The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
When you want to transfer files between computers, the best Internet...
If you want to connect your home computer so that you can view your...
What do you call a program used to detect unsolicited and unwanted...
What type of attack relies on the trusting nature of employees and the...
Small files that are deposited on a user’s hard drive when they...
Which of the following is an example of a strong password?
Creating strong computer security to prevent computer crime usually...
The guidelines for the morally acceptable use of computers in society...
___ provide wireless Internet access to users with wireless modems or...
What can a firewall protect against?
Collecting personal information and effectively posing as another...
An intentionally disruptive program that spreads from program to...
The ethical issue concerned with the correctness of data collected is
In networking, bandwidth refers to
HTML viruses infect:
What is the most common tool used to restrict access to a computer...
A fraudulent or deceptive act or operation designed to trick...
A __________ acts as a security buffer between a company’s private...
When you want to transfer files between computers, the best Internet...
Which of the following is an example of a strong password?
The most common passwords in the U.S. or Britain include all EXCEPT:
Which of the following would best fit the following description...
Which of the following would best fit the following description –...
Web pages that list as the result of a search are called ____.
A built-in connection to another related Web page or part of a Web...
What type of virus uses computer hosts to reproduce itself?
When customers of a Web site are unable to access it due to a...
The scrambling of code is known as:
If you want to secure a message, use a(n):
Small files that are deposited on a user’s hard drive when they...
Most computer systems rely solely on ___________ for authentication.
In the world of computing, the essential element that controls how...
The ethical issue that involves who is able to read and use data is
Programs that come into a computer system disguised as something else...
A built-in connection to another related Web page or part of a Web...
Most computer systems rely solely on ___________ for authentication.
The guidelines for the morally acceptable use of computers in society...
When a hard disk crashes, it is an example of a __________ type of...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
___ is the measurement of things such as fingerprints and retinal...
An attempt to slow down or stop a computer system or network by...
Collecting personal information and effectively posing as another...
What is the name of an application program that gathers user...
A __________ acts as a security buffer between a company’s private...
____ provide Internet access and have many members-only features that...
A program that migrates through networks and operating systems and...
When a hard disk crashes, it is an example of a __________ type of...
The issues that deal with the collection and use of data about...
The ethical issue concerned with the correctness of data collected is
A fraudulent or deceptive act or operation designed to trick...
_____ is defined as any crime completed through the use of computer...
Which statement best describes a worm?
The domain name in the URL https://www.scsite.com/dc2003/ch2 is ____.
The scrambling of code is known as:
What is the name of an application program that gathers user...
People who gain unauthorized access to computers for the fun of it,...
A program that fills a computer system with self-replicating...
A common way to protect information being sent over a network, when...
___ is the measurement of things such as fingerprints and retinal...
What is the most common tool used to restrict access to a computer...
The issues that deal with the collection and use of data about...
People who gain unauthorized access to computers for the fun of it,...
Programs that come into a computer system disguised as something else...
A program that performs a useful task while simultaneously allowing...
A program that performs a useful task while simultaneously allowing...
An intentionally disruptive program that spreads from program to...
When customers of a Web site are unable to access it due to a...
Creating strong computer security to prevent computer crime usually...
The study of fitting computers to people is called __________.
The majority of computer crimes are committed by:
What type of virus uses computer hosts to reproduce itself?
An attempt to slow down or stop a computer system or network by...
Listservers are useful in helping teachers keep up with new ideas by:
The study of fitting computers to people is called __________.
The ethical issue that involves who is able to read and use data is
A program that migrates through networks and operating systems and...
A common way to protect information being sent over a network, when...
What can a firewall protect against?
___ provides wireless Internet access to users with wireless modems or...
The most common passwords in the U.S. or Britain include all EXCEPT:
_____ is defined as any crime completed through the use of computer...
A program that fills a computer system with self-replicating...
In networking, bandwidth refers to
In the world of computing, the essential element that controls how...
____ program reads pages on Web sites in order to create an index of...
What is the name for a program or programming code that replicates by...
HTML viruses infect:
The common name for the crime of stealing passwords is:
If you want to connect your home computer so that you can view your...
Listservers are useful in helping teachers keep up with new ideas by:
If you want to secure a message, use a(n):
Which statement best describes a worm?
The common name for the crime of stealing passwords is:
____ provides Internet access and have many members-only features that...
Web pages that list as the result of a search are called ____.
What type of attack relies on the trusting nature of employees and the...
What do you call a program used to detect unsolicited and unwanted...
The majority of computer crimes are committed by: