NAME

Question types


Start with


Question limit

of 225 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Identity theft
  2. the Internet Explorer desktop application
  3. Phishing
  4. Cache
  5. computer sabotage
  1. a Maliciously altering the content of a competitor's commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource.
    Select one:
    a. computer sabotage
    b. Cyberterrorism
    c. cracking
    d. a dot con
  2. b The accompanying figure shows _______.

    Select one:
    a. the Internet Explorer desktop application
    b. the Internet Explorer app
    c. the Windows 8 desktop
    d. a page of search results
  3. c _____ memory is very fast memory circuitry located near the CPU that is used to speed up processing.
    Select one:
    a. ROM
    b. Flash
    c. Cache
    d. ALU
  4. d ____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information.
    Select one:
    a. Spamming
    b. Pharming
    c. Barnstorming
    d. Phishing
  5. e ____ occurs when someone obtains enough information about a person to be able to masquerade as that person.
    Select one:
    a. Spoofing
    b. Pharming
    c. Identity theft
    d. Data theft

5 Multiple choice questions

  1. SMS can transmit up to ____ characters in one message.
    Select one:
    a. 160
    b. 64
    c. 1,024
    d. 256
  2. In the accompanying figure, box _____ represents a status bar.

    Select one:
    a. A
    b. B
    c. C
    d. D
  3. In a File Explorer window, you can tell that a folder is compressed by the _____ icon displayed.
    Select one:
    a. exclamation point
    b. open folder
    c. zipper
    d. empty folder
  4. The latest version of the Windows operating system is ____.
    Select one:
    a. Windows XP
    b. Windows 10
    c. Windows Vista
    d. Windows 8
  5. In the accompanying figure, box _______ provides one-click access to commonly used commands, such as Save, Undo, and Redo.

    Select one:
    a. H
    b. A
    c. K
    d. M

5 True/False questions

  1. busA _____ is an electronic path over which data can travel.
    Select one:
    a. router
    b. bus
    c. redundant array of disks
    d. sluice

          

  2. attachment____ was the predecessor of the Internet.
    Select one:
    a. DRAGnet
    b. ARPANET
    c. APPLENET
    d. TARP-Net

          

  3. Computer chips_____ are very small pieces of semiconducting material that contain integrated circuits.
    Select one:
    a. Motherboards
    b. Computer chips
    c. Optical drives
    d. Expansion slots

          

  4. mobile phonesIP addresses and their corresponding ____ identify computers available through the Internet.
    Select one:
    a. HTML codes
    b. TCP/IP routes
    c. ring topographies
    d. domain names

          

  5. search sitesGoogle, Yahoo!, and Bing are all examples of ____.
    Select one:
    a. social networking software
    b. search sites
    c. third-party cookies
    d. tracking engines

          

Create Set