计算机专业英语Chapter009.docx
- 文档编号:4922394
- 上传时间:2022-12-11
- 格式:DOCX
- 页数:38
- 大小:26.99KB
计算机专业英语Chapter009.docx
《计算机专业英语Chapter009.docx》由会员分享,可在线阅读,更多相关《计算机专业英语Chapter009.docx(38页珍藏版)》请在冰豆网上搜索。
计算机专业英语Chapter009
MultipleChoiceQuestions
1. Peoplethatcollectandsellpersonaldataarecalled:
A. directmarketers
B. fund-raisers
C. informationresellers
D. governmentagencies
2. Theseprogramsrecordvirtuallyeverythingyoudoonyourcomputerandareusedbyemployerstosearchemployeeemailandcomputerfiles.
A. Spyware
B. Freeware
C. Employee-monitoringsoftware
D. Cookies
3. Smalldatafilesthataredepositedonauser'sharddrivewhentheyvisitaWebsitearecalled:
A. cookies
B. codes
C. cache
D. proxies
4. TheseareusedbyadvertiserstokeeptrackofyourWebactivityasyoumovefromonesitetothenext.
A. Webbugs
B. Historyfiles
C. First-partycookies
D. Third-partycookies
5. Programsusedtosecretlyrecordanindividual'sactivitiesontheInternetarecalled:
A. spyware
B. cookies
C. snifferprograms
D. keystrokeloggers
6. Whichtypeofprogramwouldlikelybeusedbyinvestigatorstorecordapotentialsuspects'Internetactivities?
A. Cookie
B. Globalpositioningsystem
C. Keystrokelogger
D. Webbug
7. Thistypeofcomputercriminalcreatesanddistributesmaliciousprograms.
A. Employee
B. Hacker
C. Cracker
D. Keystrokelogger
8. Mostbrowsersofferthis,whichensuresthatyourbrowsingactivityisnotrecordedonyourharddisk.
A. Illusionofanonymity
B. Browsercache
C. Historyfiles
D. Privacymode
9. Whichofthefollowingisnotmalware?
A. Trojanhorses
B. Viruses
C. Worms
D. Ad-Aware
10. Aprogramthatreplicatesitselfandclogscomputersandnetworks.
A. Virus
B. Worm
C. Denial-of-serviceattack
D. Trojanhorse
11. Freecomputergamesandfreescreensaverprogramsaretypicalcarriersof:
A. DoS
B. worms
C. viruses
D. Trojanhorses
12. WhichamongthefollowingisawaytoshutdownanISPorWebsite?
A. Denialofserviceattack
B. Viruses
C. Trojanhorses
D. Worms
13. WhichamongthefollowingisafraudulentordeceptiveactdesignedtotrickindividualsontheInternetintospendingtimeormoneyforlittleornoreturn?
A. Maliciousprogram
B. Internetscam
C. Theft
D. Datamanipulation
14. TheuseoftheInternet,cellphones,orotherdevicestosendorpostcontentintendedtohurtorembarrassanotherperson.
A. Identitytheft
B. Auctionfraud
C. Cyberbullying
D. Snoopware
15. Thesecrimesincludethetheftofdataintheformofconfidentialinformation.
A. Hotspots
B. Blue-collar
C. White-collar
D. Cyberbullying
16. Accordingtowhichlawisitillegalforanownerofaprogramtomakebackupcopiesfortheirpersonaluseandresellorgivethemaway?
A. DigitalMillenniumCopyrightAct
B. ComputerAbuseAmendmentsAct
C. TheGramm-Leach-BlileyAct
D. ComputerFraudandAbuseAct
17. Corporationsoftenusethistopreventcopyrightviolations.
A. DigitalMillenniumCopyrightAct
B. Websiteencryption
C. Digitalrightsmanagement(DRM)
D. Keystrokeloggers
18. Thisusessoftwaretotrythousandsofcommonwordssequentiallyinanattempttogainunauthorizedaccesstoauser'saccount.
A. Encryption
B. Firewall
C. Password
D. Dictionaryattack
19. ThistypeofWi-FihotspotoperatesclosetoalegitimateWi-Fihotspotandstealsinformationsuchasusernamesandpasswords.
A. Worm
B. Fake
C. Virus
D. Rogue
20. Theprocessofcodinginformationtomakeitunreadableexcepttothosewhohaveaspecialpieceofinformationknownasakey.
A. Restriction
B. Security
C. Protection
D. Encryption
21. A(n)_____actsasasecuritybufferbetweenacorporation'sprivatenetworkandallexternalnetworks.
A. firewall
B. password
C. disasterrecoveryplan
D. viruschecker
22. Whichofthefollowingisthemostwidelyusedwirelessnetworkencryptionforhomewirelessnetworks?
A. WEP
B. WPE
C. WPA
D. WPA2
23. Whichofthefollowingisnotameasuretoprotectcomputersecurity?
A. Restrictingaccess
B. Encryptingdata
C. Copyingdataandstoringitataremotelocation
D. Keepingthesamepasswordonallsystemsconsistently
24. _____isconcernedwithprotectingsoftwareanddatafromunauthorizedtamperingordamage.
A. Databackup
B. Physicalsecurity
C. Disasterrecoveryplan
D. Datasecurity
25. Thisisalegalconceptthatgivescontentcreatorstherighttocontroluseanddistributionoftheirwork.
A. Piracy
B. Ethics
C. Copyright
D. Privacy
26. Thislawgivesyoutherighttolookatyourpersonalrecordsheldbygovernmentagencies.
A. Gramm-Leach-BlileyAct
B. FreedomofInformationAct
C. FamilyEducationalRightsandPrivacyAct
D. ComputerFraudandAbuseAct
27. Computercriminalsthatcreateandspreadvirusesarepunishedunderthislaw.
A. Gramm-Leach-BlileyAct
B. FreedomofInformationAct
C. FamilyEducationalRightsandPrivacyAct
D. ComputerFraudandAbuseAct
True/FalseQuestions
28. Theessentialelementsthatcontrolhowcomputersareusedarelaws.
True False
29. Aspecialtelephonedirectory,calledareversedirectory,canbeusedtogetnames,addresses,andotherdetailsaboutthepeoplewecall.
True False
30. Itishighlylikelythateachoneofushasanelectronicprofilecreatedbyinformationresellers.
True False
31. Identitytheftandmistakenidentityarethesame.
True False
32. Mostbrowsersofferaprivacymode,whichensuresthatyourbrowsingactivityisnotrecordedonyourharddisk.
True False
33. AtrackingcookieisusedbyanadvertisingcompanytokeeptrackofyourWebactivityasyoumovefromonesitetothenext.
True False
34. WebbugsareusuallyhiddenwithintheHTMLcodeforaWebpageorinane-mailmessageasaninvisibleimage.
True False
35. Itisagainstthelawforkeystrokeloggerstobedepositedonyourharddrivebythecompanyyouworkfor.
True False
36. Spyremovalprogramsaredesignedtodetectandremovevarioustypesofprivacythreats.
True False
37. ThearchivingandsearchfeaturesoftheWebmakeyouronlineidentityavailableindefinitely.
True False
38. Computersecurityfocusesonprotectinginformation,hardware,andsoftwarefromunauthorizeduseaswellaspreventingorlimitingthedamagefromintrusions,sabotage,andnaturaldisasters.
True False
39. Postingpersonalinformationsuchasyourbirthdate,familymembernames,andhomeaddress,doesn'tincreaseyourriskofidentitytheft.
True False
40. Theuseofacompany'scomputertimebyanemployeetorunapersonalbusinessiscommonandgenerallyacceptedbyemployers.
True False
41. RogueWi-FiHotspotsimitatefreehotspotsandcaptureinformation,suchasusernamesandpasswords,sentbyuserstolegitimatesites.
True False
42. Biometricscanningdevicesareusedtoscanemployeeidentificationcards.
True False
43. Securityisconcernedwithprotectinginformation,hardware,andsoftwarefromunauthorizeduse,aswellaspreventingorlimitingthedamagefromintrusions,sabotage,andnaturaldisasters.
True False
44. Adictionaryattackusessoftwaretotrythousandsofcommonwordsinanattempttogainunauthorizedaccesstoauser'saccount.
True False
45. ThemostcommonprotocolforWebsiteencryptionisHTTPS(HyperTextTransferProtocolSecure).
True False
46. Ifcopyright-protectedmusicisuploadedtoaWebsite,itislegaltodownloadit.
True False
47. CuttingandpastingmaterialfromaWebsitedirectlyintoyourownreportorpaperwithoutgivingpropercredittotheoriginalsourceisunethical.
True False
FillintheBlankQuestions
48. _____,aprivacyissue,relatestotheresponsibilityofcontrollingwhoisabletousedata.
________________________________________
49. Usingpublicallyavailabledatabases,informationresellerscreate_____andsellthemtodirectmarketers,fundraisers,andothers.
________________________________________
50. _____istheillegalassumptionofsomeone'sidentityforthepurposesofeconomicgain.
________________________________________
51. _____-partycookiesstoreinformationaboutthecurrentsession,yourgeneralpreferences,andyouractivityononeWebsite.
________________________________________
52. _____-partycookiesareusedbyadvertisingcompaniestokeeptrackofyourWebactivityasyoumovefromonesitetothenext.
________________________________________
53. A(n)_____issomeonewhocreatesprogramstogainunauthorizedaccesstocomputersystemsformaliciouspurposes.
________________________________________
54. _____bugsareinvisibleimagesorHTMLcodehiddenwithinaWebpageore-mailmessageandareusedtotransmitinformationwithoutyourknowledge.
________________________________________
55. _____areprogramsthattravelthroughnetworksandoperatingsystemsandattachthemselvestovariousotherprogramsanddatabases.
________________________________________
56. A(n)_____attackattemptstoslowdownorstopacomputersystemornetworkbysendingrepetitiverequestsforinformation.
________________________________________
57. Adeceptiveact,usingtheInternet,totrickpeopleintospendingtheirmoneyandtimefornogainiscalledanInternet_____.
________________________________________
58. _____attemptstotrickInternetusersintothinkingafakebutofficial-lookingWebsiteore-mailislegitimate.
________________________________________
59. Computersinfectedbyavirus,worm,orTrojanhorsethatallowsthemtoberemotelycontrolledformaliciouspurposesarecalled_____.
________________________________________
60. _____istheuseof
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机专业 英语 Chapter009
![提示](https://static.bdocx.com/images/bang_tan.gif)