What type of update does not allow a user to refuse or delay security updates? security preventative forced mandatory
9. Zoe wants to use an image file that will allow her to preserve all of the original information. What file format should she use? doc files JPEGS RAW files MP3s
6. Many beginners like to use program autoexposure because the camera sets up everything for them with the exception of 150, white balance, and flash functions. True False
What is the primary function of the Task Manager in Microsoft Windows systems? To install new software To create new user accounts To monitor performance and manage services To update the operating system
II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2
Multiple Choice Question Disk speed is measured by the __ speed. head rotational access
Which of the following elements is part of a database back-end? A. The database for the entire store B. The server hosting the data C. The interface where a user shops and makes selections D. the database management system being used
The first computer program to win the Loebner prize was named Deep Blue. True False
Which of the following is an input control? A Run-to-run check B Reasonableness check C Spooling check D Batch check
The square server puts documents in a queue. print communication file
A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A. Public Key Infrastructure (PKI) B. Certificate Revocation Lists (CRL) C. Trusted Platform Module (TPM) D. Hardware Security Module (HSM)
Which data type would be best for a username field? a. Long text b. Hyperlink c. AutoNumber d. Short text
4. Word can provide help in a variety of ways. If you search for a term in Search box on the top line of the Word screen, which of the following options might be included on the drop-down menu? Select all that apply. 1 point Get Help Actions A full contents list of the Help pages
Question 13 of 15:What level of system and network configuration is required for CUI? (Select the best answer) Moderate confidentiality Advanced confidentiality Basic confidentiality Enhanced confidentiality
Which change is designed to close a security vulneability without affecting other components of an application? a. Patch b. Upgrade c. Rollback d. Installation
What is a loop in programming? A conditional statement A block of code that is executed repeatedly A function definition A data structure
Address Verification System, is a way to increase credit card security. Answers A True B False
Which of the following are common data types in programming? String Boolean Integer All of the above
eventing Unsafe Conditions Elements for correcting unsafe conditions: #1 H3 $\square $ $\square $ Recognize Eliminate or Control Evaluate
22. Our Internal database will be protected by: Closing the program when not in use Daily Back -up Storing the program in the Administrator's home Not applicable