Long Exam 3 For Itefund X01

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jscansino
J
Jscansino
Community Contributor
Quizzes Created: 2 | Total Attempts: 556
| Attempts: 107 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. In the world of computing, the essential element that controls how computers are used is

Explanation

Ethics refers to the moral principles and values that guide human behavior. In the world of computing, ethics plays a crucial role in determining how computers are used. It governs the decisions and actions of individuals and organizations when it comes to issues such as privacy, data protection, intellectual property, and access to information. Ethical considerations ensure that computers are used responsibly, with respect for individuals and society as a whole. It helps in creating a safe and inclusive digital environment, promoting trust and accountability. Therefore, ethics is the essential element that controls how computers are used.

Submit
Please wait...
About This Quiz
Long Exam 3 For Itefund X01 - Quiz

Long Exam 3 for ITEFUND X01 assesses knowledge on web technologies, including internet service providers, domain structures, and web navigation tools. It focuses on understanding OSPs, WSPs, URL... see moreanalysis, and the functionality of hyperlinks and directories. see less

2. Which of the following is an example of a strong password?

Explanation

The given answer "J*p2le04>F" is an example of a strong password because it meets the criteria of being long, containing a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password. It also does not include easily guessable information such as the user's real name, username, company name, or birthdate, which can be easily obtained or guessed by attackers.

Submit
3. Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

Explanation

Small files that are deposited on a user's hard drive when they visit a website are commonly known as cookies. These cookies are used by websites to store information about the user's preferences, login status, and browsing behavior. They help enhance the user experience by allowing websites to remember user preferences and provide personalized content. Cookies are not codes, profiles, or trackers, but rather specific files that serve a particular purpose in web browsing.

Submit
4. Collecting personal information and effectively posing as another individual is known as the crime of:

Explanation

Identity theft refers to the act of collecting personal information and impersonating another individual. This crime involves stealing someone's personal data, such as their name, social security number, or financial information, with the intention of using it for fraudulent purposes. The perpetrator may use the stolen information to open credit accounts, make unauthorized purchases, or commit other fraudulent activities in the victim's name. Identity theft is a serious offense that can cause significant financial and emotional harm to the victim.

Submit
5. ___ is the measurement of things such as fingerprints and retinal scans used for security access.

Explanation

Biometrics refers to the measurement of unique physical characteristics, such as fingerprints and retinal scans, used for security access. This technology relies on the fact that these biometric traits are distinctive to each individual, making it difficult for unauthorized users to gain access. Biometrics offers a more secure and reliable method of authentication compared to traditional methods like passwords or ID cards, as it is difficult to replicate or forge someone's biometric features. Therefore, the correct answer is Biometrics.

Submit
6. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

Explanation

A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are often carried out through various means such as phone calls, emails, or online advertisements, where the scammer poses as a legitimate entity or offers false promises to deceive and exploit victims. The intention is to defraud individuals and take advantage of their trust or vulnerability for personal gain.

Submit
7. Which of the following is an example of a strong password?

Explanation

The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password, increasing the security of the account or system it is used for.

Submit
8. When you want to transfer files between computers, the best Internet service to use is

Explanation

FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. Instant Messaging, Chat, and Usenet are not specifically designed for file transfers and may not provide the necessary features or security for efficient and reliable file transfers. FTP, on the other hand, is specifically designed for this purpose, allowing users to easily upload and download files between computers over the Internet. It provides a reliable and secure method for transferring large files or multiple files at once.

Submit
9. Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

Explanation

Small files that are deposited on a user's hard drive when they visit a Web site are commonly known as cookies. These cookies are used by websites to store information about the user's preferences, browsing history, and other relevant data. They help in providing a personalized and efficient browsing experience by remembering user preferences and allowing websites to tailor their content accordingly. Cookies are widely used in the online world to enhance user experience and provide personalized services.

Submit
10. A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

Explanation

A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams can take various forms, such as online schemes, phone calls, or in-person interactions, and they aim to deceive people into giving away their personal information or making financial transactions under false pretenses. Scammers often prey on people's trust and vulnerability, promising unrealistic rewards or benefits in exchange for their participation. It is important to be cautious and skeptical of any offers or requests that seem too good to be true to avoid falling victim to a scam.

Submit
11. When you want to transfer files between computers, the best Internet service to use is

Explanation

FTP (File Transfer Protocol) is the best Internet service to use when you want to transfer files between computers. Instant Messaging, Chat, and Usenet are not specifically designed for file transfer, whereas FTP is specifically designed for transferring files over a network. It provides a reliable and efficient method for transferring files, allowing users to upload and download files between different computers.

Submit
12. Collecting personal information and effectively posing as another individual is known as the crime of:

Explanation

Identity theft refers to the act of collecting personal information and effectively posing as another individual. It involves stealing someone's personal data, such as their Social Security number or credit card information, and using it for fraudulent purposes. This crime can lead to financial loss, damage to reputation, and other serious consequences for the victim.

Submit
13. ___ is the measurement of things such as fingerprints and retinal scans used for security access.

Explanation

Biometrics refers to the measurement of unique physical characteristics such as fingerprints and retinal scans, which are commonly used for security access. This technology relies on the fact that these biometric features are distinctive to each individual, making them an effective method for verifying and granting access to secure areas or systems. Unlike the other options, biometrics specifically focuses on the use of these measurements for security purposes, making it the correct answer.

Submit
14. Most computer systems rely solely on ___________ for authentication.

Explanation

Passwords are commonly used in computer systems as a means of authentication. Users are required to enter a unique password that matches the one stored in the system in order to gain access. This method provides a level of security by ensuring that only authorized individuals can log in to the system. While other authentication methods such as encryption and lock and key may also be used in certain cases, passwords are the most commonly relied upon method for authentication in computer systems.

Submit
15. In the world of computing, the essential element that controls how computers are used is

Explanation

Ethics is the correct answer because it refers to the moral principles and values that govern the behavior of individuals and organizations in the computing world. Ethical considerations are crucial in determining how computers are used, as they guide decisions regarding privacy, data protection, intellectual property rights, and fair use of technology. Adhering to ethical standards ensures responsible and accountable use of computers, promoting trust and integrity in the computing industry.

Submit
16. The guidelines for the morally acceptable use of computers in society are

Explanation

Computer ethics refers to the principles and guidelines that govern the morally acceptable use of computers in society. It involves understanding and applying ethical principles to issues such as privacy, intellectual property rights, and the appropriate use of technology. Computer ethics helps individuals and organizations make informed decisions about their actions and behaviors in the digital world. It also promotes responsible and ethical behavior in the development, use, and management of computer systems and technology.

Submit
17. The guidelines for the morally acceptable use of computers in society are

Explanation

Computer ethics refers to the guidelines and principles that govern the morally acceptable use of computers in society. It involves considering the ethical implications of using computers and technology, such as issues related to privacy, security, intellectual property, and the impact on individuals and society as a whole. Computer ethics helps individuals and organizations make informed decisions about the responsible and ethical use of technology, ensuring that they adhere to moral standards and legal requirements while utilizing computer systems and resources.

Submit
18. A built-in connection to another related Web page or part of a Web page is called a ____.

Explanation

A built-in connection to another related Web page or part of a Web page is called a hyperlink. This is a commonly used term in web development and refers to a clickable element that allows users to navigate between different web pages or sections within a web page. Hyperlinks are an essential feature of the web as they enable easy and intuitive navigation, allowing users to access different information or resources with just a click.

Submit
19. What type of virus uses computer hosts to reproduce itself?

Explanation

A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, a worm does not require a host program to spread, as it can independently replicate and spread across networks. Worms often exploit security vulnerabilities to infect systems, and once inside, they can consume system resources, slow down networks, and even cause damage or steal sensitive information. Therefore, the correct answer to the question is a worm.

Submit
20. The scrambling of code is known as:

Explanation

Encryption refers to the process of converting data into a form that is unreadable by unauthorized users. It involves using algorithms to scramble the code or data in such a way that it can only be accessed and understood by individuals with the appropriate decryption key. This ensures the confidentiality and security of the information being transmitted or stored. Therefore, encryption is the correct answer as it accurately describes the process of scrambling code to protect it from unauthorized access.

Submit
21. A __________ acts as a security buffer between a company’s private network and all external networks.

Explanation

A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By doing so, it helps protect the private network from unauthorized access, viruses, malware, and other potential threats from the outside world. Firewalls are essential for maintaining the security and integrity of a company's network infrastructure.

Submit
22. The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.

Explanation

The domain name in the given URL is "www.scsite.com". This is because the domain name is the part of the URL that identifies the website or web address. In this case, "www.scsite.com" is the domain name followed by the specific page or directory "dc2003/ch2".

Submit
23. A built-in connection to another related Web page or part of a Web page is called a ____.

Explanation

A built-in connection to another related Web page or part of a Web page is called a hyperlink. A hyperlink is a clickable element on a webpage that allows users to navigate to another webpage or a specific section within the same webpage. It is commonly represented by highlighted text or an image that, when clicked, redirects the user to the linked content.

Submit
24. What type of virus uses computer hosts to reproduce itself?

Explanation

A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms can spread without any human intervention and can replicate themselves across networks, causing damage to computer systems. They can exploit vulnerabilities in operating systems or software to gain access to a host and then use that host to propagate to other computers. Worms are known for their ability to rapidly spread and infect large numbers of computers, making them a significant threat to cybersecurity. The other options listed, such as time bomb, Melissa Virus, and macro virus, are not specifically known for using computer hosts to reproduce themselves.

Submit
25. What is the name of an application program that gathers user information and sends it to someone through the Internet?

Explanation

A spybot is an application program that gathers user information and sends it to someone through the Internet. It is designed to secretly collect data such as personal information, browsing habits, and passwords without the user's knowledge or consent. This information can then be used for malicious purposes, such as identity theft or targeted advertising. Spybots are a type of malware and are often used by hackers or cybercriminals to gain unauthorized access to sensitive information.

Submit
26. The scrambling of code is known as:

Explanation

Encryption refers to the process of converting plaintext into ciphertext, making it unreadable to unauthorized parties. It involves the use of algorithms and keys to scramble the code, ensuring that only authorized individuals with the correct decryption key can access the information. Therefore, encryption is the correct term for the scrambling of code.

Submit
27. When a hard disk crashes, it is an example of a __________ type of computer security threat.

Explanation

When a hard disk crashes, it is considered a technological failure. This type of computer security threat refers to any failure or malfunction in computer hardware or software that can result in the loss of data or the inability to access or use the computer system. In the case of a hard disk crash, it means that the physical or logical components of the hard disk have stopped functioning properly, leading to potential data loss or system failure.

Submit
28. The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.

Explanation

The domain name in the given URL is "www.scsite.com". It is the part of the URL that identifies the specific website or web page that the user wants to access. In this case, "www.scsite.com" is the domain name, and it is followed by additional path information ("/dc2003/ch2") that specifies the specific location or page within the website.

Submit
29. What is the name of an application program that gathers user information and sends it to someone through the Internet?

Explanation

A spybot is an application program that gathers user information and sends it to someone through the Internet. It is designed to secretly collect personal data without the user's knowledge or consent. Unlike a virus, which is a malicious program that can replicate itself and cause harm to a computer system, a spybot focuses on stealing information. A logic bomb is a type of malicious code that is triggered by a specific event or condition, while a security patch is a software update that fixes vulnerabilities in a program or system.

Submit
30. _____ is defined as any crime completed through the use of computer technology.

Explanation

Computer Crimes is the correct answer because it encompasses any criminal activity that is carried out using computer technology. This includes a wide range of offenses such as hacking, identity theft, fraud, and cyberbullying. Computer Crimes can have serious consequences and require specialized knowledge and techniques in order to investigate and prosecute.

Submit
31. Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

Explanation

Piracy best fits the description because it involves the unauthorized copying and distribution of software without the owner's permission. This act is considered illegal and unethical as it infringes upon the intellectual property rights of the software owner. Freeware refers to software that is available for free, shareware refers to software that can be shared and evaluated before purchasing, and public domain refers to software that is not protected by copyright and can be freely used by anyone.

Submit
32. The ethical issue concerned with the correctness of data collected is

Explanation

The ethical issue concerned with the correctness of data collected is "exactness". This means that when collecting data, it is important to ensure that the information is accurate, reliable, and free from errors or biases. This ethical issue emphasizes the importance of maintaining the integrity of data and avoiding any manipulation or misrepresentation of information. It highlights the responsibility of data collectors to gather and report data accurately, ensuring that it reflects the true and factual state of affairs.

Submit
33. When a hard disk crashes, it is an example of a __________ type of computer security threat.

Explanation

When a hard disk crashes, it is considered a technological failure. This means that the failure is caused by a malfunction or breakdown in the technology itself, rather than being the result of criminal activity, civil strife, or a natural hazard. Technological failures can occur due to various reasons such as hardware malfunctions, software errors, or power outages, and they can lead to data loss or system downtime. In the case of a hard disk crash, it typically means that the disk is no longer functioning properly and may need to be replaced or repaired.

Submit
34. The ethical issue that involves who is able to read and use data is

Explanation

The ethical issue that involves who is able to read and use data is access. This refers to the question of who has the right or permission to access and utilize certain data. It raises concerns about fairness, transparency, and potential misuse of information. Access to data should be regulated and controlled to ensure privacy, protect sensitive information, and prevent unauthorized use or exploitation.

Submit
35. Programs that come into a computer system disguised as something else are called

Explanation

A Trojan Horse is a type of program that disguises itself as something harmless or desirable, but once installed, it performs malicious actions on the computer system. Unlike spoofers, loggers, and defacers, which have their own specific purposes, a Trojan Horse is specifically designed to deceive users and gain unauthorized access or cause damage to the system. Therefore, the correct answer is Trojan Horse.

Submit
36. A program that performs a useful task while simultaneously allowing destructive acts is a:

Explanation

A Trojan Horse is a type of malicious software that appears to be legitimate or useful, but actually contains harmful code. It tricks users into downloading or executing it, thereby allowing the attacker to gain unauthorized access to the system or perform destructive acts. Unlike a worm or a virus, a Trojan Horse does not replicate itself but relies on social engineering techniques to deceive users. Therefore, a program that performs a useful task while allowing destructive acts is classified as a Trojan Horse.

Submit
37. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Explanation

A virus is a type of intentionally disruptive program that is designed to spread from program to program or from disk to disk. It can infect and harm computer systems by modifying or deleting files, stealing personal information, or causing other types of damage. Unlike a Trojan horse, which disguises itself as a harmless program, a virus actively replicates and spreads itself. A time-bomb is a type of malware that is programmed to activate at a specific time or date, causing harm to the system. While malware is a general term for any malicious software, a virus specifically refers to a self-replicating program.

Submit
38. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Explanation

A denial of service attack refers to a situation where a website becomes unavailable to its customers due to an overwhelming amount of fake traffic. This can be caused by hackers or malicious individuals who flood the website with an excessive number of requests, making it unable to handle legitimate user traffic. Unlike viruses or Trojan horses which are typically designed to infect and compromise a system, a denial of service attack aims to disrupt the availability of a website by overwhelming its resources.

Submit
39. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

Explanation

A denial of service attack refers to the situation when a website becomes unavailable to its legitimate users due to an overwhelming amount of fake traffic. This fake traffic can be generated by multiple sources simultaneously, making it impossible for the website to handle the load and causing it to crash or become extremely slow. This type of attack is often carried out by hackers or malicious individuals with the intention of disrupting the normal functioning of a website or online service.

Submit
40. What is the most common tool used to restrict access to a computer system?

Explanation

Passwords are the most common tool used to restrict access to a computer system. They provide a layer of security by requiring users to enter a unique combination of characters, known only to them, to gain access. Passwords can be set up for individual user accounts, ensuring that only authorized individuals can log in and access the system. They are widely used due to their simplicity and effectiveness in protecting sensitive information from unauthorized access.

Submit
41. Most computer systems rely solely on ___________ for authentication.

Explanation

Computer systems typically rely on passwords for authentication. Passwords are a common method of verifying the identity of a user and granting access to a system. They provide a level of security by requiring users to enter a unique combination of characters that only they should know. This helps to prevent unauthorized access and protect sensitive information. While other authentication methods like logins, encryption, and lock and key may be used in certain systems, passwords are the most widely used and recognized form of authentication in computer systems.

Submit
42. A __________ acts as a security buffer between a company’s private network and all external networks.

Explanation

A firewall acts as a security buffer between a company's private network and all external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malicious attacks, and data breaches by filtering and blocking potentially harmful traffic. Firewalls can also provide additional security features such as intrusion detection and prevention systems, virtual private network (VPN) support, and network address translation (NAT).

Submit
43. The study of fitting computers to people is called __________.

Explanation

Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems, furniture, and equipment in a way that maximizes efficiency and minimizes discomfort or injury for the user. It involves considering factors such as the user's posture, body mechanics, and workspace layout to create a safe and comfortable environment for computer use.

Submit
44. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

Explanation

Creating strong computer security measures helps protect privacy rights by safeguarding personal information from unauthorized access or theft. Strong security measures such as encryption, firewalls, and secure authentication protocols can prevent hackers or cybercriminals from gaining access to sensitive data, ensuring that individuals' privacy is maintained. By implementing these measures, individuals can have more control over their personal information and reduce the risk of privacy breaches or identity theft.

Submit
45. A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

Explanation

A program that migrates through networks and operating systems and attaches itself to different programs and databases is referred to as a virus. Viruses are malicious software that can replicate and spread themselves by attaching to other files or programs. They can cause harm by corrupting or deleting data, disrupting system functionality, or stealing sensitive information. Unlike worms, which can self-replicate and spread without attaching to other files, viruses rely on host files to propagate. Denial-of-service attacks, on the other hand, aim to overwhelm a system or network with excessive traffic, while "damage" is a broad term that does not specifically describe the behavior of the program mentioned.

Submit
46. A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

Explanation

A program that fills a computer system with self-replicating information thus clogging the system is called worms. Unlike viruses, worms do not need to attach to an existing program or file to spread. They can independently replicate and spread across a network, consuming system resources and causing disruptions. Denial-of-service attacks aim to overwhelm a system with excessive traffic, while damage refers to the harm caused by malicious activities.

Submit
47. Programs that come into a computer system disguised as something else are called

Explanation

A Trojan Horse is a type of malicious program that disguises itself as something else in order to gain access to a computer system. It tricks users into thinking it is a legitimate program or file, but once installed, it can perform harmful actions such as stealing personal information, damaging files, or allowing unauthorized access to the system. Unlike spoofers, loggers, and defacers which may have different objectives, a Trojan Horse specifically focuses on deception and unauthorized access.

Submit
48. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Explanation

A virus is a type of malicious software that is designed to replicate itself and spread from one program or disk to another. It can cause damage to computer systems by corrupting files, stealing personal information, or causing system crashes. Unlike a Trojan horse, which disguises itself as a harmless program, a virus is self-replicating and can spread without the user's knowledge or consent. Therefore, the correct answer is virus.

Submit
49. _____ is defined as any crime completed through the use of computer technology.

Explanation

Computer Crimes is the correct answer because it encompasses any criminal activity that is carried out using computer technology. This includes a wide range of offenses such as hacking, identity theft, fraud, and cyberbullying. Computer Crimes are becoming increasingly prevalent in today's digital age, posing significant threats to individuals, organizations, and even governments. Law enforcement agencies and computer forensic experts play a crucial role in investigating and preventing these crimes, as well as gathering evidence to prosecute offenders.

Submit
50. A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

Explanation

A program that migrates through networks and operating systems and attaches itself to different programs and databases is referred to as a virus. Viruses are malicious software that replicate themselves and spread to other systems, often causing harm by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of a computer. Unlike worms, which can spread independently without attaching to other programs, viruses require a host program to propagate. Denial-of-service attacks and damage, on the other hand, are not specific types of programs but rather actions or outcomes that can be caused by various means, including viruses.

Submit
51. A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

Explanation

A program that fills a computer system with self-replicating information thus clogging the system is called worms. Unlike viruses, which require a host file to attach themselves to, worms are standalone programs that can spread and replicate themselves without the need for a host. They can quickly consume system resources and cause network congestion, leading to system slowdowns or even crashes. Worms are often used by hackers to gain unauthorized access to systems or to disrupt network operations.

Submit
52. What is the most common tool used to restrict access to a computer system?

Explanation

Passwords are the most common tool used to restrict access to a computer system. They provide a layer of security by requiring users to enter a unique combination of characters to gain access. Passwords can be set by individual users or system administrators and are typically kept confidential to ensure that only authorized individuals can log in to the system. By using passwords, access to sensitive information and resources can be controlled, reducing the risk of unauthorized access and potential security breaches.

Submit
53. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

Explanation

A denial-of-service attack refers to the deliberate attempt to overwhelm a computer system or network by flooding it with an excessive amount of requests for information. This flood of requests causes the system to become overloaded and unable to respond to legitimate requests, resulting in a slowdown or complete halt of the system's operations. Unlike viruses, worms, and Trojan Horses which are malicious software designed to infiltrate and damage systems, a denial-of-service attack focuses on disrupting the availability and functionality of the targeted system.

Submit
54. The study of fitting computers to people is called __________.

Explanation

Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems and workspaces in a way that maximizes efficiency, comfort, and safety for the users. This includes considering factors such as posture, lighting, equipment placement, and the overall interaction between humans and technology. By applying ergonomic principles, the aim is to reduce the risk of musculoskeletal disorders and enhance overall productivity and well-being in the workplace.

Submit
55. What can a firewall protect against?

Explanation

A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system from external sources. By implementing authentication measures, such as username and password requirements, a firewall can ensure that only authorized users are able to access the network or system. This helps to prevent potential security breaches and unauthorized access to sensitive information.

Submit
56. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

Explanation

A denial-of-service attack refers to the intentional flooding of a computer system or network with an overwhelming amount of requests for information. This flood of requests exhausts the system's resources, making it unable to respond to legitimate user requests. This attack aims to slow down or completely halt the targeted system or network, disrupting its normal functioning. Unlike viruses, worms, and Trojan Horses, which are malicious software, a denial-of-service attack is a deliberate attempt to disrupt the availability of a computer system or network rather than infect it with harmful code.

Submit
57. Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

Explanation

The term "piracy" refers to the act of copying and distributing software without the permission of the owner. This can include unauthorized sharing of software with friends or others. Freeware refers to software that is available for free, with permission from the owner. Shareware refers to software that is initially provided for free, but with the expectation of payment for continued use. Public domain refers to software that is not protected by copyright and can be freely used and distributed. Therefore, "piracy" is the best fit for the given description.

Submit
58. The issues that deal with the collection and use of data about individuals is

Explanation

The correct answer is privacy. Privacy refers to the protection of personal information and the right of individuals to control the collection, use, and disclosure of their data. It involves ensuring that personal information is kept confidential and used only for the intended purpose. Privacy issues are concerned with preventing unauthorized access to personal data and protecting individuals from potential harm or misuse of their information.

Submit
59. A program that performs a useful task while simultaneously allowing destructive acts is a:

Explanation

A Trojan Horse is a type of malware that appears to be a legitimate program or software but actually contains malicious code. It tricks users into installing it, and once installed, it can perform a useful task to deceive the user while also allowing destructive acts in the background, such as stealing sensitive information, damaging files, or providing unauthorized access to the attacker. Unlike viruses or worms, Trojan Horses do not replicate themselves but rely on social engineering techniques to spread.

Submit
60. The ethical issue that involves who is able to read and use data is

Explanation

Access is the correct answer because the ethical issue being discussed is related to who has the ability to read and use data. Access refers to the permission or authority granted to individuals or entities to access certain data or information. In this context, the ethical concern revolves around determining who should have access to sensitive data, ensuring that it is used appropriately, and preventing unauthorized access or misuse. This issue raises questions about data ownership, control, and the potential for misuse or exploitation.

Submit
61. People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.

Explanation

Hackers are individuals who gain unauthorized access to computers for their own amusement or curiosity, without causing any intentional harm or damage. They may explore systems, find vulnerabilities, and test their skills, but their actions are not malicious in nature. Hackers are often motivated by the challenge of breaking into secure systems and learning about technology. While their activities may be illegal, they do not typically have malicious intent or engage in organized criminal activities like members of organized crimes.

Submit
62. The most common passwords in the U.S. or Britain include all EXCEPT:

Explanation

The given answer is "123" because it is a commonly used password that is easy to guess and lacks complexity. While "love," "Fred," and "God" may also be commonly used passwords, "123" is specifically mentioned as being excluded from the list of common passwords in the U.S. or Britain.

Submit
63. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

Explanation

Creating strong computer security measures helps protect privacy rights by safeguarding personal information and data from unauthorized access, theft, or misuse. It ensures that individuals have control over their personal information and prevents it from being exposed to potential threats or breaches. By implementing robust security measures, such as encryption, firewalls, and secure authentication protocols, individuals can maintain their privacy and confidentiality online.

Submit
64. The issues that deal with the collection and use of data about individuals is

Explanation

Privacy is the correct answer because it refers to the protection and control of personal information and data. The issues surrounding the collection and use of data about individuals often revolve around privacy concerns. This includes ensuring that individuals have the right to control how their data is collected, stored, and used, as well as protecting their sensitive information from unauthorized access or misuse. Privacy is an important aspect when it comes to data collection and usage, and addressing privacy concerns is crucial for maintaining trust and ethical practices in handling personal data.

Submit
65. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

Explanation

A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which is designed to gather information without the user's consent, a virus's primary purpose is to spread and cause harm to the infected system. Firewalls are security measures that monitor and control network traffic, while a Trojan Horse is a malicious program disguised as a legitimate one.

Submit
66. A common way to protect information being sent over a network, when long distance is involved, is

Explanation

Encrypting is a common way to protect information being sent over a network, especially when long distance is involved. Encryption involves converting the original information into a coded form that can only be accessed or understood by authorized parties. This ensures that even if the information is intercepted during transmission, it remains secure and unreadable to unauthorized individuals.

Submit
67. ____ program reads pages on Web sites in order to create an index of hits.

Explanation

A directory program is responsible for reading pages on Web sites in order to create an index of hits. This program typically scans through the content of web pages, extracts relevant information, and organizes it into a searchable index. Unlike a search engine that retrieves search results based on user queries, a directory program focuses on building and maintaining a categorized list of websites or resources.

Submit
68. What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?

Explanation

A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector or document. It is a type of malicious software that can spread and infect other files or systems, causing harm or disruption. Unlike spyware, which is designed to collect information without causing damage, viruses are specifically created to replicate and spread, often with the intention of causing harm or stealing data. Firewalls and Trojan horses are not specifically designed to replicate like viruses do.

Submit
69. HTML viruses infect:

Explanation

HTML viruses are a type of malware that specifically target web pages written in HTML code. These viruses can infect the HTML code of a web page, causing it to become compromised and potentially spread the virus to other computers that visit the infected page. Unlike other types of viruses that directly infect the computer, HTML viruses primarily focus on manipulating the code of web pages. Therefore, the correct answer is that HTML viruses infect a web page in HTML code.

Submit
70. ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

Explanation

WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. These providers offer connectivity through wireless networks, allowing users to access the internet without the need for wired connections. WSPs typically utilize technologies such as Wi-Fi or cellular networks to provide this wireless internet access.

Submit
71. The most common passwords in the U.S. or Britain include all EXCEPT:

Explanation

The given answer is "123" because it is a commonly used and easily guessable password. The other options, "love," "Fred," and "God," may also be popular choices for passwords, but "123" is not included in the list of common passwords in the U.S. or Britain.

Submit
72. A common way to protect information being sent over a network, when long distance is involved, is

Explanation

Encrypting is a common method used to protect information being sent over a network, especially when long distance is involved. Encryption involves converting the data into a coded form that can only be understood by authorized parties who possess the decryption key. This ensures that even if the information is intercepted by unauthorized individuals, they will not be able to decipher the data and gain access to sensitive information. Therefore, encrypting is an effective way to safeguard data during transmission over a network.

Submit
73. In networking, bandwidth refers to

Explanation

Bandwidth in networking refers to the carrying capacity of the transmission media for sending information. It represents the maximum amount of data that can be transmitted over a network in a given amount of time. It is not related to the speed of a modem, the storage capacity of an email account, or the protocols used for internet information. Bandwidth is crucial for determining the efficiency and speed of data transmission on a network.

Submit
74. People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.

Explanation

Hackers are individuals who gain unauthorized access to computers for various reasons, including curiosity, exploration, or the thrill of the challenge. Unlike crackers, who intentionally cause damage or engage in illegal activities, hackers typically do not have malicious intent. They may exploit vulnerabilities in computer systems to gain access but do not intentionally harm or disrupt the systems they infiltrate. Instead, they may seek to understand and learn from the systems, or even help improve their security.

Submit
75. Which statement best describes a worm?

Explanation

A worm is a type of virus that does not attach itself to programs and databases. Unlike other types of viruses, worms are standalone programs that can replicate themselves and spread across computer networks without the need for a host file or program. They often exploit security vulnerabilities to gain access to systems and can cause damage by consuming network bandwidth, slowing down systems, or even shutting down servers. However, they do not typically destroy hard drives or frighten people about nonexistent viruses.

Submit
76. ____ program reads pages on Web sites in order to create an index of hits.

Explanation

A directory program is responsible for reading pages on websites to create an index of hits. It organizes and categorizes the information found on the web pages, making it easier for users to search and find specific content. Unlike a search engine, which uses algorithms to retrieve relevant results based on keywords, a directory program manually selects and categorizes the websites into specific categories or topics. This allows users to browse through the directory and navigate to the desired information more efficiently.

Submit
77. What can a firewall protect against?

Explanation

A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system by blocking login attempts from unknown or unverified sources. By enforcing authentication measures, such as username and password verification, the firewall ensures that only authorized users can access the network or system. This helps to protect against potential security breaches and unauthorized access to sensitive information.

Submit
78. If you want to secure a message, use a(n):

Explanation

A cryptosystem is a combination of cryptographic algorithms and protocols used to secure a message. It includes encryption and decryption methods, as well as key management and authentication processes. By using a cryptosystem, the message can be protected from unauthorized access and ensure confidentiality, integrity, and authenticity. Cryptosystems are designed to provide a secure communication channel between parties and are widely used in various applications such as online banking, secure messaging, and data transmission over the internet.

Submit
79. ___ provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.

Explanation

WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. They offer connectivity through wireless networks, allowing users to access the Internet without the need for wired connections. WSPs typically use technologies like Wi-Fi, cellular networks, or satellite connections to provide wireless Internet access to their customers.

Submit
80. In networking, bandwidth refers to

Explanation

Bandwidth in networking refers to the maximum amount of data that can be transmitted over a network in a given amount of time. It represents the carrying capacity of the transmission media, such as cables or wireless connections, for sending information. It is a measure of how much information can be transmitted in a specific time frame and is usually expressed in bits per second (bps). The higher the bandwidth, the faster the data can be transmitted, allowing for quicker and more efficient communication between devices on the network.

Submit
81. HTML viruses infect:

Explanation

HTML viruses are a type of malware that specifically targets web pages coded in HTML. These viruses exploit vulnerabilities in the HTML code to infect the web page and potentially cause harm to users who visit the infected page. Unlike other types of viruses that infect computer systems directly, HTML viruses primarily focus on compromising the integrity and security of web pages. Therefore, the correct answer is that HTML viruses infect a web page in HTML code.

Submit
82. If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

Explanation

To connect your home computer to your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of internet connection that provides high-speed internet access. A browser is the software that allows you to access and view websites. The correct protocols refer to the set of rules and procedures that govern how data is transmitted over the internet. These protocols ensure that your computer can communicate with the school's website effectively.

Submit
83. The ethical issue concerned with the correctness of data collected is

Explanation

The ethical issue concerned with the correctness of data collected is "exactness". This refers to the accuracy and precision of the data that is being collected. Ensuring that the data is collected and recorded accurately is important for maintaining the integrity of the research or study being conducted. It is unethical to manipulate or alter data to fit a desired outcome, as this can lead to misleading or false conclusions. Therefore, maintaining exactness in data collection is crucial for ethical research practices.

Submit
84. If you want to secure a message, use a(n):

Explanation

A cryptosystem is a method or system used to secure a message by converting it into an unreadable form using encryption techniques. It includes not only the encryption algorithm but also the necessary components such as keys, protocols, and procedures for encryption and decryption. Cryptosystems provide a comprehensive approach to securing messages, ensuring that the information remains confidential and protected from unauthorized access or interception.

Submit
85. If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need

Explanation

To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of internet connection that provides high-speed internet access. A browser is a software application used to access and view websites. The correct protocols are necessary to establish a connection and communicate with the school's website. Therefore, having DSL, a browser, and the correct protocols is essential for accessing the school's website from your home computer.

Submit
86. ____ provide Internet access and have many members-only features that offer a variety of special content and services.

Explanation

OSPs, or Online Service Providers, are entities that provide Internet access and offer various special content and services exclusively to their members. These services can include email, online forums, chat rooms, and access to exclusive content such as news, entertainment, and educational resources. OSPs are different from ISPs (Internet Service Providers) as they focus on providing additional features and content beyond basic Internet connectivity. LANs (Local Area Networks) and Networks are not specifically mentioned in the question and are not directly related to the concept of OSPs.

Submit
87. Which statement best describes a worm?

Explanation

A worm is a type of virus that does not attach itself to programs and databases. Unlike other viruses, worms are standalone programs that replicate and spread across computer networks without needing to attach themselves to existing files or programs. This allows them to quickly and efficiently infect multiple systems and cause damage or disruption.

Submit
88. Web pages that list as the result of a search are called ____.

Explanation

Web pages that appear as results of a search are commonly referred to as "keywords". The term "keywords" is used to describe the specific words or phrases that are entered into a search engine to retrieve relevant web pages. These keywords are matched with the content of various web pages, and the search engine displays a list of web pages that are considered to be the most relevant based on the keywords entered by the user.

Submit
89. Web pages that list as the result of a search are called ____.

Explanation

Web pages that list as the result of a search are typically categorized and displayed based on the presence of relevant keywords. These keywords are the terms or phrases that users enter into a search engine to find specific information. Therefore, the correct answer is "keywords."

Submit
90. Listservers are useful in helping teachers keep up with new ideas by:

Explanation

Listservers are useful in helping teachers keep up with new ideas by automatically sending information to their email box. This means that teachers do not have to actively search for new ideas or services, but rather receive them directly in their email inbox. This saves time and ensures that teachers are constantly updated with the latest information without having to manually check for updates.

Submit
91. Listservers are useful in helping teachers keep up with new ideas by:

Explanation

Listservers are useful in helping teachers keep up with new ideas by automatically sending information to their email box. Listservers are mailing lists that allow subscribers to receive and send messages to a group of people with similar interests or professions. By subscribing to a listserv, teachers can receive updates, announcements, and discussions related to new ideas and resources directly in their email inbox. This allows them to stay informed and up-to-date without having to actively search for information or participate in real-time chats or bulletin boards.

Submit
92. The common name for the crime of stealing passwords is:

Explanation

Spoofing is the act of disguising oneself as someone else or faking information to gain unauthorized access or deceive others. In the context of stealing passwords, spoofing refers to the practice of tricking individuals into revealing their passwords by posing as a legitimate entity or website. This can be done through various means such as phishing emails, fake login pages, or social engineering techniques. Spoofing is a common method used by cybercriminals to gain unauthorized access to sensitive information and is considered a form of identity theft.

Submit
93. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

Explanation

An anti-spammer is a program used to detect unsolicited and unwanted e-mail and prevent those messages from getting to a user's inbox. It is specifically designed to identify and filter out spam emails, which are typically sent in bulk and often contain malicious content or unwanted advertisements. The term "anti-spammer" accurately describes the purpose and function of this program.

Submit
94. What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?

Explanation

The correct answer is "Spam filter." A spam filter is a program that is used to detect and prevent unsolicited and unwanted emails from reaching a user's inbox. It works by analyzing the content and characteristics of incoming emails and determining whether they are spam or legitimate messages. By blocking spam emails, a spam filter helps to reduce the amount of unwanted messages and potential security threats that users receive in their inbox.

Submit
95. The common name for the crime of stealing passwords is:

Explanation

Spoofing is the correct answer because it refers to the act of creating a fake identity or disguising oneself as someone else in order to gain unauthorized access to personal information, including passwords. This can be done through various means such as email spoofing, IP spoofing, or caller ID spoofing. Spoofing is a form of cybercrime that aims to deceive individuals and gain access to their sensitive data without their knowledge or consent.

Submit
96. What type of attack relies on the trusting nature of employees and the art of deception?

Explanation

Social Engineering is the correct answer because it refers to a type of attack that exploits the trusting nature of employees and uses deception to manipulate them into revealing sensitive information or performing actions that compromise security. This can involve tactics such as impersonation, pretexting, or phishing to trick individuals into divulging confidential data or granting unauthorized access to systems.

Submit
97. The majority of computer crimes are committed by:

Explanation

Insiders are the individuals who have authorized access to computer systems or networks within an organization. They are more likely to commit computer crimes because they have knowledge of the system's vulnerabilities and can exploit them without raising suspicion. Insiders may have various motives such as financial gain, revenge, or personal gain. They can easily bypass security measures and leave fewer traces behind, making it difficult to detect their activities. Therefore, insiders are considered a significant threat when it comes to computer crimes.

Submit
98. ____ provide Internet access and have many members-only features that offer a variety of special content and services.

Explanation

OSPs, or Online Service Providers, provide Internet access and have many members-only features that offer a variety of special content and services. These providers typically offer a range of online services such as email, chat rooms, forums, and exclusive content for their subscribers. OSPs are different from ISPs (Internet Service Providers) as they focus more on providing additional services and content rather than just the basic Internet connection. LANs (Local Area Networks) and Networks are not specifically associated with providing Internet access or members-only features, making OSPs the most suitable answer.

Submit
99. The majority of computer crimes are committed by:

Explanation

Insiders are the correct answer because they have authorized access to computer systems and networks, making it easier for them to commit computer crimes without being detected. They may have knowledge of the organization's security measures and vulnerabilities, allowing them to exploit them for personal gain or malicious intent. Additionally, insiders may have a motive such as revenge, financial gain, or espionage, making them more likely to engage in computer crimes compared to hackers, overseas criminals, or young teenage computer geniuses who may not have the same level of access or insider knowledge.

Submit
100. What type of attack relies on the trusting nature of employees and the art of deception?

Explanation

Social engineering is a type of attack that exploits the trusting nature of employees and relies on deception. It involves manipulating individuals into divulging sensitive information or performing actions that can compromise the security of a system. This can be done through various techniques such as impersonation, phishing emails, or pretexting. The goal is to exploit human vulnerabilities rather than technical weaknesses to gain unauthorized access to systems or obtain confidential information.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 29, 2014
    Quiz Created by
    Jscansino
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In the world of computing, the essential element that controls how...
Which of the following is an example of a strong password?
Small files that are deposited on a user’s hard drive when they...
Collecting personal information and effectively posing as another...
___ is the measurement of things such as fingerprints and retinal...
A fraudulent or deceptive act or operation designed to trick...
Which of the following is an example of a strong password?
When you want to transfer files between computers, the best Internet...
Small files that are deposited on a user’s hard drive when they...
A fraudulent or deceptive act or operation designed to trick...
When you want to transfer files between computers, the best Internet...
Collecting personal information and effectively posing as another...
___ is the measurement of things such as fingerprints and retinal...
Most computer systems rely solely on ___________ for authentication.
In the world of computing, the essential element that controls how...
The guidelines for the morally acceptable use of computers in society...
The guidelines for the morally acceptable use of computers in society...
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
The scrambling of code is known as:
A __________ acts as a security buffer between a company’s private...
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
What is the name of an application program that gathers user...
The scrambling of code is known as:
When a hard disk crashes, it is an example of a __________ type of...
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
What is the name of an application program that gathers user...
_____ is defined as any crime completed through the use of computer...
Which of the following would best fit the following description –...
The ethical issue concerned with the correctness of data collected is
When a hard disk crashes, it is an example of a __________ type of...
The ethical issue that involves who is able to read and use data is
Programs that come into a computer system disguised as something else...
A program that performs a useful task while simultaneously allowing...
An intentionally disruptive program that spreads from program to...
When customers of a Web site are unable to access it due to a...
When customers of a Web site are unable to access it due to a...
What is the most common tool used to restrict access to a computer...
Most computer systems rely solely on ___________ for authentication.
A __________ acts as a security buffer between a company’s private...
The study of fitting computers to people is called __________.
Creating strong computer security to prevent computer crime usually...
A program that migrates through networks and operating systems and...
A program that fills a computer system with self-replicating...
Programs that come into a computer system disguised as something else...
An intentionally disruptive program that spreads from program to...
_____ is defined as any crime completed through the use of computer...
A program that migrates through networks and operating systems and...
A program that fills a computer system with self-replicating...
What is the most common tool used to restrict access to a computer...
An attempt to slow down or stop a computer system or network by...
The study of fitting computers to people is called __________.
What can a firewall protect against?
An attempt to slow down or stop a computer system or network by...
Which of the following would best fit the following description –...
The issues that deal with the collection and use of data about...
A program that performs a useful task while simultaneously allowing...
The ethical issue that involves who is able to read and use data is
People who gain unauthorized access to computers for the fun of it,...
The most common passwords in the U.S. or Britain include all EXCEPT:
Creating strong computer security to prevent computer crime usually...
The issues that deal with the collection and use of data about...
What is the name for a program or programming code that replicates by...
A common way to protect information being sent over a network, when...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
HTML viruses infect:
___ provide wireless Internet access to users with wireless modems or...
The most common passwords in the U.S. or Britain include all EXCEPT:
A common way to protect information being sent over a network, when...
In networking, bandwidth refers to
People who gain unauthorized access to computers for the fun of it,...
Which statement best describes a worm?
____ program reads pages on Web sites in order to create an index of...
What can a firewall protect against?
If you want to secure a message, use a(n):
___ provide wireless Internet access to users with wireless modems or...
In networking, bandwidth refers to
HTML viruses infect:
If you want to connect your home computer so that you can view your...
The ethical issue concerned with the correctness of data collected is
If you want to secure a message, use a(n):
If you want to connect your home computer so that you can view your...
____ provide Internet access and have many members-only features that...
Which statement best describes a worm?
Web pages that list as the result of a search are called ____.
Web pages that list as the result of a search are called ____.
Listservers are useful in helping teachers keep up with new ideas by:
Listservers are useful in helping teachers keep up with new ideas by:
The common name for the crime of stealing passwords is:
What do you call a program used to detect unsolicited and unwanted...
What do you call a program used to detect unsolicited and unwanted...
The common name for the crime of stealing passwords is:
What type of attack relies on the trusting nature of employees and the...
The majority of computer crimes are committed by:
____ provide Internet access and have many members-only features that...
The majority of computer crimes are committed by:
What type of attack relies on the trusting nature of employees and the...
Alert!

Advertisement