Avoiding Computing Pitfalls Chapter 17

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By R.aguilar
R
R.aguilar
Community Contributor
Quizzes Created: 3 | Total Attempts: 528
| Attempts: 124 | Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. Which of the following is a way to protect your password?

Explanation

Using numbers and letters in a password is a way to protect it because it increases the complexity and makes it harder for hackers to guess or crack. Including a combination of both uppercase and lowercase letters, as well as numbers, adds an extra layer of security by making the password more unpredictable. This reduces the risk of unauthorized access to personal accounts or sensitive information.

Submit
Please wait...
About This Quiz
Avoiding Computing Pitfalls Chapter 17 - Quiz

This quiz, titled 'Avoiding Computing Pitfalls Chapter 17', assesses knowledge on various cybersecurity issues including cookies, GUIDs, infringement, password cracking, and malicious software. It is designed to enhance awareness and understanding of common security vulnerabilities in computing.

Personalize your quiz and earn a certificate with your name on it!
2. What term means when someone pretends that another person's work is his or her own?

Explanation

Infringement refers to the act of pretending that another person's work is one's own. It involves using someone else's ideas, words, or creations without giving them proper credit or permission. This can include plagiarism, copyright violation, or intellectual property theft. Infringement is a serious offense and is considered unethical in academic, professional, and creative fields.

Submit
3. What is a program set to cause damage at a particular time called?

Explanation

A program set to cause damage at a particular time is commonly referred to as a "time bomb." This term is often used to describe malicious software that is programmed to execute a destructive action, such as deleting files or corrupting data, at a specific date or time. The name "time bomb" is fitting because the program is essentially ticking away until it reaches its predetermined trigger point, at which point it unleashes its damaging payload.

Submit
4. What term means to duplicate or copy all the files on a hard drive?

Explanation

A full backup refers to the process of duplicating or copying all the files on a hard drive. This includes all the data, applications, and settings stored on the drive. Performing a full backup ensures that all the information on the hard drive is replicated and can be restored in case of data loss or system failure. It provides a comprehensive and complete copy of the entire hard drive, offering a reliable and efficient method for data protection and recovery.

Submit
5. Which group aims to protect the U.S.A. from terrorist attacks on computer networks?

Explanation

The National Infrastructure Protection Center (NIPC) aims to protect the U.S.A. from terrorist attacks on computer networks.

Submit
6. What computer program will allow a user to access a computer network by skipping security measures?

Explanation

The term "supperzapper" does not refer to any legitimate computer program. Instead, it suggests a program that allows a user to bypass security measures, which is a violation of ethical and legal standards. Such programs are often used for malicious purposes, such as hacking or unauthorized access to computer networks. Therefore, the correct answer is "supperzapper" as it represents a program that enables users to access a computer network by circumventing security measures.

Submit
7. What term means to copy only data files that have changed recently?

Explanation

An incremental backup is a type of backup that copies only the data files that have been modified or created since the last backup. This method helps to save time and storage space by only backing up the changes made to the files, rather than duplicating the entire data set. By regularly performing incremental backups, users can ensure that their data is protected and easily recoverable in case of any data loss or system failure.

Submit
8. What term means to steal some of a computer's memory chips?

Explanation

The term "memory shave" refers to the act of stealing some of a computer's memory chips. This can be done by physically removing the chips from the computer or by using software to manipulate the memory allocation. This unauthorized action can lead to a decrease in the computer's performance and can potentially compromise the data stored in the affected memory chips.

Submit
9. Which of the following cybercrimes is a consequence of a computer system that has been hacked into?

Explanation

Vandalism is a cybercrime that occurs as a result of hacking into a computer system. When a computer system is hacked, unauthorized individuals gain access and can intentionally damage or destroy data, software, or hardware. This act of malicious destruction or defacement is considered vandalism in the cyber world.

Submit
10. Why is copyright infringement a crime?

Explanation

Copyright infringement is considered a crime because it involves the unauthorized use, reproduction, or distribution of someone else's original work without their permission. This act is equivalent to stealing because it deprives the original creator of their rights and the potential economic benefits that come with it. By using someone else's work without proper authorization, individuals are essentially taking credit for someone else's efforts and violating their intellectual property rights. Therefore, copyright infringement is seen as a crime to protect the rights and creativity of content creators.

Submit
11. Which term means a secret way for a person to access a computer?

Explanation

A trap door is a term that refers to a secret way for a person to access a computer. It is a hidden entry point that allows unauthorized access to a system or software. This term is commonly used in the context of computer security, where it represents a vulnerability that can be exploited by hackers or malicious individuals to gain unauthorized access to a computer system.

Submit
12. What term means a file left on hard drive by a Web site that the user visits?

Explanation

A cookie is a small file that is stored on a user's hard drive by a website they visit. It contains information about the user's browsing activity on that site, such as preferences and login information. Cookies are used to enhance the user experience and provide personalized content. They can also be used for tracking and advertising purposes.

Submit
13. The Internet has made it more difficult to invade a person's privacy.

Explanation

The statement is false because the Internet has actually made it easier to invade a person's privacy. With the vast amount of personal information available online, such as social media profiles, online shopping habits, and search history, it has become easier for individuals, companies, and even governments to collect and exploit this data for various purposes. Additionally, cybercrime and hacking have become more prevalent, leading to unauthorized access to personal information and further compromising privacy.

Submit
14. What is stolen in copyright infringement?

Explanation

Copyright infringement refers to the unauthorized use, reproduction, or distribution of someone's work without their permission. This can include various forms of creative expression such as music, movies, books, artwork, and software. When someone's work is stolen through copyright infringement, it means that their intellectual property rights are violated, and they may suffer financial losses or damage to their reputation. It is important to respect and protect the rights of creators by obtaining proper permissions or licenses before using or sharing their work.

Submit
15. What term means a unique identfication number that is created by a piece of computer hardware or program?

Explanation

A global unique identifier is a term that refers to a unique identification number generated by a computer hardware or program. This identifier is used to uniquely identify a particular entity or object within a system. It helps in ensuring that each entity has a distinct identification, avoiding any confusion or duplication.

Submit
16. What approach can be used to block scanning on a computer network?

Explanation

Limiting the number of logon attempts permitted can be an effective approach to block scanning on a computer network. By setting a limit on the number of login attempts, it prevents malicious actors from using automated tools to continuously guess passwords and gain unauthorized access to the network. This measure helps to enhance the security of the network by reducing the risk of brute force attacks and unauthorized access attempts.

Submit
17. What term means to use a computer program to try and figure out  a computer's password by trying different passwords until one works?

Explanation

The term "scanning" refers to the act of using a computer program to attempt to guess a computer's password by systematically trying different passwords until one is successful. This process is often used by hackers or individuals attempting unauthorized access to a system.

Submit
18. Check two items that have endangered our privacy while surfing the net.

Explanation

Cookies and GUIDs are two items that have endangered our privacy while surfing the net. Cookies are small files that websites store on our computers to track our browsing behavior and preferences. They can be used by advertisers to target us with personalized ads and can also be accessed by unauthorized parties, compromising our privacy. GUIDs (Globally Unique Identifiers) are unique identifiers assigned to devices or users. They can be used to track our online activities across different websites, allowing companies to create detailed profiles about us without our knowledge or consent. Both cookies and GUIDs pose significant threats to our online privacy.

Submit
19. Match the term with its meaning.
Submit
20. Match the term with its meaning.
Submit
21. Match the term with its meaning.
Submit
22. Match the term with its meaning.
Submit
23. Match the terms with their meanings.
Submit
View My Results

Quiz Review Timeline (Updated): Apr 25, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 25, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2012
    Quiz Created by
    R.aguilar
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is a way to protect your password?
What term means when someone pretends that another person's...
What is a program set to cause damage at a particular time called?
What term means to duplicate or copy all the files on a hard drive?
Which group aims to protect the U.S.A. from terrorist attacks on...
What computer program will allow a user to access a computer...
What term means to copy only data files that have changed recently?
What term means to steal some of a computer's memory chips?
Which of the following cybercrimes is a consequence of a computer...
Why is copyright infringement a crime?
Which term means a secret way for a person to access a computer?
What term means a file left on hard drive by a Web site that the user...
The Internet has made it more difficult to invade a person's...
What is stolen in copyright infringement?
What term means a unique identfication number that is created by a...
What approach can be used to block scanning on a computer network?
What term means to use a computer program to try and...
Check two items that have endangered our privacy while surfing the...
Match the term with its meaning.
Match the term with its meaning.
Match the term with its meaning.
Match the term with its meaning.
Match the terms with their meanings.
Alert!

Advertisement