× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
z
4
n
4
t
4
k
3
x
3
r
3
m
3
j
3
c
3
l
3
e
3
s
2
New Topic  
callie callie
wrote...
Posts: 627
Rep: 1 0
6 years ago
Software that is provided at no cost to a user by an individual or company is called ____.
 
  a.
  shareware
  b.
  freeware
 
  c.
  limited use software
  d.
  all of the above



[Ques. 2] Software that is distributed free for a trial use period is called ____.
 
  a.
  shareware
  b.
  freeware
 
  c.
  limited use software
  d.
  all of the above



[Ques. 3] An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____.
 
  a.
  product activation
  b.
  software activation
 
  c.
  software verification
  d.
  product verification



[Ques. 4] Software licenses like the one in the accompanying figure are agreements that ____.
 
  a. provide specific conditions for use of the software
  b. users must accept before using the software
  c. outline the rights to use the software
  d. all of the above



[Ques. 5] The most common type of software theft is ____.
 
  a.
  stealing a CD
  b.
  stealing a flash drive
 
  c.
  software piracy
  d.
  all of the above



[Ques. 6] A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network is called a(n) ____.
 
  a.
  proxy
  b.
  firewall
 
  c.
  blocker
  d.
  defender



[Ques. 7] Any item that you must carry to gain access to a computer or computer facility is called a(n) ____.
 
  a.
  proxy object
  b.
  possessed object
 
  c.
  access object
  d.
  smart object



[Ques. 8] All of the following are tips for creating passwords EXCEPT ____.
 
  a.
  join two words together
  b.
  use a close relative or your child's name
 
  c.
  choose words from other languages
  d.
  use a combination of letters and numbers



[Ques. 9] ____ is the use of a computer or data for unapproved or possibly illegal activities.
 
  a.
  Access control
  b.
  Unauthorized use
 
  c.
  Unauthorized access
  d.
  Biometic trespass



[Ques. 10] ___ is the use of a computer system without permission.
 
  a.
  Access controls
  b.
  Unauthorized use
 
  c.
  Unauthorized access
  d.
  Biometric trespass
Read 59 times
3 Replies
Replies
Answer verified by a subject expert
xojohndoe69xojohndoe69
wrote...
Posts: 373
Rep: 4 0
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

callie Author
wrote...
6 years ago
Smiling Face with Open Mouth that's the expression my face made when I got the notification email
wrote...
6 years ago
glad I put that smile on your face Happy Dummy
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  481 People Browsing
Related Images
  
 1781
  
 1005
  
 310
Your Opinion
Which of the following is the best resource to supplement your studies:
Votes: 365