A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.
Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user... A- Opens a file, B-runs an infected program, C-boots the computer with an infected disk in a disk drive, or D- all of the above.
All of the Above
A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.
What is it callled when you entice an intruder to hack into a computer on a "Bait Computer"
To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment.
A momentary overvoltage, called a _____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
Some perpetrators use a technique called _____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
_____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.
Computer forensics is used by: A-Military Intellegence, B-Insurance Agencies, C-Law Inforcement, or D-All of the Above
All Of The Above
_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Symptoms of a user with computer addiction include all of the following except: A-Crraves computer time, B-Is unable to stop computer activity, C-Neglects all friends and family, or D- Is irritable when at the computer.
Is irritable when at the computer