QUESTION Which of the following is NOT an example of spyware? A) adware B) Trojan horse C) browser hijacker D) key logger E) search hijacker ANSWER Answer: B Explanation: B) Trojan horses are a form of malware, which is malicious software that attacks computer systems. Spyware is software that seeks to harvest confidential information […]
QUESTION Malware that only targets servers will have the LEAST effect on which of the following? A) intranet B) client/server network C) wide area network D) peer-to-peer network E) extranet ANSWER Answer: D Explanation: D) Malware is malicious software that attacks computer systems. Malware that targets network server computers will not affect peer-to-peer networks, […]
QUESTION Janet recently received an e-mail from her bank directing her to visit the online banking website and reset her password. She was dismayed to realize a week later that someone had accessed her account with her new password and withdrew all the money! What is Janet a victim of? A) unsatisfactory cookies B) spam […]
QUESTION What type of network enables communication among employees of a business and specially approved nonemployees via leased lines? A) peer-to-peer network (P2P) B) virtual private network (VPN) C) intranet D) extranet E) local area network (LAN) ANSWER Answer: D Explanation: D) An extranet is a private intranet that connects internal personnel and selected […]
QUESTION Which of the following would cloud computing users NOT expect to be protected against? A) malware B) Trojan horses C) cookies D) worms E) crackers ANSWER Answer: C Explanation: C) Cookies are small text files on a user’s computer that store website information such as login name, password, and preferences. A cookie will […]
QUESTION Frank is logged in to a new RFID system that allows him to track the exact location of his company’s products—whether in the warehouse or on the road for delivery. He can see that one shipment of sheetrock is about two miles from the delivery point. What is Frank reviewing? A) customer preference data […]
QUESTION Ian returned to his Moscow hotel only to discover that his wallet had been pickpocketed on the subway. It’s been gone for hours. While he can replace the traveler’s checks and credit cards, what is Ian most at risk of? A) hackers B) Trojan horses C) identity theft D) spoofing E) pharming ANSWER […]
QUESTION Which of the following has put pressure on people with limited skills to enhance their education in response to a changing economy? A) bar codes B) QR codes C) shop bots D) communications technology E) robots ANSWER Answer: E Explanation: E) Robots are automatic devices that perform functions ordinarily performed by human beings. […]
QUESTION Creating software requires significant time and effort. Developers should be compensated for their work, and their products legally protected from unauthorized sharing. What type of product is NOT protected? A) rentalware B) shareware C) freeware D) commercial software E) public-domain software ANSWER Answer: E Explanation: E) Public-domain software is not copyrighted. It may […]
QUESTION Which of the following is NOT a correct pair association? A) computer type > microcontroller B) storage > smart card C) horizontal market software > database D) output > touch screen E) input > mouse ANSWER Answer: D Explanation: D) A touch screen is an input device that translates data into a form […]