100% Correct Answers | Latest Version
2024 | Verified
A Kindle eBook reader is an example of a(n) _____ computer? - ✔✔special-purpose
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource? -
✔✔zombie
A _____ is an example of a computer assigned to a special task. - ✔✔Kiosk
A _____ provides content that is accessible on the World Wide Web. - ✔✔Web server
A challenge for companies such as Google and Facebook is building software that can ____ over the next
few years. - ✔✔analyze large amounts of data
A common form of authentication is a ____. - ✔✔Password
A company called ____ provides digital certifications for web transactions. - ✔✔VeriSign
A company may hire a ____ hacker to learn about vulnerabilities in its system. - ✔✔White-hat
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world.
- ✔✔violent, interactive simulated games
A game console relies on a fast _____ to handle the lively animations in a video game. -
✔✔microprocessor
, A popular encryption method used to protect data that travels over a wireless network is ____. -
✔✔WPA
A popular term used to identify devices such as the iPad is _____. - ✔✔Tablet PC
A printer requires a ____ installed on the computer in order to operate. - ✔✔Device Driver
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the
web. - ✔✔SSL
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy. - ✔✔Transparent
A(n) ____ view of data is the way a user thinks about data. - ✔✔Logical
AI applications are ways in which AI methodologies are applied to ____ and provide services. - ✔✔Solves
Problems
All of the following are examples of malware EXCEPT ____. - ✔✔Updates
An Internet-based crime is referred to as a(n) ____ crime. - ✔✔Cyber
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know
that it's not true. - ✔✔Libel
An email with a subject heading "Urgent Security Update" that requests a username and password
followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. - ✔✔Phishing
An icon on your desktop is a component of a ____ interface. - ✔✔graphical user