Question types

Start with

Question limit

of 225 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Ctrl+P
  2. online harassment
  4. >
  5. Wi-Fi piggybacking
  1. a Case-Based Critical Thinking Questions

    Case 6-1
    You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing.

    A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____.
    Select one:
    a. cyberterrorism
    b. identity theft
    c. online harassment
    d. cyberstalking
  2. b You may not use the _____ character when creating a folder name.
    Select one:
    a. >
    b. !
    c. @
    d. .
  3. c The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices.
    Select one:
    a. Gold Star
    c. LEED
    d. GreenWare
  4. d All of the following are shortcut keys for either cutting, copying, or pasting EXCEPT _______.
    Select one:
    a. Ctrl+V
    b. Ctrl+P
    c. Ctrl+X
    d. Ctrl+C
  5. e Case-Based Critical Thinking Questions

    Case 6-1
    You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing.

    You live in a 20-unit apartment building. You notice that your wireless Internet seems to run more slowly many evenings, after your upstairs neighbor has come home from work. It is possible you are being subjected to ____.
    Select one:
    a. war driving
    b. Wi-Fi piggybacking
    c. botnetting
    d. a dot con

5 Multiple choice questions

  1. A(n) ____ is designed to authenticate the identity of an individual or organization; it contains the name of the entity, a serial number, an expiration date, and a key pair.
    Select one:
    a. e-vitation
    b. digital certificate
    c. online watermark
    d. authenti-stamp
  2. Magnetic hard drives contain round pieces of metal called _____, which are coated with a magnetizable substance.
    Select one:
    a. platters
    b. cylinders
    c. SSDs
    d. saucers
  3. Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors.
    Select one:
    a. 100
    b. 300
    c. 500
    d. 900
  4. ____ programs are distributed on the honor system.
    Select one:
    a. Malware
    b. Shareware
    c. Freeware
    d. Vaporware
  5. File naming rules differ from folder naming rules _____.
    Select one:
    a. in specifying a different maximum length for file names
    b. in no way; the rules are the same
    c. in the characters that are not allowed
    d. in that two files in different folders may not have the same name

5 True/False questions

  1. NASCase-Based Critical Thinking Questions

    Case 4-1
    Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home.

    Next, Clarice meets with a client who leases two floors in a high-rise downtown. He wants to connect them all to their own network. So Clarice explains the various kinds of ____ he should consider.
    Select one:
    a. WANs
    b. PANs
    c. LANs
    d. MANs


  2. architectureA smart card is the size of a _____.
    Select one:
    a. postage stamp
    b. credit card
    c. sheet of A4 paper
    d. postcard


  3. domain namesAn email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server.
    Select one:
    a. URL
    b. username
    c. password
    d. TLD


  4. bootA ____ is an online personal journal accessible to the public, usually created and updated by one individual.
    Select one:
    a. wiki
    b. blog
    c. podcast
    d. plank


  5. .jpgTo help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____.
    Select one:
    a. .exe
    b. .jpg
    c. .com
    d. .vbs