Question: QUESTION 5 In order for the CPU to process a program's instructions, it must first be loaded into _____ . A. RAM B. ROM C.

QUESTION 5

In order for the CPU to process a program's instructions, it must first be loaded into _____ .

A. RAM

B. ROM

C. the bus

D. cyberspace

QUESTION 6

A Gigabyte of data is roughly ________ bytes.

A. one thousand

B. one million

C. one billion

D. one trillion

QUESTION 7

In its raw binary form, ______ language is the only language directly interpretable by the CPU.

A. assembly

B. high-level

C. processing

D. machine

QUESTION 8

The word SECURITY would require _____ of storage on a computer

A. 8 bits

B. 8 bytes

C. 16 bits

D. 16 bytes

QUESTION 9

A new hard drive must be ____ before it can be used by the computer.

A. formatted

B. initialized

C. defragmented

D. erased

QUESTION 10

Computers specifically tuned to offer service to end users over the Internet are referred to as _____ .

A. zombies

B. web browsers

C. servers

D. web pages

.

QUESTION 11

Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2?

A. 26 * 26

B. 52 * 52

C. 26 * 2

D. 52 * 2

QUESTION 12

_____ is a common term that includes spyware, adware, Trojan horses, etc.

A. Malware

B. Exploit

C. Virus

D. Spam

QUESTION 13

It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.

A. memory blocks

B. RAM

C. registers

D. buffers

QUESTION 14

Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .

viruses

exploits

denial of service attacks

malicious code

QUESTION 15

The period of time when viruses were mainly spread through portable media is referred to as the _____ era.

A. classical

B. floppy

C. macro

D. Internet

QUESTION 16

Attack kits _______________ .

A. continuously try all password combinations until successful

B. facilitate the creation of custom attack mechanisms

C. install themselves on a computer and launch various spyware/adware applications

D. spread through the Internet via e-mail

QUESTION 17

Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .

A. RAM; ROM

B. RAM; RAM

C. ROM; RAM

D. ROM; ROM

QUESTION 18

An operating system is not responsible for _____ .

A. access control

B. permissions and privleges

C. safe web browsing

D. file system management

QUESTION 19

Unlike passwords, usernames (or userIDs) are typically ______ .

A. public and easy to locate

B. private and hard to locate

C. frequently changing

D. very long sequences of characters

QUESTION 20

A series of programs, known as _____, attack an operating system hoping to discover all passwords.

A. worms

B. malware

C. pwdcrack

D. L0phtcrack

QUESTION 21

For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______ .

A. replace passwords

B. supplement passwords

C. replace usernames

D. supplement usernames

QUESTION 22

_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.

A. spyware

B. adware

C. Trojan horses

D. worms

QUESTION 23

Websites will often use ____ to store session data for easy recall the next time a user visits.

A. RAM

B. brownies

C. cookies

D. the CPU

QUESTION 24

The FBI MoneyPak was a famous example of _______ .

an e-mail virus

adware

spyware

ransomware

QUESTION 25

_______ is structured in such a way that every location is uniquely addressed byte by byte.

A. Memory (RAM)

B. Storage (ROM)

C. A flash drive

D. The CPU

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!