× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
o
6
6
G
3
c
3
q
3
m
3
j
3
s
2
b
2
j
2
u
2
j
2
New Topic  
Colomboy87 Colomboy87
wrote...
Posts: 486
Rep: 0 0
6 years ago
People who try to access computer systems illegally are called ____________________.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 2] False warnings about viruses that often spread via e-mail and over the Internet are known as ____________________.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 3] A(n) ____________________ is designed to detect, disinfect, and protect computers and networks from viruses like those in the accompanying figure.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 4] A(n) ____________________ is a type of logic bomb that is activated on a particular date.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 5] A(n) ____________________ replaces the program used to start the computer system with an infected version
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 6] A(n) ____________________ is defined as any event or action that could cause loss or damage to computer capabilities.
 
  Fill in the blank(s) with the appropriate word(s).



[Ques. 7] Biometrics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. _________________________
 
  Indicate whether the statement is true or false.



[Ques. 8] The Copyright Act of 1976 established legal use and provided the guidelines that allow educators to use and copy certain copyrighted materials. _________________________
 
  Indicate whether the statement is true or false.



[Ques. 9] Cryptogram is the process of converting readable data into unreadable characters by applying a formula that uses a code as shown in the accompanying figure. _________________________
 
  Indicate whether the statement is true or false.



[Ques. 10] Product registration is an antipiracy technology designed to verify that software products have been licensed legitimately. _________________________
 
  Indicate whether the statement is true or false.
Read 38 times
2 Replies
Replies
Answer verified by a subject expert
KdayKday
wrote...
Posts: 369
Rep: 9 0
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

Colomboy87 Author
wrote...
6 years ago
Thank you for always stepping in by helping me with my homework
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1054 People Browsing
Related Images
  
 1617
  
 222
  
 189