RSA encryption
Asymmetric-key encryption
Hash encryption
Symmetric-key encryption
Rate this question:
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages.
Rate this question:
Digital signature
Encrypted key
Digital certificate
Firewall
Rate this question:
Scramble text using mathematical algorithm
Scramble text using benign viruses
Remove all formatting and punctuation from the text
Compress the text so that only abbreviated portions of words remain
Rate this question:
An encryption method in which two seperate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which a key is required to encrypt data from storage and to verify its integrity
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
Rate this question:
Spyware
Trojan
Illicit server
Malware
Rate this question:
Purchase domain names that are similar to their actual domain names
Host their Web sites on ilicit servers
Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys
Automatically apply operating system updates and patches as they become available
Rate this question:
A worm is capable of replicating itself automatically while affecting data.
A worm and a virus synonymous terms for a malicious program designed to damage computer systems.
A worm does not replicate itself, it assumes control of system operations
A worm does not replicate itself; it damages or destroys data.
Rate this question:
Use all the space in your browser cache
Cause an error page to display
Activate the robot or spider program
Return less relevant results for your keywords
Rate this question:
It requires the search results to include multiple keywords
It requires the search results to include one keyword or the other or both
It requires the search results to include one keyword and exclude another
It requires the search results to include one keyword or one URL.
Rate this question:
Authoritative peer-reviewd
Open peer-reviewed
Primary
Individual
Containing the content that appear on each Web page
Linking the Web site to other related Web pages
Providing search engines with a descriptive of the Web site
Preventing early-version browsers from viewing the Web site
Static index/site map
Boolean index
Full-text index
Keyword index
Rate this question:
Structured directory index
Keyword index
Full-text index
Static index/site map
Yahoo
Excite
WebCrawler
Rate this question:
An information portal allows only keyword index searches.
An information portal will only index Web sites based on manual submissions.
An information portal allows only static index/site map searches.
An information portal uses a robot or spider program to browse the Web and index the content that it finds.
Rate this question:
Consult secondary resources.
Consult open peer-reviewed resources
Consult authoritative peer-reviewed resources
Consult popular resources
The more frequently you specified keywords are found in a particular document, the higher the relevancy score that document receives.
The more reference sources included in a Web document, the higher the relevancy score that document receives.
The more hyperlinks included in a Web document, the higher the relevancy score that document receives
The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents.
Smartphones use infrared-based keyboards for inputting information into PIM applications.
Smartphones rarely have enough memory to support full-featured PIM applications.
Smartphones PIM applications are designed to work in tandem with traditional desktop or laptop computers.
Smartphones save changes you make in PIM applications in random-access memory (RAM), the content of which are erased when you turn the smartphone off.
Personal Digital Assistant (PDA).
Message Transfer Agent (MTA).
Personal Information Management (PIM) program.
Mail User Agent (MUA).
Filter span at the server.
Translate dotted-quad IP addresses into easily recognise text-based names, and vice versa.
Filter spam at the client.
Schedule appointments and meetings, store contact information and manage tasks.
DOC, EXE and HTM
DOC, TXT, and PDF
PNG, GIF and JPG
BMP, JPG and TIFF
Install the latest version of a browser, or install any available upgrades.
Compress the files, then decompress them before you attempt to open them.
Open the files in the Windows operating system only.
Open the files in an operating system other than Windows.
By using a file compression utility to compress large files
By dividing the file in half and sending two halves seperately
By increasing the mail server's attachment size limit
By using smaller fonts in the files
MIME
HTTP
TCP/IP
FTP
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.