supperzapper" does not refer to any legitimate computer program. Instead, it suggests a program that allows a user to bypass security measures, which is a violation of ethical and legal standards. Such programs are often used for malicious purposes, such as hacking or unauthorized access to computer networks. Therefore, the correct answer is "supperzapper" as it represents a program that enables users to access a computer network by circumventing security measures.

    Rate this question:

  • 7. 

    What is a program set to cause damage at a particular time called?

    • A.

      Trap door

    • B.

      Superzapper

    • C.

      Time bomb

    • D.

      Scanner

    Correct Answer
    C. Time bomb
    Explanation
    A program set to cause damage at a particular time is commonly referred to as a "time bomb." This term is often used to describe malicious software that is programmed to execute a destructive action, such as deleting files or corrupting data, at a specific date or time. The name "time bomb" is fitting because the program is essentially ticking away until it reaches its predetermined trigger point, at which point it unleashes its damaging payload.

    Rate this question:

  • 8. 

    Which term means a secret way for a person to access a computer?

    • A.

      Cookie

    • B.

      Trap door

    • C.

      Memory shave

    • D.

      Backup

    Correct Answer
    B. Trap door
    Explanation
    A trap door is a term that refers to a secret way for a person to access a computer. It is a hidden entry point that allows unauthorized access to a system or software. This term is commonly used in the context of computer security, where it represents a vulnerability that can be exploited by hackers or malicious individuals to gain unauthorized access to a computer system.

    Rate this question:

  • 9. 

    What term means to steal some of a computer's memory chips?

    • A.

      Memory shave

    • B.

      GUIDs

    • C.

      Network

    • D.

      Backup

    Correct Answer
    A. Memory shave
    Explanation
    The term "memory shave" refers to the act of stealing some of a computer's memory chips. This can be done by physically removing the chips from the computer or by using software to manipulate the memory allocation. This unauthorized action can lead to a decrease in the computer's performance and can potentially compromise the data stored in the affected memory chips.

    Rate this question:

  • 10. 

    What term means to duplicate or copy all the files on a hard drive?

    • A.

      Memory shave

    • B.

      Cookie

    • C.

      Trap door

    • D.

      Full backup

    Correct Answer
    D. Full backup
    Explanation
    A full backup refers to the process of duplicating or copying all the files on a hard drive. This includes all the data, applications, and settings stored on the drive. Performing a full backup ensures that all the information on the hard drive is replicated and can be restored in case of data loss or system failure. It provides a comprehensive and complete copy of the entire hard drive, offering a reliable and efficient method for data protection and recovery.

    Rate this question:

  • 11. 

    What term means to copy only data files that have changed recently?

    • A.

      Incremental backup

    • B.

      Superzapper

    • C.

      Scanning

    • D.

      Infringement

    Correct Answer
    A. Incremental backup
    Explanation
    An incremental backup is a type of backup that copies only the data files that have been modified or created since the last backup. This method helps to save time and storage space by only backing up the changes made to the files, rather than duplicating the entire data set. By regularly performing incremental backups, users can ensure that their data is protected and easily recoverable in case of any data loss or system failure.

    Rate this question:

  • 12. 

    What is stolen in copyright infringement?

    • A.

      Backup files

    • B.

      GUIDs

    • C.

      Someone's identity

    • D.

      Someone's work

    Correct Answer
    D. Someone's work
    Explanation
    Copyright infringement refers to the unauthorized use, reproduction, or distribution of someone's work without their permission. This can include various forms of creative expression such as music, movies, books, artwork, and software. When someone's work is stolen through copyright infringement, it means that their intellectual property rights are violated, and they may suffer financial losses or damage to their reputation. It is important to respect and protect the rights of creators by obtaining proper permissions or licenses before using or sharing their work.

    Rate this question:

  • 13. 

    What approach can be used to block scanning on a computer network?

    • A.

      Limit the number of logon attempts permitted

    • B.

      Stop all time bombs

    • C.

      Do not let outsiders see the computer's data

    • D.

      Change piracy rules

    Correct Answer
    A. Limit the number of logon attempts permitted
    Explanation
    Limiting the number of logon attempts permitted can be an effective approach to block scanning on a computer network. By setting a limit on the number of login attempts, it prevents malicious actors from using automated tools to continuously guess passwords and gain unauthorized access to the network. This measure helps to enhance the security of the network by reducing the risk of brute force attacks and unauthorized access attempts.

    Rate this question:

  • 14. 

    Which of the following cybercrimes is a consequence of a computer system that has been hacked into?

    • A.

      Scanning

    • B.

      AUPs

    • C.

      Vandalism

    • D.

      Backup

    Correct Answer
    C. Vandalism
    Explanation
    Vandalism is a cybercrime that occurs as a result of hacking into a computer system. When a computer system is hacked, unauthorized individuals gain access and can intentionally damage or destroy data, software, or hardware. This act of malicious destruction or defacement is considered vandalism in the cyber world.

    Rate this question:

  • 15. 

    Why is copyright infringement a crime?

    • A.

      It is illegal to make backup copies of your own work

    • B.

      It takes a long time to complete

    • C.

      It uses one's own ideas

    • D.

      It is theft of another person's work

    Correct Answer
    D. It is theft of another person's work
    Explanation
    Copyright infringement is considered a crime because it involves the unauthorized use, reproduction, or distribution of someone else's original work without their permission. This act is equivalent to stealing because it deprives the original creator of their rights and the potential economic benefits that come with it. By using someone else's work without proper authorization, individuals are essentially taking credit for someone else's efforts and violating their intellectual property rights. Therefore, copyright infringement is seen as a crime to protect the rights and creativity of content creators.

    Rate this question:

  • 16. 

    Which group aims to protect the U.S.A. from terrorist attacks on computer networks?

    • A.

      Department of Justice

    • B.

      CIC Unit

    • C.

      Computer Hacking Project

    • D.

      National Infrastructure Protection Center (NIPC)

    Correct Answer
    D. National Infrastructure Protection Center (NIPC)
    Explanation
    The National Infrastructure Protection Center (NIPC) aims to protect the U.S.A. from terrorist attacks on computer networks.

    Rate this question:

  • 17. 

    Which of the following is a way to protect your password?

    • A.

      Keep it short

    • B.

      Keep it simple

    • C.

      Use numbers and letters

    • D.

      Give it to a friend

    Correct Answer
    C. Use numbers and letters
    Explanation
    Using numbers and letters in a password is a way to protect it because it increases the complexity and makes it harder for hackers to guess or crack. Including a combination of both uppercase and lowercase letters, as well as numbers, adds an extra layer of security by making the password more unpredictable. This reduces the risk of unauthorized access to personal accounts or sensitive information.

    Rate this question:

  • 18. 

    The Internet has made it more difficult to invade a person's privacy.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the Internet has actually made it easier to invade a person's privacy. With the vast amount of personal information available online, such as social media profiles, online shopping habits, and search history, it has become easier for individuals, companies, and even governments to collect and exploit this data for various purposes. Additionally, cybercrime and hacking have become more prevalent, leading to unauthorized access to personal information and further compromising privacy.

    Rate this question:

  • 19. 

    Check two items that have endangered our privacy while surfing the net.

    • A.

      Cookies

    • B.

      GUIDs

    • C.

      Passwords

    • D.

      Antivirus programs

    Correct Answer(s)
    A. Cookies
    B. GUIDs
    Explanation
    Cookies and GUIDs are two items that have endangered our privacy while surfing the net. Cookies are small files that websites store on our computers to track our browsing behavior and preferences. They can be used by advertisers to target us with personalized ads and can also be accessed by unauthorized parties, compromising our privacy. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users. They can be used to track our online activities across different websites, allowing companies to create detailed profiles about us without our knowledge or consent. Both cookies and GUIDs pose significant threats to our online privacy.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 25, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2012
    Quiz Created by
    R.aguilar

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.