Skip to content
AnsweringExams.Com
  • Home
  • Contact Us / Report Error
  • Disclaimer

Computer Mcqs

___________refers to electronic trespassing or criminal hacking?

August 9, 2021June 10, 2017 by QuizMaster

___________refers to electronic trespassing or criminal hacking?

A. Cracking
B. Jacking
C. Spoofing
D. Smarming

Categories Computer Mcqs

__________is defined as any crime completed through the use of computer technology?

August 9, 2021June 9, 2017 by QuizMaster

__________is defined as any crime completed through the use of computer technology?

A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking

Categories Computer Mcqs

To prevent the loss of data during power failures, use a(n)_____________?

August 9, 2021June 9, 2017 by QuizMaster

To prevent the loss of data during power failures, use a(n)_____________?

A. Encryption program
B. Surge protector
C. Firewall
D. UPS

Categories Computer Mcqs

The scrambling of code is known as___________?

August 9, 2021June 9, 2017 by QuizMaster

The scrambling of code is known as___________?

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing

Categories Computer Mcqs

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

August 9, 2021June 9, 2017 by QuizMaster

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall

Categories Computer Mcqs

What is the most common tool used to restrict access to a computer system?

August 9, 2021June 9, 2017 by QuizMaster

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software

Categories Computer Mcqs

____________is the measurement of things such as fingerprints and retinal scans used for security access?

August 9, 2021June 9, 2017 by QuizMaster

____________is the measurement of things such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery

Categories Computer Mcqs

What is the name of an application program that gathers user information and sends it to someone through the Internet?

August 9, 2021June 7, 2017 by QuizMaster

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus
B. Spybot
C. Logic bomb
D. Security patch

Categories Computer Mcqs

When a logic bomb is activated by a time-related event, it is known as a____________?

August 9, 2021June 7, 2017 by QuizMaster

When a logic bomb is activated by a time-related event, it is known as a____________?

A. Time-related bomb sequence.
B. Virus.
C. Time bomb.
D. Trojan horse.

Categories Computer Mcqs

The thing that eventually terminates a worm virus is a lack of:

August 9, 2021June 7, 2017 by QuizMaster

The thing that eventually terminates a worm virus is a lack of:

A. Memory or disk space.
B. Time.
C. CD drives space.
D. CD-RW.

Categories Computer Mcqs
Older posts
Newer posts
← Previous Page1 … Page104 Page105 Page106 … Page122 Next →
© 2026 AnsweringExams.Com • Built with GeneratePress