Question

Question 5 A ____ is a technologically skilled person who uses his or her skills to...

Question 5

  1. A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers.

    a.

    ​cracker

    b.

    ​script kiddie

    c.

    ​whacker

    d.

    ​zombie

1 points

Question 6

  1. A ____ stores items on a server as articles or postings that are sorted by topic.

    a.

    ​newsgroup

    b.

    ​chat

    c.

    ​podcast

    d.

    ​mailing list

1 points

Question 7

  1. A ____-bit key is considered a(n) ____ key.

    a.

    ​64, strong

    b.

    ​128, strong

    c.

    ​128, weak

    d.

    ​256, impervious

1 points

Question 8

  1. A blog often contains ____.

    a.

    ​text and comments

    b.

    ​photographs

    c.

    ​videos

    d.

    ​all of the above

1 points

Question 9

  1. A computer ____ permits traffic to leave and enter a computer.

    a.

    ​terminus

    b.

    ​gatehouse

    c.

    ​packet sniffer

    d.

    ​port

1 points

Question 10

  1. A digital ID is purchased from ____.

    a.

    ​a certificate authority

    b.

    ​your employer

    c.

    ​eBay

    d.

    ​the government

1 points

Question 11

  1. A digital certificate usually contains all of the following EXCEPT ____.

    a.

    ​verification from a trusted third party

    b.

    ​the certificate’s expiration date or validity period

    c.

    ​a keycode that destroys all evidence of the certificate upon use

    d.

    ​the certificate holder’s name, address, and email address

1 points

Question 12

  1. A feed might include ____.

    a.

    ​news topics

    b.

    ​blog updates

    c.

    ​podcasts

    d.

    ​all of the above

1 points

Question 13

  1. A podcast with educational content is sometimes referred to as a ____.

    a.

    ​learncast

    b.

    ​teachcast

    c.

    ​lecturecast

    d.

    ​smartcast

1 points

Question 14

  1. A port may be ____.

    a.

    ​open

    b.

    ​closed

    c.

    ​stealth

    d.

    ​any of the above

1 points

Question 15

  1. A server certificate authenticates ____.

    a.

    ​a web browser

    b.

    ​a website

    c.

    ​individual users

    d.

    ​governmental authorities

1 points

Question 16

  1. A social network is a general term that refers to any community of people who use the Internet to share ____.​

    a.

    ​updates

    b.

    ​business information

    c.

    ​contacts

    d.

    ​any of the above

1 points

Question 17

  1. A web bug can do all of the following EXCEPT:

    a.

    ​identify the last website you visited

    b.

    ​identify your use of the web site containing the web bug

    c.

    ​identify other bugs on the website

    d.

    ​identify your IP address

1 points

Question 18

  1. A web bug is an example of spyware because ____.

    a.

    ​the user is made explicitly aware of its presence and function

    b.

    ​it involves the use and manipulation of cookies

    c.

    ​it is small and unobtrusive

    d.

    ​the clear GIF and its actions are hidden from the user

1 points

Question 19

  1. A web bug works in conjunction with a(n) ____ to obtain information and send it to a third-party.

    a.

    ​active content

    b.

    ​phishing

    c.

    ​adware

    d.

    ​cookie

1 points

Question 20

  1. A(n) ____ attack involves phony email messages that include links to spoofed websites.

    a.

    ​DDoS

    b.

    ​phishing

    c.

    ​DoS

    d.

    ​man-in-the-middle

Homework Answers

Answer #1

5)  cracker
6)  newsgroup
7)  128, strong
8)  ​all of the above
9)  port
10) a certificate authority
11) ​a keycode that destroys all evidence of the certificate upon use
12) ​all of the above
13) learncast
14) ​any of the above
15) a Web site
16) any of the above
17) ​identify other bugs on the website
18) the clear GIF and its actions are hidden from the user
19) cookie
20) phishing


Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li />...
Question 61 ​The tag for creating a numbered list is ____. a. ​<ol> b. ​<li /> c. ​<ul> d. ​<nl> 1 points Question 62 ​The term for a collection of website files stored on a web server is ____. a. ​active website b. ​local website c. ​remote website d. ​plug-in website 1 points Question 63 ​The text editor installed with Windows is called ____. a. ​web pad b. ​MS Sketch c. ​Notebook d. ​Notepad 1 points Question 64 ​The text...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
QUESTION 61 Forum Shopping refers to A. Finding a law more favorable to a party B....
QUESTION 61 Forum Shopping refers to A. Finding a law more favorable to a party B. Finding a jury more favorable to a party C. Finding a way to harass another party D. All of the above 1 points    QUESTION 62 All the following are true, except A. A U.S. treaty must be ratified by two-thirds of the members of Congress B. A convention is a legally binding multi-lateral treaty in a matter of common concern usually on a...
QUESTION 5 What is the most important tool for interest groups seeking to influence election outcomes?...
QUESTION 5 What is the most important tool for interest groups seeking to influence election outcomes? a. lawyers b. public relation c. money d. connections 2 points    QUESTION 6 Third parties have a difficult time winning for all of the following reasons except: a. It is more difficult for third party candidate to get on the ballot b. The lack of proportional representation elections c. Most Texans identify with one of the two major parties d. General election candidates...
QUESTION 5 The ACCOUNT table contains these columns: ACCOUNT_ID NUMBER(12) NEW_BALANCE NUMBER(7,2) PREV_BALANCE NUMBER(7,2) FINANCE_CHARGE NUMBER(7,2)...
QUESTION 5 The ACCOUNT table contains these columns: ACCOUNT_ID NUMBER(12) NEW_BALANCE NUMBER(7,2) PREV_BALANCE NUMBER(7,2) FINANCE_CHARGE NUMBER(7,2) You must create statements to be mailed to all account holders. Each customer's statement must include the account holder's previous balance and finance charge (0.09 of previous balance) in this format: Previous Balance:   5000 &  Finance Charge: 45 Which SELECT statement will produce these results? A. SELECT Previous Balance: || prev_balance || & Finance Charge: || prev_balance * .009   FROM account; B. SELECT 'Previous Balance:'...
QUESTION 1 Physical examination technique is which the nurse uses striking of a part of the...
QUESTION 1 Physical examination technique is which the nurse uses striking of a part of the body with short, sharp taps of the fingers ___________ A) Percussion. B) Palpation. C) Auscultation. D) Inspection. 0.5 points    QUESTION 2 All these equipment should be used in eye assessment except____________ A) Snellen eye chart B) Otoscope C) Penlight D) Opaque card or occluder 0.5 points    QUESTION 3 Common clinical features or Associated Factors with pain include all except__________ A) Skin rash,...
QUESTION 1 Which one of the following would NOT be necessary for an offer to have...
QUESTION 1 Which one of the following would NOT be necessary for an offer to have legal standing? A. The language must reflect the intent to become a party to a contract. B. All of the conditions under which the offer would be terminated must be identified. C. All the significant terms and/or conditions must be contained in the offer. D. The offer must be effectively communicated to the other party. 3 points    QUESTION 2 Which one of the...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
QUESTION 26 Cultural competency in health services is essential because:       of the rapidly increasing immigrant population...
QUESTION 26 Cultural competency in health services is essential because:       of the rapidly increasing immigrant population in America the degree to which disparity exists in health outcomes for minority populations in America lack of cultural competency will ultimately increase costs for the system       all of the above 1 points    QUESTION 27 Which of the following is a CULTURAL argument about the increasing prevalence of obesity as countries become more developed? A. A large or obese body represents a...
QUESTION 11 Either, or both, parties to a contract may be reckless or goofy and still...
QUESTION 11 Either, or both, parties to a contract may be reckless or goofy and still have __________. A. an unenforceable contract. B. contractual capacity C. no preexisting obligations D. voidable options 4 points    QUESTION 12 When either, or both, parties to a contract have no contractual capacity, their contracts are __________. A. void B. valid C. voidable D. executionary 4 points    QUESTION 13 Which one of the following individual's contracts are voidable? A. A five-year old. B....