× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
w
3
w
3
e
3
3
r
3
b
2
M
2
V
2
f
2
c
2
c
2
K
2
New Topic  
katielc23 katielc23
wrote...
Posts: 623
Rep: 0 0
6 years ago
You discover that your computer's boot program is infected. Which of the following solutions should you try?
 
  a. rescue disc
  c. virus hoax
  b. antivirus program
  d. vaccine



[Ques. 2] You discover that the computer has limited resources and shuts down frequently. Which of the following viruses might your computer have?
 
  a. file
  c. worm
  b. Trojan horse
  d. boot



[Ques. 3] An Acceptable Use Policy (AUP) is a set of rules that governs the use of school and school district computers, networks, and the Internet by teachers, administrators, staff, and students. Briefly describe guidelines that many AUPs contain.
 
  What will be an ideal response?



[Ques. 4] Briefly describe encryption, as shown in the accompanying figure, and tell why a school might need to use it.
 
  What will be an ideal response?



[Ques. 5] Software piracy  the unauthorized and illegal duplication of copyrighted software  is by far the most common form of software theft. When you purchase software, you actually do not own the software; instead, you have purchased the right to use the software, as outlined in the software license. Briefly describe the characteristics of the following type of software license: single-user, multiple-user, network license, and community/state license.
 
  What will be an ideal response?



[Ques. 6] ____________________ is a health-related condition with symptoms including sore, tired, burning, itching, or dry eyes.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 7] A(n) ____________________ program attempts to remove spam before it reaches your inbox.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 8] ____________________ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 9] Moral guidelines that govern the use of computers and information systems are called ____________________.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 10] Storing backup copies at another location, called a(n) ____________________, is an additional precaution often overlooked by schools and home users.
 
  Fill in the blank(s) with the appropriate word(s).
Read 53 times
2 Replies
Replies
Answer verified by a subject expert
cats123cats123
wrote...
Posts: 371
Rep: 4 0
6 years ago
Sign in or Sign up in seconds to unlock everything for free
This verified answer contains over 520 words.
1

Related Topics

katielc23 Author
wrote...
6 years ago
I just wanted to write to say thanks a bunch for the answer!
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  582 People Browsing
Related Images
  
 557
  
 397
  
 908
Your Opinion
Which of the following is the best resource to supplement your studies:
Votes: 365