Toughest Computer Networking: Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jscansino
J
Jscansino
Community Contributor
Quizzes Created: 2 | Total Attempts: 556
| Attempts: 449 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.

Explanation

The domain name in the given URL is www.scsite.com. The domain name is the part of the URL that identifies the specific website or web address. In this case, www.scsite.com is the domain name.

Submit
Please wait...
About This Quiz
Toughest Computer Networking: Quiz! - Quiz

Tackle the 'Toughest Computer Networking: Quiz!' to master various aspects of internet technologies. Test your knowledge on OSPs, WSPs, domain names, web directories, search keywords, and hyperlinks. Perfect for learners aiming to deepen their understanding of web networking.

Personalize your quiz and earn a certificate with your name on it!
2. When you want to transfer files between computers, the best Internet service to use is

Explanation

FTP (File Transfer Protocol) is the best internet service to use when you want to transfer files between computers. It is specifically designed for file transfer and allows for efficient and secure transfer of large files over the internet. Instant Messaging, Chat, and Usenet are not specifically designed for file transfer and may not provide the same level of efficiency and security as FTP. Therefore, FTP is the most suitable option for transferring files between computers.

Submit
3. If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

Explanation

To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of high-speed internet connection that allows you to access websites. A browser is a software application that enables you to navigate and view web pages. Additionally, the correct protocols are necessary to establish a connection between your computer and the school's website. These protocols ensure that data is transmitted and received correctly over the internet.

Submit
4. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

Explanation

An anti-spammer is a program used to detect unsolicited and unwanted e-mail and prevent those messages from getting to a user's inbox. It is specifically designed to identify and block spam emails, which are often sent in bulk and can be harmful or annoying to recipients. This program helps to ensure that users only receive legitimate and desired emails in their inbox, enhancing their online experience and protecting them from potential security threats.

Submit
5. What type of attack relies on the trusting nature of employees and the art of deception?

Explanation

Social Engineering is the correct answer because it involves exploiting the trusting nature of employees and using deception to manipulate them into revealing sensitive information or performing actions that could compromise security. This type of attack often involves techniques such as impersonation, phishing, or pretexting to trick individuals into divulging confidential information or granting unauthorized access to systems.

Submit
6. Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

Explanation

Small files that are deposited on a user's hard drive when they visit a website are commonly known as cookies. Cookies are used to store information about the user's browsing activity and preferences, allowing websites to personalize the user experience and remember certain settings. They are widely used by websites for various purposes such as tracking user behavior, remembering login information, and delivering targeted advertisements. Therefore, the correct answer is cookies.

Submit
7. Which of the following is an example of a strong password?

Explanation

The given password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password using brute force or dictionary attacks. Additionally, the password is long enough, which further enhances its strength.

Submit
8. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

Explanation

Creating strong computer security measures such as encryption, firewalls, and secure authentication protocols helps to prevent unauthorized access to personal information, ensuring privacy rights are protected. By implementing robust security measures, individuals can safeguard their personal data from being accessed or misused by hackers or cybercriminals. This helps to maintain the confidentiality and integrity of sensitive information, preserving privacy rights.

Submit
9. The guidelines for the morally acceptable use of computers in society are

Explanation

Computer ethics refers to the moral principles and guidelines that govern the appropriate use of computers in society. It involves understanding and applying ethical standards to issues such as privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics helps to ensure that computers are used in a responsible and ethical manner, taking into consideration the potential consequences and implications of their use. It encompasses both legal and moral considerations, making it an important aspect of the ethical use of computers in society.

Submit
10. ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

Explanation

WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. They offer connectivity through wireless networks, allowing users to access the internet without the need for wired connections. ISPs, or Internet Service Providers, generally provide internet access through wired connections, while OSPs, or Online Service Providers, offer various online services but may not necessarily provide wireless internet access. WANs, or Wide Area Networks, are a type of network that connects multiple locations and can be used to provide internet access, but they are not specifically focused on wireless connectivity.

Submit
11. What can a firewall protect against?

Explanation

A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system by blocking login attempts from unknown or unverified sources. By enforcing authentication measures, such as requiring valid credentials or using secure protocols, a firewall can help ensure that only authorized users are able to access a network or system remotely. This helps to enhance security and protect against potential breaches or unauthorized access attempts.

Submit
12. Collecting personal information and effectively posing as another individual is known as the crime of:

Explanation

Identity theft is the correct answer because it involves the act of collecting personal information and impersonating another individual. This crime typically involves stealing someone's personal details, such as their social security number, credit card information, or other identifying information, with the intent to commit fraud or other illegal activities. The thief may use this stolen information to make unauthorized purchases, open fraudulent accounts, or even commit crimes in the victim's name. Identity theft is a serious offense that can cause significant financial and emotional harm to the victims.

Submit
13. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Explanation

A virus is a type of malicious software that is designed to replicate itself and spread from one program or disk to another. Unlike other types of malware, such as Trojan horses or time-bombs, viruses have the ability to self-replicate and infect other files or systems without the user's knowledge or consent. They can cause damage to computer systems, steal personal information, or disrupt normal operations. Therefore, the correct answer for the given question is "Virus".

Submit
14. The ethical issue concerned with the correctness of data collected is

Explanation

The ethical issue concerned with the correctness of data collected is "exactness". This means that collecting accurate and precise data is crucial from an ethical standpoint. It is important to ensure that the data collected is free from errors, biases, or any form of manipulation. This is essential to maintain the integrity and reliability of the data, as well as to ensure that any decisions or actions based on that data are fair and just. Failing to prioritize exactness in data collection can lead to misinformation, misinterpretation, and potential harm to individuals or organizations relying on that data.

Submit
15. In networking, bandwidth refers to

Explanation

Bandwidth in networking refers to the carrying capacity of the transmission media for sending information. It represents the maximum amount of data that can be transmitted over a network connection in a given amount of time. It is often measured in bits per second (bps) and determines the speed at which data can be transferred between devices on a network. A higher bandwidth allows for faster and more efficient data transmission, while a lower bandwidth can result in slower network speeds and decreased performance.

Submit
16. HTML viruses infect:

Explanation

HTML viruses infect a web page in HTML code. HTML (Hypertext Markup Language) is the standard language used to create web pages. Viruses that target HTML code can infect and manipulate the content of a web page, potentially causing harm to the visitors who view that page. These viruses can exploit vulnerabilities in the HTML code or inject malicious scripts, leading to various security risks and compromising the integrity of the web page.

Submit
17. What is the most common tool used to restrict access to a computer system?

Explanation

Passwords are the most common tool used to restrict access to a computer system. They provide a level of security by requiring users to enter a unique combination of characters that only they should know. Passwords act as a barrier, preventing unauthorized individuals from gaining access to sensitive information or performing unauthorized actions on the system. By setting strong and unique passwords, users can protect their accounts and ensure that only authorized individuals can access the computer system.

Submit
18. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

Explanation

A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are typically carried out by individuals or organizations with the intention of defrauding or tricking people into giving away their personal information, money, or resources. Scammers often use various tactics such as false promises, fake identities, or misleading information to deceive their victims. It is important to be cautious and aware of potential scams to protect oneself from falling victim to these fraudulent activities.

Submit
19. A __________ acts as a security buffer between a company’s private network and all external networks.

Explanation

A firewall acts as a security buffer between a company's private network and all external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, protects against malicious attacks, and filters out potentially harmful data packets. By enforcing network security policies, a firewall acts as the first line of defense in protecting the company's private network from external threats.

Submit
20. When you want to transfer files between computers, the best Internet service to use is

Explanation

FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. FTP is specifically designed for file transfer and allows users to easily upload, download, and manage files on remote servers. Unlike instant messaging, chat, or Usenet, FTP is dedicated solely to file transfer and offers more reliable and efficient transfer speeds. Therefore, FTP is the most suitable and effective option for transferring files between computers over the Internet.

Submit
21. Which of the following is an example of a strong password?

Explanation

The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password through brute force or dictionary attacks. Additionally, the password is sufficiently long, which further enhances its strength.

Submit
22. The most common passwords in the U.S. or Britain include all EXCEPT:

Explanation

The given answer, 123, is the most common password used by people in the U.S. or Britain. This password is extremely weak and easily guessable, as it consists of consecutive numbers. It is recommended to use stronger and more unique passwords to ensure the security of personal information and online accounts.

Submit
23. Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

Explanation

Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and giving them to others, which is exactly what is described in the question. Freeware refers to software that is available for free, shareware is software that is distributed on a trial basis, and public domain refers to software that is not protected by copyright and can be freely used and modified.

Submit
24. Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

Explanation

Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and sharing them with others, which is a violation of copyright laws. Freeware refers to software that is available for free, shareware refers to software that can be downloaded and used for a trial period before purchasing, and public domain refers to software that is not protected by copyright and can be freely used and distributed. Therefore, piracy is the most appropriate term to describe the act of copying and distributing software without permission.

Submit
25. Web pages that list as the result of a search are called ____.

Explanation

When conducting a search on a search engine, the user inputs specific words or phrases that are relevant to their desired information. These words or phrases are known as keywords. The search engine then uses these keywords to generate a list of web pages that are most relevant to the search query. Therefore, the correct answer is "keywords".

Submit
26. A built-in connection to another related Web page or part of a Web page is called a ____.

Explanation

A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks allow users to navigate between different web pages or sections within a webpage by simply clicking on them. They are commonly used in websites to provide easy access to additional information or related content.

Submit
27. What type of virus uses computer hosts to reproduce itself?

Explanation

A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms do not need to attach themselves to a program or file to spread. Instead, they exploit vulnerabilities in computer networks and use them to replicate and spread to other computers. This allows them to quickly infect a large number of systems and cause widespread damage.

Submit
28. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Explanation

A denial of service attack refers to the situation where a website becomes inaccessible to its users due to a high volume of fake traffic. This attack overwhelms the website's server, causing it to crash or become unresponsive. Unlike viruses or Trojan horses that typically infect individual devices, a denial of service attack targets the website itself, disrupting its normal functioning and preventing genuine users from accessing it.

Submit
29. The scrambling of code is known as:

Explanation

The scrambling of code is known as encryption. Encryption is the process of converting information or data into a code or cipher, making it unreadable to anyone who does not have the key to decrypt it. It is commonly used to protect sensitive data and ensure its confidentiality and integrity.

Submit
30. If you want to secure a message, use a(n):

Explanation

A cryptosystem is the most appropriate choice for securing a message. It is a combination of cryptographic algorithms, protocols, and key management techniques that work together to provide secure communication. A cryptosystem ensures the confidentiality, integrity, and authenticity of the message by using encryption and decryption processes. It also includes mechanisms for key generation, distribution, and management. Cryptosystems are widely used in various applications, such as online banking, secure messaging, and e-commerce, to protect sensitive information from unauthorized access or interception.

Submit
31. Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

Explanation

Small files that are deposited on a user's hard drive when they visit a website are known as cookies. These cookies store information about the user's browsing activity and preferences, allowing the website to remember certain settings and provide a personalized experience. Cookies are commonly used for tracking user behavior, maintaining user sessions, and delivering targeted advertisements.

Submit
32. Most computer systems rely solely on ___________ for authentication.

Explanation

In most computer systems, passwords are commonly used for authentication. Users are required to enter a unique password that matches the one stored in the system in order to gain access. This is a widely adopted method as it provides a level of security by ensuring that only authorized users can access the system. Other options like logins, encryption, and lock and key may also be used in combination with passwords, but passwords are typically the primary means of authentication.

Submit
33. In the world of computing, the essential element that controls how computers are used is

Explanation

Ethics is the correct answer because it refers to the moral principles and values that govern the behavior and decision-making of individuals and organizations. In the world of computing, ethics play a crucial role in determining how computers are used. It involves considering the impact of technology on society, ensuring privacy and data protection, promoting fairness and equality, and adhering to ethical standards while developing and using computer systems. Ethics guide the responsible and ethical use of computers, ensuring that they are used in a manner that aligns with societal values and promotes the well-being of individuals and communities.

Submit
34. The ethical issue that involves who is able to read and use data is

Explanation

Access is the correct answer because it pertains to the ethical issue of who has the authority to read and utilize data. This issue revolves around determining who should be granted permission to access and use certain data, as well as the potential consequences of unauthorized access. It involves considerations of fairness, transparency, and the responsible handling of sensitive information.

Submit
35. Programs that come into a computer system disguised as something else are called

Explanation

A Trojan Horse is a type of malicious program that disguises itself as something harmless or desirable to trick users into downloading or executing it. Once inside the computer system, it can perform various malicious activities without the user's knowledge or consent, such as stealing personal information, damaging files, or providing unauthorized access to the system. Unlike spoofers, loggers, and defacers, which have different purposes and methods, a Trojan Horse specifically refers to this type of deceptive program.

Submit
36. A built-in connection to another related Web page or part of a Web page is called a ____.

Explanation

A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks are clickable elements on a website that allow users to navigate to different pages or sections within the same page. They are commonly represented by underlined text or clickable buttons. By clicking on a hyperlink, users are redirected to the linked content, enabling easy and convenient navigation throughout the web.

Submit
37. Most computer systems rely solely on ___________ for authentication.

Explanation

In most computer systems, passwords are commonly used for authentication. Users are required to enter a specific password that matches their account in order to gain access to the system. This is a widely used method as it provides a level of security by ensuring that only authorized individuals can log in and access the system's resources.

Submit
38. The guidelines for the morally acceptable use of computers in society are

Explanation

Computer ethics refers to the ethical principles and guidelines that govern the use of computers and technology in society. It involves understanding and addressing ethical issues related to privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics provides a framework for individuals and organizations to make morally acceptable decisions and actions regarding the use of computers and technology. It ensures that technology is used responsibly, ethically, and in a way that respects the rights and well-being of individuals and society.

Submit
39. When a hard disk crashes, it is an example of a __________ type of computer security threat.

Explanation

A hard disk crash refers to a situation where the storage device of a computer fails, resulting in the loss of data and the inability to access information. This failure is caused by a technical problem within the computer system, such as a malfunctioning component or software error. It is not related to criminal activity or civil strife, which involve intentional actions by individuals or groups. Therefore, a hard disk crash is considered a technological failure rather than a security threat posed by criminals or external factors.

Submit
40. ____ program reads pages on Web sites in order to create an index of hits.

Explanation

A directory program is responsible for reading pages on websites in order to create an index of hits. This program scans through the web pages and collects information about the content on those pages. It then organizes this information into a structured index, making it easier for users to search and find relevant content. Unlike search engines that use complex algorithms to rank pages, a directory program simply creates a catalog of pages based on their content.

Submit
41. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

Explanation

A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which is designed to gather information without the user's knowledge, a virus is specifically created to spread and cause harm to the infected system. Firewalls, on the other hand, are security measures that protect against unauthorized access to a network, while a Trojan Horse is a type of malware that disguises itself as legitimate software to deceive users and gain unauthorized access to their systems.

Submit
42. ___ is the measurement of things such as fingerprints and retinal scans used for security access.

Explanation

Biometrics refers to the measurement of unique physical or behavioral characteristics such as fingerprints and retinal scans. These measurements are used for security access as they provide a highly accurate and reliable way to identify individuals. Biometrics is widely used in various industries and applications, including access control systems, border control, and personal devices like smartphones and laptops. It offers a more secure and convenient alternative to traditional methods like passwords or ID cards.

Submit
43. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

Explanation

A denial-of-service attack is the deliberate attempt to overwhelm a computer system or network by flooding it with a high volume of requests for information. This flood of requests consumes the system's resources, such as bandwidth or processing power, making it unable to respond to legitimate requests. This type of attack aims to disrupt the normal functioning of a system or network, rendering it slow or completely unavailable to users. Unlike viruses, worms, or Trojan Horses, which are forms of malware that infect or damage systems, a denial-of-service attack focuses on rendering the system inaccessible rather than causing direct harm.

Submit
44. Collecting personal information and effectively posing as another individual is known as the crime of:

Explanation

Identity theft refers to the act of collecting personal information and impersonating someone else. This crime involves fraudulently obtaining and using someone's personal data, such as their social security number or credit card information, for financial gain or other malicious purposes. The perpetrator may use this stolen identity to make unauthorized transactions, open fraudulent accounts, or commit other illegal activities. Therefore, identity theft is the correct answer in this case.

Submit
45. What is the name of an application program that gathers user information and sends it to someone through the Internet?

Explanation

A spybot is an application program that gathers user information and sends it to someone through the Internet. Unlike a virus or logic bomb, which may cause harm to a computer system, a spybot is specifically designed to collect and transmit user data without the user's knowledge or consent. It is a form of malware that invades privacy and can be used for malicious purposes such as identity theft or unauthorized surveillance. A security patch, on the other hand, is a software update designed to fix vulnerabilities or improve security in an application or operating system.

Submit
46. A __________ acts as a security buffer between a company’s private network and all external networks.

Explanation

A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By examining the data packets, a firewall can block unauthorized access, prevent malicious attacks, and protect sensitive information from being compromised. It serves as a first line of defense against potential threats and helps maintain the confidentiality, integrity, and availability of the company's network resources.

Submit
47. ____ provide Internet access and have many members-only features that offer a variety of special content and services.

Explanation

OSPs, or Online Service Providers, provide Internet access and have many members-only features that offer a variety of special content and services. Unlike ISPs (Internet Service Providers) that primarily focus on providing Internet connectivity, OSPs go beyond that by offering additional features and services exclusively for their members. This can include things like exclusive content, online communities, personalized recommendations, and other value-added services that enhance the overall online experience for their users. LANs (Local Area Networks) and Networks are not specifically related to providing Internet access or members-only features, making OSPs the most fitting choice for the given explanation.

Submit
48. A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

Explanation

A program that migrates through networks and operating systems and attaches itself to different programs and databases is referred to as a virus. Viruses are malicious software that replicate themselves and spread to other systems, often causing harm by corrupting or deleting files, stealing sensitive information, or disrupting normal system operations. Unlike worms, which can spread independently without attaching to other programs, viruses require a host program to infect and propagate. Denial-of-service attacks and damage, on the other hand, are not specifically related to the behavior described in the question.

Submit
49. When a hard disk crashes, it is an example of a __________ type of computer security threat.

Explanation

When a hard disk crashes, it is considered a technological failure rather than a natural hazard, criminal activity, or civil strife. A hard disk crash typically occurs due to hardware or software malfunctions, such as a mechanical failure, power surges, or corrupted data. It is not caused by external factors like natural disasters or human actions. Therefore, the term "technological failure" accurately describes the situation when a hard disk crashes.

Submit
50. The issues that deal with the collection and use of data about individuals is

Explanation

The correct answer is privacy. This is because privacy refers to the protection of personal information and the control individuals have over how their data is collected, used, and shared. It involves ensuring that individuals have the right to keep their personal information confidential and that organizations handle their data in a secure and responsible manner. Privacy issues are concerned with maintaining the privacy rights of individuals and preventing unauthorized access or misuse of their personal data.

Submit
51. The ethical issue concerned with the correctness of data collected is

Explanation

The ethical issue concerned with the correctness of data collected is "exactness". This refers to the accuracy and precision of the data that is being collected. Ensuring that the data is collected and recorded accurately is important for maintaining the integrity of any research or study. Inaccurate data can lead to incorrect conclusions and potentially harm individuals or organizations that rely on the data for decision-making. Therefore, it is ethically important to prioritize the exactness of the data collected to ensure its reliability and validity.

Submit
52. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

Explanation

A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are typically carried out by individuals or organizations with the intention of defrauding or deceiving unsuspecting victims. They often involve false promises, fake products or services, or misleading information in order to manipulate people into giving up their money or personal information. Scams can take various forms, such as online scams, phone scams, or email scams, and they can have serious financial and emotional consequences for those who fall victim to them.

Submit
53. _____ is defined as any crime completed through the use of computer technology.

Explanation

Computer Crimes is the correct answer because it encompasses any criminal activity that is committed using computer technology. This can include a wide range of offenses such as hacking, identity theft, fraud, cyberbullying, and copyright infringement. Computer Crimes are a growing concern in our increasingly digital world, and law enforcement agencies and cybersecurity professionals work to investigate and prevent these crimes.

Submit
54. Which statement best describes a worm?

Explanation

A worm is a type of virus that does not attach itself to programs and databases. Unlike other viruses that typically infect specific files or programs, worms are standalone programs that can replicate and spread independently. They often exploit vulnerabilities in computer networks to propagate and can cause significant harm by consuming system resources, slowing down networks, or even shutting down servers. Unlike the other options mentioned, the primary characteristic of a worm is its ability to self-replicate without needing to attach itself to other files or programs.

Submit
55. The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.

Explanation

The domain name in the given URL is www.scsite.com. It is the part of the URL that identifies the specific website or web page that the user wants to access. In this case, the domain name is followed by additional directories (dc2003/ch2) that specify the specific location within the website.

Submit
56. The scrambling of code is known as:

Explanation

Encryption refers to the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access. It involves using algorithms and keys to transform the data into an unreadable format, which can only be decrypted with the correct key. Scrambling, password-proofing, and firewalls may provide some level of security, but they are not specifically related to the process of code scrambling. Encryption is the correct term for this process.

Submit
57. What is the name of an application program that gathers user information and sends it to someone through the Internet?

Explanation

A spybot is an application program that gathers user information and sends it to someone through the Internet. It is designed to secretly collect personal data without the user's consent or knowledge. Spybots are often used for malicious purposes, such as identity theft or unauthorized surveillance. They can be installed on a user's device through various means, such as email attachments or malicious websites. Once installed, the spybot operates in the background, monitoring and transmitting the user's information to a remote server.

Submit
58. People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.

Explanation

Hackers are individuals who gain unauthorized access to computers for the fun of it, without causing intentional harm. They typically explore computer systems to understand their vulnerabilities and weaknesses, seeking knowledge and challenges rather than causing damage. While their actions may still be considered illegal, hackers are often motivated by curiosity, learning, and the pursuit of knowledge about computer systems.

Submit
59. A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

Explanation

A program that fills a computer system with self-replicating information thus clogging the system is called worms. Worms are a type of malicious software that can spread across a network, replicating themselves and causing damage to computer systems. Unlike viruses, worms do not need a host file to attach themselves to, and they can spread independently. Worms can consume system resources, slow down network performance, and cause system crashes. They can also be used to create botnets or carry out other malicious activities.

Submit
60. A common way to protect information being sent over a network, when long distance is involved, is

Explanation

Encrypting is a common way to protect information being sent over a network, especially when long distances are involved. Encryption involves converting the data into a coded form that can only be decoded with the use of a specific key or password. This ensures that even if the information is intercepted by unauthorized individuals, they will not be able to understand or access the actual content. Encrypting adds an extra layer of security to prevent unauthorized access and maintain the confidentiality of the transmitted data.

Submit
61. ___ is the measurement of things such as fingerprints and retinal scans used for security access.

Explanation

Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints and retinal scans, for the purpose of identification and security access. It is a widely used method in computer security systems to ensure authorized access to sensitive information or restricted areas. Biometrics offers a high level of accuracy and reliability in verifying an individual's identity, making it an effective tool for enhancing security measures.

Submit
62. What is the most common tool used to restrict access to a computer system?

Explanation

Passwords are the most common tool used to restrict access to a computer system. They serve as a form of authentication, ensuring that only authorized individuals can gain entry. By requiring users to input a specific combination of characters, passwords act as a barrier against unauthorized access and protect sensitive information. They are widely used across various platforms and applications, making them an essential component of computer system security.

Submit
63. The issues that deal with the collection and use of data about individuals is

Explanation

The correct answer is privacy. This is because privacy refers to the protection of personal information and the right to control how it is collected, used, and shared. Issues related to privacy involve ensuring that individuals have control over their personal data and are protected from unauthorized access or misuse. This includes concerns about data breaches, surveillance, and the ethical use of personal information.

Submit
64. People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.

Explanation

Hackers are individuals who gain unauthorized access to computers for the fun of it, but do not intentionally cause harm. They are often motivated by curiosity and a desire to explore and understand computer systems. Unlike crackers, who exploit vulnerabilities for malicious purposes, hackers typically engage in activities like exploring networks, finding security flaws, and enhancing their technical skills. While their actions may still be illegal and unethical, hackers generally do not have malicious intent and may even contribute positively to the field of cybersecurity by identifying vulnerabilities that need to be addressed.

Submit
65. Programs that come into a computer system disguised as something else are called

Explanation

A Trojan Horse is a type of malicious program that disguises itself as something else to gain access to a computer system. It tricks users into thinking it is a legitimate program or file, but once installed, it can perform harmful actions such as stealing personal information, damaging files, or providing unauthorized access to the attacker. Unlike spoofers, loggers, and defacers, which may have different objectives, a Trojan Horse specifically focuses on deceptive infiltration and malicious activities.

Submit
66. A program that performs a useful task while simultaneously allowing destructive acts is a:

Explanation

A Trojan Horse is a program that appears to be useful or harmless, but actually contains malicious code that allows unauthorized access to a computer system. Unlike a virus or worm, a Trojan Horse does not replicate itself, but instead relies on the user's actions to spread and execute its destructive acts. This makes it particularly dangerous as it can deceive users into willingly installing it, often disguising itself as legitimate software or files. Once inside a system, a Trojan Horse can perform a variety of harmful actions, such as stealing sensitive information, damaging files, or giving remote control to an attacker.

Submit
67. A program that performs a useful task while simultaneously allowing destructive acts is a:

Explanation

A Trojan Horse is a type of malicious software that appears to be legitimate or useful, but actually contains hidden destructive elements. Unlike viruses or worms, which can spread on their own, a Trojan Horse relies on the user to unknowingly install or execute it. Once inside a system, it can perform a useful task to deceive the user, while also carrying out destructive acts in the background without the user's knowledge or consent. This makes the Trojan Horse a particularly dangerous and deceptive form of malware.

Submit
68. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Explanation

A virus is a type of malicious software that is designed to replicate itself and spread from one computer to another. It can infect programs or files, causing them to become corrupted or malfunction. Unlike Trojan horses, viruses have the ability to self-replicate and spread without the user's knowledge or consent. Therefore, a virus is the correct answer for the given question.

Submit
69. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Explanation

A denial of service attack refers to the situation when a website becomes inaccessible to its customers due to an overwhelming amount of fake traffic. This attack floods the website's server with an excessive number of requests, causing it to slow down or crash. Unlike viruses or Trojan horses, which are malicious software, a denial of service attack does not involve the installation of any harmful programs on the target system. Instead, it disrupts the normal functioning of the website by overwhelming its resources with fake requests, making it impossible for genuine users to access it.

Submit
70. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

Explanation

Creating strong computer security measures such as encryption, firewalls, and secure authentication methods can help prevent unauthorized access to personal information and data. By safeguarding sensitive information, computer security measures contribute to protecting privacy rights. This ensures that individuals have control over their personal information and are not subject to unauthorized surveillance or data breaches. Therefore, creating strong computer security usually simultaneously helps protect privacy rights.

Submit
71. The study of fitting computers to people is called __________.

Explanation

Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems and workspaces in a way that maximizes efficiency, comfort, and safety for the individuals using them. It involves considering factors such as posture, lighting, equipment placement, and user interaction to optimize productivity and prevent musculoskeletal injuries.

Submit
72. The majority of computer crimes are committed by:

Explanation

Insiders are the correct answer for the majority of computer crimes because they have authorized access to computer systems and networks. This allows them to exploit their knowledge and privileges to commit various illegal activities, such as stealing sensitive data, manipulating systems, or causing damage from within the organization. Insiders may include disgruntled employees, former employees, or contractors who have knowledge of the system's vulnerabilities and can exploit them without raising suspicion. Their familiarity with the organization's infrastructure and security measures makes it easier for them to carry out computer crimes without being detected.

Submit
73. What type of virus uses computer hosts to reproduce itself?

Explanation

A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms can spread without any human action and can replicate themselves across networks. They exploit vulnerabilities in computer systems to gain access and then use the host's resources to create copies of themselves and spread to other computers. Worms can cause significant damage by consuming network bandwidth and resources, slowing down or crashing systems, and even deleting or modifying files. They are known for their ability to quickly propagate and infect large numbers of computers.

Submit
74. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

Explanation

A denial-of-service attack is a deliberate attempt to overwhelm a computer system or network by flooding it with requests for information, thereby slowing down or completely stopping its normal functioning. This can be done by sending a massive amount of traffic or requests to the targeted system, causing it to become overloaded and unable to respond to legitimate requests. Unlike viruses, worms, and Trojan Horses, which are malicious software designed to infiltrate and damage systems, a denial-of-service attack focuses on disrupting the availability of a system rather than causing direct harm.

Submit
75. Listservers are useful in helping teachers keep up with new ideas by:

Explanation

Listservers are a type of software that automatically sends information, updates, and messages to subscribers' email boxes. This enables teachers to stay updated with new ideas and information without actively seeking it out. Real-time chats and community bulletin boards may also be helpful for exchanging ideas, but the specific function of listservers is to automatically deliver information via email. Therefore, the correct answer is "Automatically sending information to your email box."

Submit
76. The study of fitting computers to people is called __________.

Explanation

Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems and workspaces to optimize productivity, comfort, and safety for individuals. This field considers factors such as body posture, equipment placement, and user interface design to prevent musculoskeletal disorders and enhance overall well-being.

Submit
77. The ethical issue that involves who is able to read and use data is

Explanation

Access is the correct answer because the ethical issue mentioned in the question is related to who has the ability to read and use data. Access refers to the permission or authority granted to individuals or entities to access and use certain data. This ethical issue raises concerns about who should have access to sensitive or private data, and whether it should be restricted to certain individuals or organizations. It also relates to issues of data ownership and control.

Submit
78. A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

Explanation

A program that migrates through networks and operating systems and attaches itself to different programs and databases is known as a virus. Viruses are malicious software that can replicate themselves and spread to other systems, causing harm by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of a computer. Unlike worms, which are self-replicating and do not require a host program to spread, viruses rely on attaching themselves to existing programs or files in order to propagate. Denial-of-service attacks and damage do not involve the same characteristics of migrating and attaching to different programs and databases.

Submit
79. A common way to protect information being sent over a network, when long distance is involved, is

Explanation

Encrypting is a common way to protect information being sent over a network, especially when long distance is involved. Encryption involves converting the original information into a coded form that can only be decoded by authorized parties who possess the decryption key. This ensures that even if the information is intercepted by unauthorized individuals, they will not be able to understand or access the sensitive data. Encrypting provides an additional layer of security and helps safeguard the confidentiality and integrity of the transmitted information.

Submit
80. What can a firewall protect against?

Explanation

A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system from external sources. By filtering incoming connections and verifying user credentials, a firewall acts as a barrier between the internal network and external threats, ensuring that only authenticated users can access the system. This helps to prevent unauthorized access, data breaches, and potential security risks.

Submit
81. ___ provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

Explanation

WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. These providers offer connectivity through wireless networks, allowing users to access the internet without the need for physical connections or cables. WSPs typically operate by installing wireless access points in specific locations, such as cafes, airports, or homes, and users can connect to these access points using their wireless devices.

Submit
82. The most common passwords in the U.S. or Britain include all EXCEPT:

Explanation

The given options consist of common passwords, but the exception is "123". This is because "123" is a simple and easily guessable password that does not meet the criteria of a strong and secure password. On the other hand, "love", "Fred", and "God" are also commonly used passwords, but they are not excluded in this case.

Submit
83. _____ is defined as any crime completed through the use of computer technology.

Explanation

Computer Crimes is defined as any crime completed through the use of computer technology. This term encompasses a wide range of illegal activities that involve the manipulation, theft, or destruction of data, as well as unauthorized access to computer systems. Examples of computer crimes include hacking, identity theft, phishing, and spreading malware. These crimes exploit vulnerabilities in computer networks and systems, causing harm to individuals, organizations, and even governments. The term "Computer Crimes" emphasizes the criminal nature of these activities when they are carried out using computer technology.

Submit
84. A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

Explanation

A program that fills a computer system with self-replicating information thus clogging the system is called worms. Worms are malicious software that can spread across networks and computers, replicating themselves and consuming system resources. Unlike viruses, worms do not require a host program to attach themselves to, making them capable of spreading independently. They can cause significant damage by slowing down or crashing computer systems, stealing sensitive information, or creating backdoors for hackers to exploit. Denial-of-service attacks, on the other hand, involve overwhelming a system with traffic to make it inaccessible, while damage is a general term that can refer to any harm caused to a computer system.

Submit
85. In networking, bandwidth refers to

Explanation

Bandwidth in networking refers to the maximum amount of data that can be transmitted over a network in a given amount of time. It represents the carrying capacity of the transmission media, such as cables or wireless connections, for sending information. The higher the bandwidth, the more data can be transmitted at a faster speed. Therefore, the correct answer is "The carrying capacity of the transmission media for sending information."

Submit
86. In the world of computing, the essential element that controls how computers are used is

Explanation

Ethics is the correct answer because it refers to the moral principles that govern the behavior and decisions of individuals and organizations. In the world of computing, ethics play a crucial role in determining how computers are used. It involves considering the impact of technology on society, protecting user privacy, ensuring fairness and equality, and promoting responsible use of technology. Adhering to ethical principles helps in creating a positive and trustworthy computing environment and ensures that computers are used in a way that benefits society as a whole.

Submit
87. ____ program reads pages on Web sites in order to create an index of hits.

Explanation

A directory program is responsible for reading pages on websites to create an index of hits. This means that it scans the content of web pages and gathers information about them, such as keywords or relevant data, to create a searchable index. Unlike search engines that use algorithms to rank and display search results, a directory program focuses on organizing and categorizing web pages into specific directories or categories.

Submit
88. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

Explanation

A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which collects information without the user's consent, or a firewall, which protects against unauthorized access, a virus is specifically designed to replicate and spread, often causing harm to the infected system. A Trojan Horse, on the other hand, disguises itself as a legitimate program but contains malicious code, which is different from a virus that replicates itself.

Submit
89. HTML viruses infect:

Explanation

HTML viruses infect a web page in HTML code. HTML (Hypertext Markup Language) is the standard language used to create web pages. Viruses that target HTML code can insert malicious scripts or code into web pages, which can then infect the computers of users who visit those pages. This type of virus can spread through websites, emails, or other means of transmitting HTML code. It does not directly infect the computer itself, but rather exploits vulnerabilities in the HTML code of web pages to infect the computers of users who access those pages.

Submit
90. The common name for the crime of stealing passwords is:

Explanation

Spoofing is the correct answer because it refers to the act of stealing passwords by impersonating someone or something else. It involves creating a false identity or masquerading as a legitimate user or system to gain unauthorized access to passwords and sensitive information. Spooling, on the other hand, is a process of temporarily storing data in a queue, identity theft involves stealing personal information for fraudulent purposes, and hacking refers to unauthorized access or manipulation of computer systems.

Submit
91. If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

Explanation

To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of internet connection that uses telephone lines to transmit data. A browser is a software application used to access and view websites. The correct protocols refer to the set of rules and procedures that govern the communication between devices on a network. These protocols ensure that data is transmitted and received correctly. Therefore, having DSL, a browser, and the correct protocols is necessary to establish a connection and access your school's website.

Submit
92. Listservers are useful in helping teachers keep up with new ideas by:

Explanation

Listservers are online mailing lists that automatically send information and updates to subscribers' email boxes. This allows teachers to stay informed about new ideas, resources, and services without actively searching for them. Real-time chats and community bulletin boards may also be helpful, but the most direct and efficient way for teachers to keep up with new ideas is through the automatic delivery of information to their email boxes.

Submit
93. If you want to secure a message, use a(n):

Explanation

A cryptosystem is the most appropriate choice for securing a message because it is a complete system that includes encryption, decryption, and key management. It provides a comprehensive approach to protecting the confidentiality and integrity of the message. Cryptology source refers to a source of knowledge about cryptography, not a tool for securing a message. An encryption key is a component of a cryptosystem, but it alone is not sufficient for securing a message. Similarly, an encryption software package is a tool that can be used within a cryptosystem, but it is not the entire system itself.

Submit
94. Which statement best describes a worm?

Explanation

A worm is a type of virus that does not attach itself to programs and databases. Unlike other viruses, worms are standalone programs that can replicate themselves and spread to other computers through network connections. They do not require a host program to infect and can cause harm by consuming network bandwidth, slowing down systems, or carrying out malicious activities such as data theft or denial of service attacks.

Submit
95. The common name for the crime of stealing passwords is:

Explanation

Spoofing refers to the act of disguising oneself or faking one's identity in order to deceive others. In the context of stealing passwords, spoofing involves creating a fake website or email that appears legitimate, tricking the user into entering their login credentials. This allows the attacker to gain unauthorized access to the user's account or personal information. Therefore, spoofing is the common name for the crime of stealing passwords.

Submit
96. ____ provides Internet access and have many members-only features that offer a variety of special content and services.

Explanation

OSPs, or Online Service Providers, are platforms or companies that provide internet access and offer exclusive features and services to their members. These OSPs typically have a range of special content, such as online communities, forums, chat rooms, and other interactive features, that are only accessible to their members. Additionally, they may offer additional services like email accounts, online storage, and personalized content. Overall, OSPs play a significant role in providing internet access and enhancing the online experience for their members.

Submit
97. Web pages that list as the result of a search are called ____.

Explanation

Web pages that list as the result of a search are called "keywords" because keywords are the specific words or phrases that users enter into a search engine to find relevant information. When a search is performed, the search engine scans through its database and retrieves web pages that contain these keywords. The search engine then displays these web pages as search results, allowing users to find the information they are looking for. Therefore, the term "keywords" accurately describes the web pages that appear as search results.

Submit
98. What type of attack relies on the trusting nature of employees and the art of deception?

Explanation

Social engineering is a type of attack that exploits the trusting nature of employees and relies on the art of deception. It involves manipulating individuals into divulging sensitive information or performing actions that may compromise security. This can be achieved through various techniques such as impersonation, phishing, or psychological manipulation. The attacker takes advantage of human vulnerabilities to gain unauthorized access to systems or obtain confidential information.

Submit
99. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

Explanation

The correct answer is "Spam filter". A spam filter is a program that is used to detect and prevent unsolicited and unwanted emails from reaching a user's inbox. It helps in reducing the amount of spam that a user receives by filtering out these unwanted messages. The term "anti-spammer" refers to a person or entity that actively works against sending spam emails, rather than being a program used for detecting and preventing spam. "Email guard" and "Virus filter" are not specifically related to the prevention of spam emails.

Submit
100. The majority of computer crimes are committed by:

Explanation

Insiders are the correct answer because they have access to sensitive information and systems within an organization, making it easier for them to commit computer crimes. They may include disgruntled employees, contractors, or anyone with authorized access to the organization's network. Insiders have the knowledge and familiarity with the organization's systems, making it harder to detect their actions and easier for them to cover their tracks. This makes them a significant threat when it comes to computer crimes.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2014
    Quiz Created by
    Jscansino
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
When you want to transfer files between computers, the best Internet...
If you want to connect your home computer so that you can view your...
What do you call a program used to detect unsolicited and unwanted...
What type of attack relies on the trusting nature of employees and the...
Small files that are deposited on a user’s hard drive when they...
Which of the following is an example of a strong password?
Creating strong computer security to prevent computer crime usually...
The guidelines for the morally acceptable use of computers in society...
___ provide wireless Internet access to users with wireless modems or...
What can a firewall protect against?
Collecting personal information and effectively posing as another...
An intentionally disruptive program that spreads from program to...
The ethical issue concerned with the correctness of data collected is
In networking, bandwidth refers to
HTML viruses infect:
What is the most common tool used to restrict access to a computer...
A fraudulent or deceptive act or operation designed to trick...
A __________ acts as a security buffer between a company’s private...
When you want to transfer files between computers, the best Internet...
Which of the following is an example of a strong password?
The most common passwords in the U.S. or Britain include all EXCEPT:
Which of the following would best fit the following description...
Which of the following would best fit the following description –...
Web pages that list as the result of a search are called ____.
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
When customers of a Web site are unable to access it due to a...
The scrambling of code is known as:
If you want to secure a message, use a(n):
Small files that are deposited on a user’s hard drive when they...
Most computer systems rely solely on ___________ for authentication.
In the world of computing, the essential element that controls how...
The ethical issue that involves who is able to read and use data is
Programs that come into a computer system disguised as something else...
A built-in connection to another related Web page or part of a Web...
Most computer systems rely solely on ___________ for authentication.
The guidelines for the morally acceptable use of computers in society...
When a hard disk crashes, it is an example of a __________ type of...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
___ is the measurement of things such as fingerprints and retinal...
An attempt to slow down or stop a computer system or network by...
Collecting personal information and effectively posing as another...
What is the name of an application program that gathers user...
A __________ acts as a security buffer between a company’s private...
____ provide Internet access and have many members-only features that...
A program that migrates through networks and operating systems and...
When a hard disk crashes, it is an example of a __________ type of...
The issues that deal with the collection and use of data about...
The ethical issue concerned with the correctness of data collected is
A fraudulent or deceptive act or operation designed to trick...
_____ is defined as any crime completed through the use of computer...
Which statement best describes a worm?
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
The scrambling of code is known as:
What is the name of an application program that gathers user...
People who gain unauthorized access to computers for the fun of it,...
A program that fills a computer system with self-replicating...
A common way to protect information being sent over a network, when...
___ is the measurement of things such as fingerprints and retinal...
What is the most common tool used to restrict access to a computer...
The issues that deal with the collection and use of data about...
People who gain unauthorized access to computers for the fun of it,...
Programs that come into a computer system disguised as something else...
A program that performs a useful task while simultaneously allowing...
A program that performs a useful task while simultaneously allowing...
An intentionally disruptive program that spreads from program to...
When customers of a Web site are unable to access it due to a...
Creating strong computer security to prevent computer crime usually...
The study of fitting computers to people is called __________.
The majority of computer crimes are committed by:
What type of virus uses computer hosts to reproduce itself?
An attempt to slow down or stop a computer system or network by...
Listservers are useful in helping teachers keep up with new ideas by:
The study of fitting computers to people is called __________.
The ethical issue that involves who is able to read and use data is
A program that migrates through networks and operating systems and...
A common way to protect information being sent over a network, when...
What can a firewall protect against?
___ provides wireless Internet access to users with wireless modems or...
The most common passwords in the U.S. or Britain include all EXCEPT:
_____ is defined as any crime completed through the use of computer...
A program that fills a computer system with self-replicating...
In networking, bandwidth refers to
In the world of computing, the essential element that controls how...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
HTML viruses infect:
The common name for the crime of stealing passwords is:
If you want to connect your home computer so that you can view your...
Listservers are useful in helping teachers keep up with new ideas by:
If you want to secure a message, use a(n):
Which statement best describes a worm?
The common name for the crime of stealing passwords is:
____ provides Internet access and have many members-only features that...
Web pages that list as the result of a search are called ____.
What type of attack relies on the trusting nature of employees and the...
What do you call a program used to detect unsolicited and unwanted...
The majority of computer crimes are committed by:
Alert!

Advertisement