How can we help?

You can also find more resources in our Help Center.

Mr. Campbell's 7th Grade Technology Exam Study Guide (Exact Questions)

The term _______ refers to online internet-based illegal acts.
cyber crime
A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.
Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user... A- Opens a file, B-runs an infected program, C-boots the computer with an infected disk in a disk drive, or D- all of the above.
All of the Above
A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.
What is it callled when you entice an intruder to hack into a computer on a "Bait Computer"
To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment.
Hardware Theft
One of the more common causes of _____ is an electrical power variation.
System Failure
A momentary overvoltage, called a _____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
A _____ is the unit of energy a surge protection device can absorb before it can be damaged.
A(n) _____ copies all of the files in a computer.
full backup
Some perpetrators use a technique called _____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
war driving
A _____ is a small text file that a Web server stores on a user's computer.
_____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
Many businesses use _____ to limit employees' Web access.
content filtering
Computer forensics is used by: A-Military Intellegence, B-Insurance Agencies, C-Law Inforcement, or D-All of the Above
All Of The Above
_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Symptoms of a user with computer addiction include all of the following except: A-Crraves computer time, B-Is unable to stop computer activity, C-Neglects all friends and family, or D- Is irritable when at the computer.
Is irritable when at the computer
With a(n) _____, users choose which folders and files to include in a backup.
Selective Backup