
Midterm Exam - Social Issues & Professional Practice
Authored by Alpie Catama
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
The activity of illegally using a computer to access information stored on another computer system or to spread a computer virus.
2.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
The stealing of secrets stored in digital formats or on computers and IT networks.
3.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
Any illegal activities committed through the use of computers and the internet.
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Changing electronic information or signals into a secret code (= system of letters, numbers, or symbols) that people cannot understand or use on normal equipment.
analysis
firewall
hacking
encryption
5.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
A network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Computer programs designed to infiltrate and damage computers without the user's consent.
permissions
phishing
malware
password
7.
FILL IN THE BLANK QUESTION
20 sec • 1 pt
Policy that requires users to change passwords periodically
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?