In the world of computing, the essential element that controls how...
Which of the following is an example of a strong password?
Small files that are deposited on a user’s hard drive when they...
Collecting personal information and effectively posing as another...
___ is the measurement of things such as fingerprints and retinal...
A fraudulent or deceptive act or operation designed to trick...
Which of the following is an example of a strong password?
When you want to transfer files between computers, the best Internet...
Small files that are deposited on a user’s hard drive when they...
A fraudulent or deceptive act or operation designed to trick...
When you want to transfer files between computers, the best Internet...
Collecting personal information and effectively posing as another...
___ is the measurement of things such as fingerprints and retinal...
Most computer systems rely solely on ___________ for authentication.
In the world of computing, the essential element that controls how...
The guidelines for the morally acceptable use of computers in society...
The guidelines for the morally acceptable use of computers in society...
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
The scrambling of code is known as:
A __________ acts as a security buffer between a company’s private...
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
What is the name of an application program that gathers user...
The scrambling of code is known as:
When a hard disk crashes, it is an example of a __________ type of...
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
What is the name of an application program that gathers user...
_____ is defined as any crime completed through the use of computer...
Which of the following would best fit the following description –...
The ethical issue concerned with the correctness of data collected is
When a hard disk crashes, it is an example of a __________ type of...
The ethical issue that involves who is able to read and use data is
Programs that come into a computer system disguised as something else...
A program that performs a useful task while simultaneously allowing...
An intentionally disruptive program that spreads from program to...
When customers of a Web site are unable to access it due to a...
When customers of a Web site are unable to access it due to a...
What is the most common tool used to restrict access to a computer...
Most computer systems rely solely on ___________ for authentication.
A __________ acts as a security buffer between a company’s private...
The study of fitting computers to people is called __________.
Creating strong computer security to prevent computer crime usually...
A program that migrates through networks and operating systems and...
A program that fills a computer system with self-replicating...
Programs that come into a computer system disguised as something else...
An intentionally disruptive program that spreads from program to...
_____ is defined as any crime completed through the use of computer...
A program that migrates through networks and operating systems and...
A program that fills a computer system with self-replicating...
What is the most common tool used to restrict access to a computer...
An attempt to slow down or stop a computer system or network by...
The study of fitting computers to people is called __________.
What can a firewall protect against?
An attempt to slow down or stop a computer system or network by...
Which of the following would best fit the following description –...
The issues that deal with the collection and use of data about...
A program that performs a useful task while simultaneously allowing...
The ethical issue that involves who is able to read and use data is
People who gain unauthorized access to computers for the fun of it,...
The most common passwords in the U.S. or Britain include all EXCEPT:
Creating strong computer security to prevent computer crime usually...
The issues that deal with the collection and use of data about...
What is the name for a program or programming code that replicates by...
A common way to protect information being sent over a network, when...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
HTML viruses infect:
___ provide wireless Internet access to users with wireless modems or...
The most common passwords in the U.S. or Britain include all EXCEPT:
A common way to protect information being sent over a network, when...
In networking, bandwidth refers to
People who gain unauthorized access to computers for the fun of it,...
Which statement best describes a worm?
____ program reads pages on Web sites in order to create an index of...
What can a firewall protect against?
If you want to secure a message, use a(n):
___ provide wireless Internet access to users with wireless modems or...
In networking, bandwidth refers to
HTML viruses infect:
If you want to connect your home computer so that you can view your...
The ethical issue concerned with the correctness of data collected is
If you want to secure a message, use a(n):
If you want to connect your home computer so that you can view your...
____ provide Internet access and have many members-only features that...
Which statement best describes a worm?
Web pages that list as the result of a search are called ____.
Web pages that list as the result of a search are called ____.
Listservers are useful in helping teachers keep up with new ideas by:
Listservers are useful in helping teachers keep up with new ideas by:
The common name for the crime of stealing passwords is:
What do you call a program used to detect unsolicited and unwanted...
What do you call a program used to detect unsolicited and unwanted...
The common name for the crime of stealing passwords is:
What type of attack relies on the trusting nature of employees and the...
The majority of computer crimes are committed by:
____ provide Internet access and have many members-only features that...
The majority of computer crimes are committed by:
What type of attack relies on the trusting nature of employees and the...