1.A -___is a event or action that could case damage to a computer,phone,data,software.
*digital security risk
2.An illegal act involiving the use or computer or related devices are refered to as a -______.
*Computer crime
3.A -________ is a online or internet based illegal app
*Cybercrime
4.-________is short for malice software
*malware
5.A- _______ is a group of mobile devices or computers connected to a network
*Botnet
6.A- ________ disrupts computer access to internet services
*DOS attack
7.A- __________ a set of instructions in a program that allow users to pass security control
*Backdoor
8.-________ is a technique used to make their internet appear legal
*Spoofing
9.A -_____ is hardware or software that protects a networks resources from -___
*firewall and intrugen
10.-_______ is the use of a computer or network without permission
*Unauthorized access
11.-_____is the use of computer for unimproved activity
*unauthorized use
12.-______ tells a persons true identity
*biometric device
13.______ is the discovery,collection and analysis of eveidence thats found on computers and network
* Digital forensic
14.______ occurs when someone illegally copies a program
*software theft
15.______ occurs when someones steals personal or confidential info.
*Info theft
16.____ is the process of converting data-
*Encription
17._____ is an ecriptic code that a person,website,or organization attaches and meesage to verify the sender
*signature
18.____ is a notice that garuntees the user that the website is real
*digital certicficate
19.A website that uses ______ technique to secure its data is known as a secure site
*Encription
20. The act of stealing digital equipment is __________
*hardware theft
21. _______ is the act of destorying digital equipment
* hardware vandalism
22.A ______ is a duplicate of a file that can be used if the original is lost,damaged or destroyed
*Backup
23._____ a quideline that governs the use of computers,mobile devices and devices.
*computer ethics
24._____ is the right to which writers are entiltiled to their work
*entilectual property
25.___ is written quideline that determines whether a specification is allowed or not allowed
*code of conduct
26._____ is a plan designed to help prevent illegal distrubution of music , movies and other content.
*digital right managment
27.___ is the owners choice whether someone can make copies,publish or display it in a show
*copy right
28.___ is a program that secretly collects info about the user
*spyware
29.____ is a program that displays a online ad in a banner
*addware
30._____ is gaining unauthorized access or obtainging confidential info then taking advantage of a victim
*social engineering
31.What is green computing ? ___
*
32._____ Refers to the rights of individuals and companies to restrict the collection and use of info about them
*information privacy
33.___ is a small text file that a web service stores on your computer
*cookies
34._______ involves the use of mobile devices,computers and cameras to oberseve and record your use of technology
*employee monitor
No comments:
Post a Comment