ログイン

Topic A

Topic A
26問 • 10ヶ月前
  • John Marabiles
  • 通報

    問題一覧

  • 1

    Although Internet led to many benefits, it also poses a greater potential for security threats, below are a number of common Internet security issues:

    — hacker — malware — spyware — computer virus — trojan horse — worm — phishing

  • 2

    Refers to a person who can gain unauthorized access to (break into) a computer or a network to commit crimes

    hacker

  • 3

    Malware short for

    malicious software

  • 4

    A software that is designed to damage, disrupt, or infect computers

    malware

  • 5

    A single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware

    malware

  • 6

    It can gain unauthorized access to a computer and continuously run in the background without the owner’s knowledge

    malware

  • 7

    A specific type of malware that is designed to replicate (copy) and spread from one computer to another

    computer virus

  • 8

    A ______ can make a copy of itself over and over again

    virus

  • 9

    A ______ can spread from one computer to another through email attachments, removable storage devices, networks

    virus

  • 10

    A ______ can damage your computer by corrupting system files, sending spam, stealing data andpersonal information from your computer, destroying data, deleting everything on your hard drive

    virus

  • 11

    A type of malware that looks harmless but can cause harm to a computer system

    trojan horse

  • 12

    A ______ misleads users of its true intent

    trojan

  • 13

    A ______ may claim to get rid of your computer viruses but instead introduce viruses onto your computer

    trojan

  • 14

    A ______ can take the form of innocent-looking email attachments and downloads

    trojan

  • 15

    It is similar to a virus (a sub-class of a virus)

    worm

  • 16

    It is designed to quickly self-replicate and spread copies of itself from one computer to another

    worm

  • 17

    A ______ only spreads when a user opens an affected file whereas a ______ spreads without the use of a host file

    — virus — worm

  • 18

    A scammer uses deceptive emails or websites and tries to obtain valuable personal information

    phishing

  • 19

    A common online scam used by cyber criminals

    phishing

  • 20

    A scammer may use a deceptive email or website appearing to represent a legitimate firm

    phishing

  • 21

    A ______ can record a user’s Web browsing habits, email messages, keystrokes on online advertisements, personal information, and forward it to a third party

    spyware

  • 22

    A software that secretly monitors (spies) user’s online behaviour and gets sensitive information about a person or organization without the user’s knowledge

    spyware

  • 23

    Advertisers can use ______ to target specific advertisements to your tastes

    spyware

  • 24

    Criminal organizations can use ______ to collect financial information

    spyware

  • 25

    To prevent malware from affecting your computer:

    — back up files and store in different locations — don’t open suspicious mails or websites — the “@“ should represent a real company — don’t download suspicious files — use a secure and strong password — scan your devices with anti virus regularly

  • 26

    Some free antivirus software:

  • EM Waves and Spectrum

    EM Waves and Spectrum

    John Marabiles · 73問 · 1年前

    EM Waves and Spectrum

    EM Waves and Spectrum

    73問 • 1年前
    John Marabiles

    Polarization

    Polarization

    John Marabiles · 25問 · 1年前

    Polarization

    Polarization

    25問 • 1年前
    John Marabiles

    Lesson 1

    Lesson 1

    John Marabiles · 9問 · 1年前

    Lesson 1

    Lesson 1

    9問 • 1年前
    John Marabiles

    Lesson 2

    Lesson 2

    John Marabiles · 8問 · 1年前

    Lesson 2

    Lesson 2

    8問 • 1年前
    John Marabiles

    Lesson 3

    Lesson 3

    John Marabiles · 7問 · 1年前

    Lesson 3

    Lesson 3

    7問 • 1年前
    John Marabiles

    Chapter 10

    Chapter 10

    John Marabiles · 43問 · 1年前

    Chapter 10

    Chapter 10

    43問 • 1年前
    John Marabiles

    Evidence Of Evolution

    Evidence Of Evolution

    John Marabiles · 46問 · 1年前

    Evidence Of Evolution

    Evidence Of Evolution

    46問 • 1年前
    John Marabiles

    Traditional Materials

    Traditional Materials

    John Marabiles · 20問 · 1年前

    Traditional Materials

    Traditional Materials

    20問 • 1年前
    John Marabiles

    Crushing Strength Of Common Building Stones

    Crushing Strength Of Common Building Stones

    John Marabiles · 8問 · 1年前

    Crushing Strength Of Common Building Stones

    Crushing Strength Of Common Building Stones

    8問 • 1年前
    John Marabiles

    Properties Of Stones

    Properties Of Stones

    John Marabiles · 16問 · 1年前

    Properties Of Stones

    Properties Of Stones

    16問 • 1年前
    John Marabiles

    Requirements Of Good Building Stones:

    Requirements Of Good Building Stones:

    John Marabiles · 11問 · 1年前

    Requirements Of Good Building Stones:

    Requirements Of Good Building Stones:

    11問 • 1年前
    John Marabiles

    Tests On Stones

    Tests On Stones

    John Marabiles · 5問 · 1年前

    Tests On Stones

    Tests On Stones

    5問 • 1年前
    John Marabiles

    Structural Reading

    Structural Reading

    John Marabiles · 22問 · 1年前

    Structural Reading

    Structural Reading

    22問 • 1年前
    John Marabiles

    General Chemistry

    General Chemistry

    John Marabiles · 50問 · 1年前

    General Chemistry

    General Chemistry

    50問 • 1年前
    John Marabiles

    Lesson 1: Construction Sector

    Lesson 1: Construction Sector

    John Marabiles · 10問 · 1年前

    Lesson 1: Construction Sector

    Lesson 1: Construction Sector

    10問 • 1年前
    John Marabiles

    Lesson 2: Participating in Workplace Communication and Collaboration

    Lesson 2: Participating in Workplace Communication and Collaboration

    John Marabiles · 11問 · 1年前

    Lesson 2: Participating in Workplace Communication and Collaboration

    Lesson 2: Participating in Workplace Communication and Collaboration

    11問 • 1年前
    John Marabiles

    Lesson 3: Practicing Career Professionalism

    Lesson 3: Practicing Career Professionalism

    John Marabiles · 8問 · 1年前

    Lesson 3: Practicing Career Professionalism

    Lesson 3: Practicing Career Professionalism

    8問 • 1年前
    John Marabiles

    Lesson 4: Practicing Occupational Health and Safety Procedures

    Lesson 4: Practicing Occupational Health and Safety Procedures

    John Marabiles · 22問 · 1年前

    Lesson 4: Practicing Occupational Health and Safety Procedures

    Lesson 4: Practicing Occupational Health and Safety Procedures

    22問 • 1年前
    John Marabiles

    Lesson 5: Observing Sustainable Workplace Practices

    Lesson 5: Observing Sustainable Workplace Practices

    John Marabiles · 11問 · 1年前

    Lesson 5: Observing Sustainable Workplace Practices

    Lesson 5: Observing Sustainable Workplace Practices

    11問 • 1年前
    John Marabiles

    Lesson 1: Mensuration and Calculation

    Lesson 1: Mensuration and Calculation

    John Marabiles · 28問 · 1年前

    Lesson 1: Mensuration and Calculation

    Lesson 1: Mensuration and Calculation

    28問 • 1年前
    John Marabiles

    Lesson 2: Interpreting Technical Drawings and Plans

    Lesson 2: Interpreting Technical Drawings and Plans

    John Marabiles · 9問 · 1年前

    Lesson 2: Interpreting Technical Drawings and Plans

    Lesson 2: Interpreting Technical Drawings and Plans

    9問 • 1年前
    John Marabiles

    Functions

    Functions

    John Marabiles · 7問 · 1年前

    Functions

    Functions

    7問 • 1年前
    John Marabiles

    Commands and Shortkeys

    Commands and Shortkeys

    John Marabiles · 32問 · 1年前

    Commands and Shortkeys

    Commands and Shortkeys

    32問 • 1年前
    John Marabiles

    Construction Plans and Sheets

    Construction Plans and Sheets

    John Marabiles · 18問 · 1年前

    Construction Plans and Sheets

    Construction Plans and Sheets

    18問 • 1年前
    John Marabiles

    Beams

    Beams

    John Marabiles · 9問 · 1年前

    Beams

    Beams

    9問 • 1年前
    John Marabiles

    Lesson 1

    Lesson 1

    John Marabiles · 41問 · 1年前

    Lesson 1

    Lesson 1

    41問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 73問 · 1年前

    1

    1

    73問 • 1年前
    John Marabiles

    3

    3

    John Marabiles · 5問 · 1年前

    3

    3

    5問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 27問 · 1年前

    1

    1

    27問 • 1年前
    John Marabiles

    8

    8

    John Marabiles · 5問 · 1年前

    8

    8

    5問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 10問 · 1年前

    1

    1

    10問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 20問 · 1年前

    1

    1

    20問 • 1年前
    John Marabiles

    2

    2

    John Marabiles · 16問 · 1年前

    2

    2

    16問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 5問 · 1年前

    1

    1

    5問 • 1年前
    John Marabiles

    Context of Communication

    Context of Communication

    John Marabiles · 10問 · 1年前

    Context of Communication

    Context of Communication

    10問 • 1年前
    John Marabiles

    Elements of Communication

    Elements of Communication

    John Marabiles · 10問 · 1年前

    Elements of Communication

    Elements of Communication

    10問 • 1年前
    John Marabiles

    Functions of Communication

    Functions of Communication

    John Marabiles · 9問 · 1年前

    Functions of Communication

    Functions of Communication

    9問 • 1年前
    John Marabiles

    Barriers of Communication

    Barriers of Communication

    John Marabiles · 18問 · 1年前

    Barriers of Communication

    Barriers of Communication

    18問 • 1年前
    John Marabiles

    Guidelines to Eliminate Barriers of Communication

    Guidelines to Eliminate Barriers of Communication

    John Marabiles · 8問 · 1年前

    Guidelines to Eliminate Barriers of Communication

    Guidelines to Eliminate Barriers of Communication

    8問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 26問 · 1年前

    1

    1

    26問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 8問 · 1年前

    1

    1

    8問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 38問 · 1年前

    1

    1

    38問 • 1年前
    John Marabiles

    Development of the Periodic Table

    Development of the Periodic Table

    John Marabiles · 5問 · 1年前

    Development of the Periodic Table

    Development of the Periodic Table

    5問 • 1年前
    John Marabiles

    CEM 1

    CEM 1

    John Marabiles · 17問 · 1年前

    CEM 1

    CEM 1

    17問 • 1年前
    John Marabiles

    CEM 2

    CEM 2

    John Marabiles · 6問 · 1年前

    CEM 2

    CEM 2

    6問 • 1年前
    John Marabiles

    GE 1

    GE 1

    John Marabiles · 27問 · 1年前

    GE 1

    GE 1

    27問 • 1年前
    John Marabiles

    GE 3

    GE 3

    John Marabiles · 7問 · 1年前

    GE 3

    GE 3

    7問 • 1年前
    John Marabiles

    TE 1

    TE 1

    John Marabiles · 28問 · 1年前

    TE 1

    TE 1

    28問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 22問 · 1年前

    1

    1

    22問 • 1年前
    John Marabiles

    2

    2

    John Marabiles · 37問 · 1年前

    2

    2

    37問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 17問 · 1年前

    1

    1

    17問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 9問 · 1年前

    1

    1

    9問 • 1年前
    John Marabiles

    2

    2

    John Marabiles · 9問 · 1年前

    2

    2

    9問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 6問 · 1年前

    1

    1

    6問 • 1年前
    John Marabiles

    2

    2

    John Marabiles · 5問 · 1年前

    2

    2

    5問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 9問 · 1年前

    1

    1

    9問 • 1年前
    John Marabiles

    FINAL

    FINAL

    John Marabiles · 76問 · 1年前

    FINAL

    FINAL

    76問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 22問 · 1年前

    1

    1

    22問 • 1年前
    John Marabiles

    1

    1

    John Marabiles · 35問 · 1年前

    1

    1

    35問 • 1年前
    John Marabiles

    Week 6 to 8

    Week 6 to 8

    John Marabiles · 92問 · 1年前

    Week 6 to 8

    Week 6 to 8

    92問 • 1年前
    John Marabiles

    Week 10 to 12

    Week 10 to 12

    John Marabiles · 80問 · 1年前

    Week 10 to 12

    Week 10 to 12

    80問 • 1年前
    John Marabiles

    Final 1

    Final 1

    John Marabiles · 37問 · 1年前

    Final 1

    Final 1

    37問 • 1年前
    John Marabiles

    問題一覧

  • 1

    Although Internet led to many benefits, it also poses a greater potential for security threats, below are a number of common Internet security issues:

    — hacker — malware — spyware — computer virus — trojan horse — worm — phishing

  • 2

    Refers to a person who can gain unauthorized access to (break into) a computer or a network to commit crimes

    hacker

  • 3

    Malware short for

    malicious software

  • 4

    A software that is designed to damage, disrupt, or infect computers

    malware

  • 5

    A single term that refers to all the different types of threats to your computer safety such as virus, Trojan horse, worm, spyware

    malware

  • 6

    It can gain unauthorized access to a computer and continuously run in the background without the owner’s knowledge

    malware

  • 7

    A specific type of malware that is designed to replicate (copy) and spread from one computer to another

    computer virus

  • 8

    A ______ can make a copy of itself over and over again

    virus

  • 9

    A ______ can spread from one computer to another through email attachments, removable storage devices, networks

    virus

  • 10

    A ______ can damage your computer by corrupting system files, sending spam, stealing data andpersonal information from your computer, destroying data, deleting everything on your hard drive

    virus

  • 11

    A type of malware that looks harmless but can cause harm to a computer system

    trojan horse

  • 12

    A ______ misleads users of its true intent

    trojan

  • 13

    A ______ may claim to get rid of your computer viruses but instead introduce viruses onto your computer

    trojan

  • 14

    A ______ can take the form of innocent-looking email attachments and downloads

    trojan

  • 15

    It is similar to a virus (a sub-class of a virus)

    worm

  • 16

    It is designed to quickly self-replicate and spread copies of itself from one computer to another

    worm

  • 17

    A ______ only spreads when a user opens an affected file whereas a ______ spreads without the use of a host file

    — virus — worm

  • 18

    A scammer uses deceptive emails or websites and tries to obtain valuable personal information

    phishing

  • 19

    A common online scam used by cyber criminals

    phishing

  • 20

    A scammer may use a deceptive email or website appearing to represent a legitimate firm

    phishing

  • 21

    A ______ can record a user’s Web browsing habits, email messages, keystrokes on online advertisements, personal information, and forward it to a third party

    spyware

  • 22

    A software that secretly monitors (spies) user’s online behaviour and gets sensitive information about a person or organization without the user’s knowledge

    spyware

  • 23

    Advertisers can use ______ to target specific advertisements to your tastes

    spyware

  • 24

    Criminal organizations can use ______ to collect financial information

    spyware

  • 25

    To prevent malware from affecting your computer:

    — back up files and store in different locations — don’t open suspicious mails or websites — the “@“ should represent a real company — don’t download suspicious files — use a secure and strong password — scan your devices with anti virus regularly

  • 26

    Some free antivirus software: