• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE COMPUTERS AND STUDY GAMES ABOUT CCS M8

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE COMPUTERS AND STUDY GAMES ABOUT CCS M8

EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -99 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: A system ________ is the prolonged malfunction of a computer

Answer:

FAILURE

Question 2: TRUE or FALSE: Many companies use access controls to minimize the chance that a hacker may intentionally access or an employee may accidentally access confidential information on a computer.

Answer:

TRUE Question 3: A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Answer:

SECURITY

Question 4: ____ occurs when someone steals personal or confidential information.

Answer:

INFORMATION THEFT

Question 5: Web sites use a ____ to keep track of items in a user's shopping cart.

Answer:

SESSION COOKIES

Question 6: TRUE or FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk.

Answer:

TRUE Question 7: A(n) IT code of conduct is a written guideline that helps determine whether a specific computer action is ____.

Answer:

ETHICAL

Question 8: ____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.

Answer:

INTRUSION

Question 9: TRUE or FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security.

Answer:

FALSE

Question 10: A(n) ________ occurs when the electrical supply drops.

Answer:

UNDERVOLTAGE

Question 11: TRUE or FALSE: Undervoltage can cause equipment damage, but generally do not cause data loss.

Answer:

FALSE

Question 12: Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.

Answer:

WAR DRIVING

Question 13: ____ use is the use of a computer or its data for unapproved or possibly illegal activities.

Answer:

UNAUTHORIZED

Question 14: TRUE or FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.

Answer:

TRUE Question 15: A(n) ____ is a numeric password either assigned by a company or selected by a user.

Answer:

PIN Question 16: A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.

Answer:

FIREWALL

Question 17: TRUE or FALSE: An employee using an organization's computer to track his or her child's soccer league scores is an example of unauthorized access.

Answer:

FALSE Question 18: TRUE or FALSE: In order to safeguard personal information, you should not reply to messages sent by unknown sources for any reason.

Answer:

TRUE

Question 19: To ________ a file means to make a copy of it.

Answer:

BACK-UP

Question 20: TRUE or FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion.

Answer:

TRUE Question 21: TRUE or FALSE: Online shopping sites generally use a session cookie to keep track of items in a user's shopping cart.

Answer:

TRUE Question 22: TRUE or FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon.

Answer:

FALSE Question 23: Computer ____ occurs when a computer consumes someone's entire social life.

Answer:

ADDICTION

Question 24: ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.

Answer:

NOISE Question 25: TRUE or FALSE: Hardware theft is the act of stealing computer equipment.

Answer:

TRUE Question 26: A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons.

Answer:

CYBERTERRORIST

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE COMPUTERS AND STUDY GAMES ABOUT CCS M8 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -99 Questions and Answers -format ...

UNLOCK ACCESS $11.99