Professional Documents
Culture Documents
TRUE/FALSE
3. When a hard drive fails, Mac users see what is commonly called the Blue Screen of Death.
4. A hoax involves throwing out “bait” in the form of an email or social media post, in the hopes that a
few users will respond.
5. An identity thief obtains ersonal information from various online and real-world sources.
7. It is possible to avoid being tracked through your browser when shopping online.
8. A username is a unique nine-diget number assigned to each individual in the United States.
11. Pharming is an illicit activity in which you are direted to a fake site to enter personal information.
13. Designing, manufacturing, using, and disposing of electronic products in ways friendly to both people
and the environment is Energy Star computing.
16. Just about every site you visit stores a cookie in your computer’s browser.
19. No legitimate company will ask you for email sign-in or personal information.
20. Service packs sensure that your data is scrambled as it travels between you and its Internet destination.
MODIFIED TRUE/FALSE
1. Internet addiction ithe excessive use of the Internet for gaming, video, Web surfing, etc.
_________________________
3. Magnetic hard drives have no moving partrs and are relatively stable. _________________________
ANS: F
Solid state
solid state
5. The hacker community includes white hat and grey hat hackers. _________________________
ANS: F, black
6. To provide battery backup during a short period, install an unterruptible power system.
_________________________
ANS: F, supply
7. Rootkits collect bits of data, and can change your default home page. _________________________
ANS: F, Spyware
8. A hoax can be an email that warns about a nonexistant virus in order to get you to click a link that
installs malware. _________________________
9. When someone taps into your unprotected Wi-Fi network, it is called Wi-Fi piggybacking.
_________________________
10. Fraud can have a long lasting effect on your credit score. _________________________
MULTIPLE CHOICE
1. RSIs or ____ are caused by performing the same movement over and over again.
a. repetitive strain immersion c. repetitive syndrome injuries
b. repetitive strain injuries d. repetitive stress injuries
ANS: B PTS: 1 REF: 8-2
2. Internet addiction is the excessive use of the Internet for all but which of the following?
a. video c. blogging
b. gaming d. none of the above
ANS: D PTS: 1 REF: 8-2
7. Cloud storage systems have ____ at various online locations that provide additional protection.
a. hackers c. encryption
b. backups d. malware
ANS: B PTS: 1 REF: 8-5
8. The effects of a(n) ____ can include physical damage and a general disruption of regular activities.
a. spam c. war driving
b. phishing d. cyberattack
ANS: D PTS: 1 REF: 8-4
9. Make sure your ____ provider uses strong encryption-based security and has a secure physical
environment.
a. antivirus c. cloud
b. hotspot d. spam
ANS: C PTS: 1 REF: 8-5
12. ___ spread by automatically sending themselves to everyone in your address book.
a. Worms c. Rootkits
b. Viruses d. Spyware
ANS: A PTS: 1 REF: 8-6
13. ____ can lurk undetected in your system, infect it, and spread when you distribute infected files.
a. Spyware c. Viruses
b. Trojan horse d. Worms
ANS: C PTS: 1 REF: 8-6
14. Areas in a wireless network where you can access the Internet are ____.
a. hotspots c. piggybacking
b. trojan horse d. war driving
ANS: A PTS: 1 REF: 8-7
15. When someone taps into your unprotected Wi-Fi network, it is called ____.
a. Wi-Fi war driving c. Wi-Fi hotspot
b. Wi-Fi piggybacking d. Wi-Fi firewall
ANS: B PTS: 1 REF: 8-7
17. Software patches provided by the publisher to fix bugs and enhance performance are ____.
a. wireless packs c. encryption packs
b. service packs d. antivirus packs
ANS: B PTS: 1 REF: 8-8
18. The device that sends the signal to connect your wireless devices to the Internet is ____.
a. wireless router c. wireless software
b. wireless firewall d. none of the above
ANS: A PTS: 1 REF: 8-8
19. ____ ensures that your data is scrambled as it travels between you and its Internet destination.
a. Service packs c. Encryption
b. Firewall d. Passwords
ANS: C PTS: 1 REF: 8-8
20. A secure Web site has ____ at the beginning of the URL.
a. http:// c. ftp://
b. https:// d. hssp://
ANS: B PTS: 1 REF: 8-8
21. Cybercriminals take advantage of flaws in all but which of the following?
a. online banking c. shopping sites
b. email notifications d. wireless networks
ANS: B PTS: 1 REF: 8-9
22. A(n) ____ obtains personal information from various online and real-world sources.
a. rootkit c. ATM
b. identity thief d. electronic wallet
ANS: B PTS: 1 REF: 8-10
23. The numeric score that affectrs your future ability to obtain credit is your ____.
a. credit score c. identity
b. netiquette d. pin number
ANS: A PTS: 1 REF: 8-10
25. School districts often develop policies and guidelines that address ____.
a. social media sharing c. cyberstalking
b. cyberbullying d. cookies
ANS: B PTS: 1 REF: 8-12
26. To avoid being tracked through your browser online, use all but which of the following modes?
a. Incognito c. ImHidden
b. InPrivate d. All of the above
ANS: C PTS: 1 REF: 8-12
27. A(n) ____ is a unique nine-digit number assigned to each individual in the United States.
a. PIN number c. password
b. Social Security number d. username
ANS: B PTS: 1 REF: 8-13
28. A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.
a. ID c. username
b. password d. none of the above
ANS: C PTS: 1 REF: 8-13
29. Which of the following does NOT pose a significant threat to your physical, employment, and
financial security?
a. cyberterrorists c. blogger
b. hackers d. spammers
ANS: C PTS: 1 REF: 8-13
35. Which of the following prives added security by requiring two distinct items for verification?
a. Two-factor authentication c. Two-factor verification
b. Two-step authentication d. All of the above
ANS: D PTS: 1 REF: 8-15
36. An illicit activity in which you are directed to a fake site to enter personal information is ____.
a. phishing c. pharming
b. routing d. all of the above
ANS: C PTS: 1 REF: 8-15
37. Discarded computers, cell phones, and other electronics are considered ____.
a. electronic trash c. e-trash
b. e-waste d. all of the above
ANS: D PTS: 1 REF: 8-15
38. ____, or environmentally friendly, computing and recycling can reduce the environmental impact of
electronic waszte and ultimately reduce costs.
a. Blue c. Yellow
b. Green d. None of the above
ANS: B PTS: 1 REF: 8-15
40. On a secure Web site, a ____ icon may appear in the address bar.
a. bird c. star
b. padlock d. none of the above
ANS: B PTS: 1 REF: 8-8