Question: QUESTION 5 In order for the CPU to process a program's instructions, it must first be loaded into _____ . A. RAM B. ROM C.
QUESTION 5
In order for the CPU to process a program's instructions, it must first be loaded into _____ .
A. RAM
B. ROM
C. the bus
D. cyberspace
QUESTION 6
A Gigabyte of data is roughly ________ bytes.
A. one thousand
B. one million
C. one billion
D. one trillion
QUESTION 7
In its raw binary form, ______ language is the only language directly interpretable by the CPU.
A. assembly
B. high-level
C. processing
D. machine
QUESTION 8
The word SECURITY would require _____ of storage on a computer
A. 8 bits
B. 8 bytes
C. 16 bits
D. 16 bytes
QUESTION 9
A new hard drive must be ____ before it can be used by the computer.
A. formatted
B. initialized
C. defragmented
D. erased
QUESTION 10
Computers specifically tuned to offer service to end users over the Internet are referred to as _____ .
A. zombies
B. web browsers
C. servers
D. web pages
.
QUESTION 11
Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2?
A. 26 * 26
B. 52 * 52
C. 26 * 2
D. 52 * 2
QUESTION 12
_____ is a common term that includes spyware, adware, Trojan horses, etc.
A. Malware
B. Exploit
C. Virus
D. Spam
QUESTION 13
It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.
A. memory blocks
B. RAM
C. registers
D. buffers
QUESTION 14
Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .
viruses
exploits
denial of service attacks
malicious code
QUESTION 15
The period of time when viruses were mainly spread through portable media is referred to as the _____ era.
A. classical
B. floppy
C. macro
D. Internet
QUESTION 16
Attack kits _______________ .
A. continuously try all password combinations until successful
B. facilitate the creation of custom attack mechanisms
C. install themselves on a computer and launch various spyware/adware applications
D. spread through the Internet via e-mail
QUESTION 17
Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .
A. RAM; ROM
B. RAM; RAM
C. ROM; RAM
D. ROM; ROM
QUESTION 18
An operating system is not responsible for _____ .
A. access control
B. permissions and privleges
C. safe web browsing
D. file system management
QUESTION 19
Unlike passwords, usernames (or userIDs) are typically ______ .
A. public and easy to locate
B. private and hard to locate
C. frequently changing
D. very long sequences of characters
QUESTION 20
A series of programs, known as _____, attack an operating system hoping to discover all passwords.
A. worms
B. malware
C. pwdcrack
D. L0phtcrack
QUESTION 21
For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______ .
A. replace passwords
B. supplement passwords
C. replace usernames
D. supplement usernames
QUESTION 22
_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.
A. spyware
B. adware
C. Trojan horses
D. worms
QUESTION 23
Websites will often use ____ to store session data for easy recall the next time a user visits.
A. RAM
B. brownies
C. cookies
D. the CPU
QUESTION 24
The FBI MoneyPak was a famous example of _______ .
an e-mail virus
adware
spyware
ransomware
QUESTION 25
_______ is structured in such a way that every location is uniquely addressed byte by byte.
A. Memory (RAM)
B. Storage (ROM)
C. A flash drive
D. The CPU
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
