Student Center
|
Instructor Center
|
Information Center
|
Home
Click-Alongs
Interactive Companion
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Web Summary
Multiple Choice Quiz
Fill in the Blanks
True or False
Click-along
Click-along 9-2
Crossword Puzzle
IT Challenge
Labeling Exercise
IT Word Scramble
Feedback
Help Center
Using Information Technology: A Practical Introduction to Computers and Communications, 5/e
Brian K. Williams
Stacey Sawyer
THE CHALLENGES OF THE DIGITAL AGE: Society & Information Technology Today
Chapter 9 Multiple Choice Quiz
1
Which type of worm or virus is set to go off at a certain date and time?
A)
Logic bomb
B)
Macro virus
C)
Multipartite virus
D)
Trojan horse
E)
None of the above
2
Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work?
A)
File virus
B)
Logic virus
C)
Macro virus
D)
Multipartite virus
E)
None of the above
3
The most common type of computer criminal is a(n)
A)
Cracker
B)
Employee
C)
Hacker
D)
Professional
E)
None of the above
4
The cooperative university/business program to enable high-end users to quickly and reliably move huge amounts of data is:
A)
ICANN
B)
Internet2
C)
NGI
D)
NII
E)
VBNS
5
The group responsible for regulating Internet domain names is:
A)
ICANN
B)
NGI
C)
NII
D)
VBNS
E)
None of the above
6
Incomplete, outdated, or otherwise inaccurate data is called:
A)
Dirty data
B)
Environmental blight
C)
Software bugs
D)
Techno-blight
E)
None of the above
7
Individuals who infiltrate the files of the Social Security Administration are examples of:
A)
Hackers
B)
Information thieves
C)
Professional criminals
D)
Software pirates
E)
White-hat hackers
8
The altering of data so that it is not usable unless the changes are undone is:
A)
Biometrics
B)
Compression
C)
Encryption
D)
Ergonomics
E)
None of the above
9
To avoid information overload, many computer users install software for screening out trivial e-mail messages and cellular calls; this software is called:
A)
Antivirus software
B)
Bozo filters
C)
Encryption software
D)
Intelligent agents
E)
PGP software
10
What problem chemical is found in CRTs in amounts of 4-8 pounds each?
A)
Cadmium
B)
Chromium
C)
Lead
D)
Mercury
E)
Selenium
2002 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.