Software that is provided at no cost to a user by an individual or company is called ____.
a.
shareware
b.
freeware
c.
limited use software
d.
all of the above
[Ques. 2] Software that is distributed free for a trial use period is called ____.
a.
shareware
b.
freeware
c.
limited use software
d.
all of the above
[Ques. 3] An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____.
a.
product activation
b.
software activation
c.
software verification
d.
product verification
[Ques. 4] Software licenses like the one in the accompanying figure are agreements that ____.
a. provide specific conditions for use of the software
b. users must accept before using the software
c. outline the rights to use the software
d. all of the above
[Ques. 5] The most common type of software theft is ____.
a.
stealing a CD
b.
stealing a flash drive
c.
software piracy
d.
all of the above
[Ques. 6] A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network is called a(n) ____.
a.
proxy
b.
firewall
c.
blocker
d.
defender
[Ques. 7] Any item that you must carry to gain access to a computer or computer facility is called a(n) ____.
a.
proxy object
b.
possessed object
c.
access object
d.
smart object
[Ques. 8] All of the following are tips for creating passwords EXCEPT ____.
a.
join two words together
b.
use a close relative or your child's name
c.
choose words from other languages
d.
use a combination of letters and numbers
[Ques. 9] ____ is the use of a computer or data for unapproved or possibly illegal activities.
a.
Access control
b.
Unauthorized use
c.
Unauthorized access
d.
Biometic trespass
[Ques. 10] ___ is the use of a computer system without permission.
a.
Access controls
b.
Unauthorized use
c.
Unauthorized access
d.
Biometric trespass