Podcast
Questions and Answers
What is the primary focus of computer security?
What is the primary focus of computer security?
What is the term for an Internet-based crime?
What is the term for an Internet-based crime?
What is the term for a program that has malicious intent?
What is the term for a program that has malicious intent?
What is the primary characteristic of a virus?
What is the primary characteristic of a virus?
Signup and view all the answers
What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?
What is the term for technically skilled persons who try to get unauthorized access within a computer system or a network?
Signup and view all the answers
What is the term for the unauthorized use of a computer or computer network to commit illegal acts?
What is the term for the unauthorized use of a computer or computer network to commit illegal acts?
Signup and view all the answers
What happens to cookies when you visit a website again?
What happens to cookies when you visit a website again?
Signup and view all the answers
How are most computer viruses typically transmitted to a user's system?
How are most computer viruses typically transmitted to a user's system?
Signup and view all the answers
What is the primary purpose of tracking cookies?
What is the primary purpose of tracking cookies?
Signup and view all the answers
What is the default format of data sent over the Internet?
What is the default format of data sent over the Internet?
Signup and view all the answers
What is the primary function of antivirus software?
What is the primary function of antivirus software?
Signup and view all the answers
What is a characteristic of a Trojan horse?
What is a characteristic of a Trojan horse?
Signup and view all the answers
What is the purpose of encryption?
What is the purpose of encryption?
Signup and view all the answers
What is the difference between the 'http' and 'https' protocols?
What is the difference between the 'http' and 'https' protocols?
Signup and view all the answers
Why is it important to update antivirus software regularly?
Why is it important to update antivirus software regularly?
Signup and view all the answers
What happens when you check the 'keep me logged in' box on a website?
What happens when you check the 'keep me logged in' box on a website?
Signup and view all the answers
What is the effect of a worm on a computer system?
What is the effect of a worm on a computer system?
Signup and view all the answers
What is a common tactic used by recent Trojan horses to deceive users?
What is a common tactic used by recent Trojan horses to deceive users?
Signup and view all the answers
What is the primary purpose of computer ethics guidelines?
What is the primary purpose of computer ethics guidelines?
Signup and view all the answers
Which of the following is a common computer ethics issue involved in intellectual property rights?
Which of the following is a common computer ethics issue involved in intellectual property rights?
Signup and view all the answers
What is the purpose of a firewall in a computer system?
What is the purpose of a firewall in a computer system?
Signup and view all the answers
What should you do if you receive an email from your bank asking you to change your password for security reasons?
What should you do if you receive an email from your bank asking you to change your password for security reasons?
Signup and view all the answers
What is the purpose of a CAPTCHA?
What is the purpose of a CAPTCHA?
Signup and view all the answers
What is a characteristic of a Trojan horse malware?
What is a characteristic of a Trojan horse malware?
Signup and view all the answers
What is the primary focus of Chapter Five in the computing skills course?
What is the primary focus of Chapter Five in the computing skills course?
Signup and view all the answers
What is the main objective of protecting against unauthorized access and unauthorized use?
What is the main objective of protecting against unauthorized access and unauthorized use?
Signup and view all the answers
What is the term for the practice of protecting against unauthorized access and use of computing systems?
What is the term for the practice of protecting against unauthorized access and use of computing systems?
Signup and view all the answers
What is malware, according to the chapter?
What is malware, according to the chapter?
Signup and view all the answers
What is the focus of the topic of computer ethics in the chapter?
What is the focus of the topic of computer ethics in the chapter?
Signup and view all the answers
What is the purpose of encryption in computing, according to the chapter?
What is the purpose of encryption in computing, according to the chapter?
Signup and view all the answers