technology for success

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How is a worm different from a Trojan

A worm spreads through a network whereas a Trojan hides inside another program

which is the first step to deter thieves from accessing your financial information?

DO NOT provide personal info over the phone or through email.

Ransomware to unlock her computer

Isabelle received a message on her computer that appeared to be from the FBI. it stated that she had been locked out of her computer, and needed to pay a fee to retrieve her data. what is happening?

How does encryption work?

It scrambles data as it travels over the internet so hackers cannot access it

what is a digital certificate?

Technology used to verify a user identity.

Ergonomics

The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.

Cyberbullying

after penny broke up with her boyfriend, he text some teammates from the track team about private intimate moments they shared.

What would a password manager allow you to do?

create and store strong passwords

in which real life situation would it be useful to use digital certificate?

if you were signing a rental lease.

you can configure your wireless router to protect your device in all of the following ways EXCEPT

name your router something you'll remember like your street address

with more and more people using technology, what physical health diagnosis on the rise?

repetitive strain jnjury

you can monitor and protect your financial data in all of the following ways EXCEPT

requesting a credit report and freezing your credit.

Phising

the activity of defrauding an online account holder of financial information by posing as a legitimate company. (if a attacker convince you to enter personal information on a imposter website like a employee or bank.)

How can you protect a computer from electric spikes and surges

use a surge protector

Trojan

A program disguised as a harmless application that actually produces harmful results. (Emma downloaded a new game from an unfamiliar website. a few days later Emma realized her system had been hacked & her credit card # was stolen . malware


Ensembles d'études connexes

FVC1 GLOBAL BUSINESS study guide Modules 1-12

View Set

1. Six Divisions of Nervous System

View Set

Prepu: Chapter 5: Growth and Development of the Preschooler

View Set

24. Veřejná obchodní společnost, komanditní společnost

View Set

TopHat chapter 17 Blood Questions

View Set