Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSC FInal Exam Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
22-01-2025
Geschreven in
2024/2025

CSC FInal Exam Questions and Answers

Instelling
Vak

Voorbeeld van de inhoud

CSC FInal Exam Questions and Answers

computer forensics - Correct Answers-Using technology to search for computer
evidence of a crime

computer crime - Correct Answers-any illegal act involving a computer

cyber stalking - Correct Answers-a form of harassment that takes place on the internet

identity theft - Correct Answers-the co-option of another person's personal information
(e.g., name, social security number, credit card number, passport) without that person's
knowledge and the fraudulent use of such knowledge

social engineering - Correct Answers-slang for the use of deception to get individuals to
reveal sensitive information

spoofing - Correct Answers-a process used to steal passwords online through deception

malware - Correct Answers-Malicious software that enters a computer system without
the owner's knowledge or consent.

virus - Correct Answers-a software program capable of reproducing itself and usually
capable of causing great harm to files or other programs on the same computer

macro viruses - Correct Answers-attach to data files and take advantage of application
macros

worms - Correct Answers-A program that uses computer host to reproduce itself

Trojan Horse - Correct Answers-A program that performs a useful task while at the
same time carrying out some secret destructive act. A form of software sabotage.

logic bomb - Correct Answers-A program designed to attack in response to a particular
logical event or sequence of events. A type of software sabotage.

time bomb - Correct Answers-a logic bomb that is triggered by a time related event

spy ware - Correct Answers-Technology that collects information from computer users
without their knowledge or consent.

tracking software - Correct Answers-a spyware application program, also called a
spybot, that gathers user information and communicates it to an outsider via the internet

, drive-by downloads - Correct Answers-a spyware download onto your computer that
occurs simply by visiting certain Web sites

antivirus programs - Correct Answers-A type of software designed to search for viruses,
notify users when they are found, and remove them from infected disks or files.

hackers - Correct Answers-Electronic trespassing and vandalism. Also used as slang
for programming.

crackers - Correct Answers-hacker who engages in criminal activity

zombie computers - Correct Answers-An internet connected computer that has been
hijacked using viruses or other tools to perform malicious acts without the knowledge of
their owners and users

computer security - Correct Answers-Protecting computer systems and the information
they contain against unwanted access, damage, modification, or destruction.

smart card - Correct Answers-A card that looks like a standard credit card but features
an embedded microprocessor and memory instead of magnetic strip

biometrics - Correct Answers-measurements of individual body characteristics, such as
a voiceprint or fingerprint

access- control software - Correct Answers-Software that only allows user access
according to the user's needs. Some users can open files that are only related to their
work. Some users are allowed read-only access to files they can see but not change.

system development lifecycle (SDLC) - Correct Answers-A sequence of seven steps or
phases through which an information system passes between the time the system is
conceived and the time it is phased out.

artificial intelligence - Correct Answers-The field of computer science devoted to making
computers perceive, reason, and act in ways that have, until now, been reserved for
human beings.

turing test - Correct Answers-A way to test machine intelligence.

parallel processing - Correct Answers-Using multiple processors to divide jobs into
pieces and work simultaneously on the pieces.

heuristic - Correct Answers-A rule of thumb.

brute force searching - Correct Answers-an exhaustive searching technique where the
computer rapidly repeats a simple operation until the correct answer is found

Geschreven voor

Vak

Documentinformatie

Geüpload op
22 januari 2025
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
EXAMHAVEN

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
EXAMHAVEN Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
2
Documenten
1595
Laatst verkocht
4 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen