CSC 101 Module 6 Exam Questions and Answers All Correct
5 views 0 purchase
Course
CSC 101
Institution
CSC 101
CSC 101 Module 6 Exam Questions and Answers All Correct
Why is it not safe to connect to public Wi-Fi networks?
A) Because these networks are rarely protected
B) Because they do not allow Internet access
C) Because the connection is often too slow
D) Because it can weaken your own Wi-...
CSC 101 Module 6 Exam Questions
and Answers All Correct
Why is it not safe to connect to public Wi-Fi networks?
A) Because these networks are rarely protected
B) Because they do not allow Internet access
C) Because the connection is often too slow
D) Because it can weaken your own Wi-Fi wireless router - Answer ✔ A:Because these
networks are rarely protected
With more and more people using technology, what physical health diagnosis is on the
rise?
A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction - Answer ✔ C:repetitive strain injury
You can monitor and protect your financial data in all of the following ways EXCEPT
_____.
A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements. D) Throwing financial
documents older than three months in the trash. - Answer ✔ B:Requesting a credit
report and freezing your credit.
How does discarding computers in a landfill affect the environment?
A) Data miners are digging up landfills looking for gold and platinum.
B) Lead and mercury in computer parts are seeping into the ground and water supply.
C) Copper on circuit boards is creating fire hazards.
D) The computer parts quickly decay and become organic material - Answer ✔ B:Lead
and mercury in computer parts are seeping into the ground and water supply.
How does encryption work?
A) It scrambles the information until the key is used to unscramble it.
B) It protects data on your hard drive,but once you choose to send it to someone,it is no
longer protected.
C) It is a key that you insert into your computer to unlock your saved files.
D) It is what happens when you download attachments from your email. - Answer ✔ A:It
scrambles the information until the key is used to unscramble it.
, How is a worm different from a Trojan?
A) A worm reproduces itself on the same computer,whereas a Trojan attempts to
spread through the network.
B) A worm gathers information and transmits to a server,whereas a Trojan hides and
then spreads through a network.
C) A worm spreads through a network,whereas a Trojan hides inside another program.
D) A worm prevents a device from functioning until a ransom is paid,whereas a Trojan
gathers information and transmits it to another device. - Answer ✔ C:A worm spreads
through a network, whereas a Trojan hides inside another program.
_____ ensures that the person requesting access to a computer is not an imposter.
A) Data mining
B) Authentication
C) Encryption
D) Automatic encoding - Answer ✔ B:Authentication
After Penny broke up with her boyfriend, he texted some teammates from the track
team about some private and intimate moments he and Penny had shared while they
were dating. He even lied about their breakup, creating rumors about her behavior.
Penny started getting inappropriate looks and advances from the team whenever she
was at practice and felt completely humiliated. Penny is a victim of ________.
A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining - Answer ✔ B:cyberbullying
Cassidy is a medical assistant in a hospital and has access to many medical files. When
she brings patients to the examining room, she can be observed swiping a card, typing
in a password, and staring into what appears to be a camera, all attached to the
computer. After completing her check-in, Cassidy leaves the patient in the examining
room waiting on the doctor. It is important that she logs out of the system so the patient
does not have access to the information stored in the hospital's database. Based on
Cassidy's actions what systems do you think the hospital has in place to protect the
patient medical records?
A) Digital certificates
B) Two factor authentication
C) Biometrics
D) Encryption - Answer ✔ C:Biometrics
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.