Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

The term _______ refers to online internet-based illegal acts.

cyber crime

A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network.


Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user... A- Opens a file, B-runs an infected program, C-boots the computer with an infected disk in a disk drive, or D- all of the above.

All of the Above

A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed.


What is it callled when you entice an intruder to hack into a computer on a "Bait Computer"


To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment.

Hardware Theft

One of the more common causes of _____ is an electrical power variation.

System Failure

A momentary overvoltage, called a _____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).


A _____ is the unit of energy a surge protection device can absorb before it can be damaged.


A(n) _____ copies all of the files in a computer.

full backup

Some perpetrators use a technique called _____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.

war driving

A _____ is a small text file that a Web server stores on a user's computer.


_____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information.


Many businesses use _____ to limit employees' Web access.

content filtering

Computer forensics is used by: A-Military Intellegence, B-Insurance Agencies, C-Law Inforcement, or D-All of the Above

All Of The Above

_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.


Symptoms of a user with computer addiction include all of the following except: A-Crraves computer time, B-Is unable to stop computer activity, C-Neglects all friends and family, or D- Is irritable when at the computer.

Is irritable when at the computer

With a(n) _____, users choose which folders and files to include in a backup.

Selective Backup

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording