0% found this document useful (0 votes)
1K views

Business Computing MCQ

This document provides definitions for various cybersecurity and digital privacy terms: - A hacker originally referred to a computer enthusiast but now typically refers to someone who accesses computers illegally. Crackers have a goal of stealing information or destroying data while script kiddies use prewritten hacking programs. - Malware is short for malicious software. Cybercrimes involve illegal online acts like malware distribution or identity theft. Cyberterrorists use the internet to damage computers for political reasons while cyberextortionists demand payment to stop attacks. - Digital security risks can cause loss or damage to devices, hardware, software or data. Examples include viruses, DDoS attacks, and hardware or software theft. Students need to
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Business Computing MCQ

This document provides definitions for various cybersecurity and digital privacy terms: - A hacker originally referred to a computer enthusiast but now typically refers to someone who accesses computers illegally. Crackers have a goal of stealing information or destroying data while script kiddies use prewritten hacking programs. - Malware is short for malicious software. Cybercrimes involve illegal online acts like malware distribution or identity theft. Cyberterrorists use the internet to damage computers for political reasons while cyberextortionists demand payment to stop attacks. - Digital security risks can cause loss or damage to devices, hardware, software or data. Examples include viruses, DDoS attacks, and hardware or software theft. Students need to
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

CHAPTER 5

1. An_________ was originally a complimentary work for a computer


enthusiast.
A.hacker
B.cracker
C.script kiddie
D.cyber extortionist

2. An_______ has a goal of destroying data or stealing information.


hacker
cracker
script kiddie
cyber extortionist

3. Malware is short for ____________ software


A.malignant
B.malicious
C.malevolent
D.malady

4. An ___________ often used prewritten hacking and cracking programs


A.hacker
B.cracker
C.script kiddie
D.cybrextortionist

5. A group of compromised computers connected to a network


A.zombie
B.zonbie army
C.bot
D.malward

6. Refers to online or Internet-based illegal acts such as distribution of


malware or identify theft
A.crime ware
B.cyberterriost
C.cybercrime
D.cyberwarfare

7. Someone who demand payment to stop an attack on an organization's


technology ifrastructure
A.cybercrime
B.cyberterrorist
C.cyperextorinoist
D.cyberwarfare
8. Someone who uses the Internet or network to destroy or damage computer
for political reasons
A.cyberterrorist
B.cyberwarfare
C.cybercrime
D.cyberextortionist

9. Any event or action that could cause loss or damage to computer mobile
device hardware, software, or data
A.computer crime
B.DDoS
C.DOS
D.digital security risk

10.  Which of the following is someone who uses the Internet or network to
destroy or damage computers for political reasons?
A.hacker
B.cyberextortionist
C.cyberterrorist

11. Any illegal activity involving the use of a computer or related device is


referred to as a
A.cybercrime
B.computer crime
C.crime ware

12. Which of these is considered a digital security risk?


A.hardware theft
B.software theft
C.virus attack
D.all of the above

13. A hacker is someone who accesses a computer or network illegally.


A.True
B.False

14. Which of the following describes an attack whose goal is to disabling a


government network to crippling a country?
A.cyberterrorism
B.cyberextortionist
C.cyberwarfare

15. What happens when your digital information gets into the wrong hands?
A.You can get special offers and freebies
B.You can be a victim of hacks, viruses and phishing scams
C.You can use your digital footprint to get a good job
16. How much of the information that we post online can be 100% secure?
A.None
B.About half
C.Nearly all

17. Which is NOT a good way to strengthen your password?


A.Use symbols and numbers
B.Use a name or place that is easy to remember
C.Use upper and lower case letters

18. How can you improve the safety of your device?


A.Log off and lock your device
B.Tell your best friend your password
C.Store your credit card number on a shopping site

19. Why do students need to learn about digital security?


A.To learn how to protect themselves from online threats
B.Because it is required for them
C.To learn how to give personal information out to online users

20. Cyber security involves protecting information and systems from major


cyber threats, such as cyber terrorism, cyber warfare, and cyber espionage.
A.True
B.False

21. A non-self-replicating type of malware program containing malicious code


that, when executed typically causes loss or theft of data, and possible system
harm is a _______
A.Trojan
B.Virus
C.Malware

22. Which of the following options It's unsolicited email that can be used to
send harmful links or deceptive content.
A.Spam
B.Popups
C.Denial of Service (DoS)
D.SYN Flood

23. Ana finds a message on her phone that she thinks might be a scam. She
should:
A.Forward the message to her friends to see if they think it is a scam too.
B.Reply and ask the sender not to send more mail.
C.Delete the message.
24. A ____________ is any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information,
or processing capability
A.data risk
B.digital security risk
C.information risk
D.health risk

25. Choose TWO examples of Malware


A.Denial of Service (DOS)
B.Trojan horse
C.internet scams
D.worm

26. A ________ is a person who uses existing computer scripts or codes to


hack into computers, lacking the expertise to write their own code.
A.Black hat hackers
B.White hat hackers
C.script kiddie
D.Grey hat hackers

27. A _________ an individual who are breaking into a computer or a network


system
A.Ethical hacker
B.cracker
C.scammers
D.Dynamic Denial of Service

28. Which Devices are usually hacked by terrorist?


A.Phones
B.Computer
C.iPads
D.All of the above

29. Which Do you think is worst, cyber terrorism or cyber warfare.


A.Cyber terrorism
B.Cyber warfare
C.They are both good actually.
D.They are equally bad.
CHAPTER 2

2.To use a search engine, you enter a _________.


A. .search term
B. line of code in a web programming language
C. web address
D. URL
E. web routing number
3.The _________ file format is often used for photos and other web images.
A. JPG
B. EPS
C. GIF
D. TIF

4.________ apps are defined as those you download and run directly on the mobile
device.
A. Web-based
B. Marketing
C. Native
D. Interactive
E. Engagement

5.To join a social network, you sign up for a free account and fill out your
_____________.
A. Profile
B. Connections
C. Prompts
D. friends list
6.What is a PageRank for a webpage?
A. the result of a poll taken by users of a webpage
B. a code that helps a search engine find the webpage
C. a formula that rates the importance of a webpage
D. a calculation that shows how many links the webpage contains
E. a code indicating whether the webpage is legitimate or spam

7.When attackers use third-party ads to infect your computer with malware, it is
called _________.
A. Javascripting
B. Spamming
C. third partying
D. phishing
E. malvertising
8.The Internet translates every website name into its exact address, called
a(n)________.
A. Browser
B. IP locator
C. Series
D. broadband address
E. IP address 

9.Information posted publicly, and sometimes privately, is being stored and


analyzed through social media networks.
A. True
B. False

10.Which of the following is not a recommendation for protecting your identity?


A. Know your payment due dates.
B. Shred documents with personal and financial information.
C. Wait for businesses to contact you when their bills are late.
D. Review your credit reports at least once a year.
E. Read credit card and bank statements.

 
11.What is the result of a search that uses the OR operator?
A. it expands the selection
B. it makes the selection more specific
C. it eliminates terms from the search
D. it narrows the selection
E. it introduces a random element in the search
 
12.What is a blog?
A. a webpage that does not accept advertising
B. a webpage members of a group can edit at the same time
C. a website where members share contact information
D. the comments section of a news organization’s website
E. a website organized by blog posts, or individual news stories

 
13.One purpose of a(n) ___________ website is to showcase the creative
talent of the website author.
A. Personal
B. Nonprofit
C. Museum
D. Entertainment
E. art

14.Using the ______________ field in an email message prevents recipients


from seeing that anyone else was copied.
A. blind carbon copy (BCC)
B. private copy (PC)
C. attachment
D. carbon copy (CC)
E. subject
15.When you search from the general to the specific, you are performing a
__________.
A. horizontal search
B. direction search
C. categorical search
D. hierarchical search
E. vertical search


16.Google ___________ let you see just one type of result at a time.
A. search modes
B. search words
C. sorting tools
D. settings
E. menu options

17.Factual headlines are likely to be more credible than sensational


headlines.
A. True
B. False

18.Which of the following is not a news site ranked in the top 10 most popular
news sites?
A. theguardian.com
B. sportsnews.com
C. news.google.com
D. nytimes.com
E. washingtonpost.com

A _____________ acts as a bridge between a Wi-Fi device and the Internet.


cable modem
hotspot
wired access portal (WAP)
smartphone
wireless access point (WAP)
  Question 20
 30 seconds
Q. 
Why should you avoid using “Cincinnati” in a domain name?
answer choices

It is the name of a city.


Only residents of Ohio can use it.
It is the same as a top-level domain name.
It ends with a vowel.
It is often misspelled.
  Question 21
 30 seconds
Q. 
A typical ___________ is 48,000 Hz.
answer choices

resolution
bit rate
horizontal rate
sample rate
audio speed
  Question 22
 30 seconds
 Report an issue
Q. 
What is the best type of website for a paper that requires books and scholarly
articles as resources?
answer choices

a library services website


personal blogs
a website that sells books
websites you find with your favorite general-purpose search engine
news aggregators

You might also like