People who try to access computer systems illegally are called ____________________.
Fill in the blank(s) with the appropriate word(s).
[Ques. 2] False warnings about viruses that often spread via e-mail and over the Internet are known as ____________________.
Fill in the blank(s) with the appropriate word(s).
[Ques. 3] A(n) ____________________ is designed to detect, disinfect, and protect computers and networks from viruses like those in the accompanying figure.
Fill in the blank(s) with the appropriate word(s).
[Ques. 4] A(n) ____________________ is a type of logic bomb that is activated on a particular date.
Fill in the blank(s) with the appropriate word(s).
[Ques. 5] A(n) ____________________ replaces the program used to start the computer system with an infected version
Fill in the blank(s) with the appropriate word(s).
[Ques. 6] A(n) ____________________ is defined as any event or action that could cause loss or damage to computer capabilities.
Fill in the blank(s) with the appropriate word(s).
[Ques. 7] Biometrics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. _________________________
Indicate whether the statement is true or false.
[Ques. 8] The Copyright Act of 1976 established legal use and provided the guidelines that allow educators to use and copy certain copyrighted materials. _________________________
Indicate whether the statement is true or false.
[Ques. 9] Cryptogram is the process of converting readable data into unreadable characters by applying a formula that uses a code as shown in the accompanying figure. _________________________
Indicate whether the statement is true or false.
[Ques. 10] Product registration is an antipiracy technology designed to verify that software products have been licensed legitimately. _________________________
Indicate whether the statement is true or false.