computer concepts exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Safari accepts cookies and website data from which of the following?

Only from websites you visit

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a ____

cyberattack

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

Human knowledge and ideas that the law protects against unauthorized use by others is considered ______ property

intellectual

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

persistent

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Select three privacy risks associated with cookies.

- Corporate and government entities can track your web behavior. - Websites can track your surfing behavior and create a profile. - Websites using cookies can collect your information and sell it to third parties.

Which three of the following you should consider in the settings area of each browser?

- Deleting cookies - Blocking or customizing your cookie settings - Decide from which sites you want to allow cookies

three functions of session cookies

- Determine the start and end of a session. - Analyze and measure traffic on a web page. - Determine the web browser being used.

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

NAT (Network Address Translation)

First-party cookie

Small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

A type of malware that is triggered each time you boot your computer is called a ____---

rootkit

Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called ________ kiddies

script

Stored in temporary memory, _____ cookies are used to analyze and measure traffic on a web page.

session

The software code of a particular computer virus is called the virus _________.

signature

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber

terrorist

Persistent cookies store information about which two of the following?

user preferences, password and username information

Which three of the following settings can you restrict in the Mac OS?

- Which apps the user can access - Restrict user's access to other people through Game Center, Mail, and Messages - Limit access to specific websites

You can change your Firefox settings to allow you to do which three of the following?

- approve cookies storage requests. - delete stored cookies automatically when you start Firefox. - deny cookie storage requests.

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network _________ Translation provides a type of firewall protection by hiding internal IP addresses

address

If you adjust your cookie settings in Chrome, your cookie settings in Firefox are automatically adjusted to match those of Chrome.

false

Third-party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk

On the Chrome Settings menu, where would you click first to adjust cookie and site data permissions?

advanced

Harming or harassing via information technology and networks in a repeated and deliberate manner is called _____

cyber bullying

International laws on Internet privacy are very similar.

false

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

A virus written in a specific language and placed within a document or spreadsheet is called a _______ virus

macro

Software that illicitly collects information about your Internet surfing habits and behaviors is called________

spyware

In the Settings area of Google Chrome, where would you click first to adjust cookie and site data permissions?

open the advanced menu

Specialized hardware or software that capture packets transmitted over a network are called packet __________-

sniffer

One of the risks with cookies is ___.

websites using cookies can collect your information and sell it to third parties


Set pelajaran terkait

Quality and Performance test 9-13

View Set

Brown v Board Supreme Court Cases review

View Set

Skeletal System: Structure and Function

View Set

BIO 156 Mastering 9 (Ch 5 Part A)

View Set

Biology Chapter 12 Review Questions

View Set

Chapter 4 Accrual Accounting Concepts Orion

View Set