Business

Which of the following is NOT an example of spyware? A) adware B) Tro

QUESTION Which of the following is NOT an example of spyware? A) adware B) Trojan horse C) browser hijacker D) key logger E) search hijacker   ANSWER Answer: B Explanation: B) Trojan horses are a form of malware, which is malicious software that attacks computer systems. Spyware is software that seeks to harvest confidential information […]

Read full post

Date: September 3rd, 2020

Malware that only targets servers will have the LEAST effect on which

QUESTION Malware that only targets servers will have the LEAST effect on which of the following? A) intranet B) client/server network C) wide area network D) peer-to-peer network E) extranet   ANSWER Answer: D Explanation: D) Malware is malicious software that attacks computer systems. Malware that targets network server computers will not affect peer-to-peer networks, […]

Read full post

Date: September 3rd, 2020

Janet recently received an e-mail from her bank directing her to visit

QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]

Read full post

Date: September 3rd, 2020

What type of network enables communication among employees of a busine

QUESTION What type of network enables communication among employees of a business and specially approved nonemployees via leased lines? A) peer-to-peer network (P2P) B) virtual private network (VPN) C) intranet D) extranet E) local area network (LAN)   ANSWER Answer: D Explanation: D) An extranet is a private intranet that connects internal personnel and selected […]

Read full post

Date: September 3rd, 2020

Which of the following would cloud computing users NOT expect to be pr

QUESTION Which of the following would cloud computing users NOT expect to be protected against? A) malware B) Trojan horses C) cookies D) worms E) crackers   ANSWER Answer: C Explanation: C) Cookies are small text files on a user’s computer that store website information such as login name, password, and preferences. A cookie will […]

Read full post

Date: September 3rd, 2020

Frank is logged in to a new RFID system that allows him to track the e

QUESTION Frank is logged in to a new RFID system that allows him to track the exact location of his company’s products—whether in the warehouse or on the road for delivery. He can see that one shipment of sheetrock is about two miles from the delivery point. What is Frank reviewing? A) customer preference data […]

Read full post

Date: September 3rd, 2020

Ian returned to his Moscow hotel only to discover that his wallet had

QUESTION Ian returned to his Moscow hotel only to discover that his wallet had been pickpocketed on the subway. It’s been gone for hours. While he can replace the traveler’s checks and credit cards, what is Ian most at risk of? A) hackers B) Trojan horses C) identity theft D) spoofing E) pharming   ANSWER […]

Read full post

Date: September 3rd, 2020

Which of the following has put pressure on people with limited skills

QUESTION Which of the following has put pressure on people with limited skills to enhance their education in response to a changing economy? A) bar codes B) QR codes C) shop bots D) communications technology E) robots   ANSWER Answer: E Explanation: E) Robots are automatic devices that perform functions ordinarily performed by human beings. […]

Read full post

Date: September 3rd, 2020

Creating software requires significant time and effort. Developers sho

QUESTION Creating software requires significant time and effort. Developers should be compensated for their work, and their products legally protected from unauthorized sharing. What type of product is NOT protected? A) rentalware B) shareware C) freeware D) commercial software E) public-domain software   ANSWER Answer: E Explanation: E) Public-domain software is not copyrighted. It may […]

Read full post

Date: September 3rd, 2020

Which of the following is NOT a correct pair association? A) computer

QUESTION Which of the following is NOT a correct pair association? A) computer type > microcontroller B) storage > smart card C) horizontal market software > database D) output > touch screen E) input > mouse   ANSWER Answer: D Explanation: D) A touch screen is an input device that translates data into a form […]

Read full post

Date: September 3rd, 2020