final lie

final lie
31問 • 1年前
  • dethevos gaming
  • 通報

    問題一覧

  • 1

    is the practice of Protecting networks, devices, And data from unauthorized Access or malicious attacks.

    cyber security

  • 2

    TYPES OF CYBER THREATS:

    malware, phishing, ransomware, denial of service attack

  • 3

    BUILDING A STRONG DEFENSE against cybers attacks

    regular software update, firewall, encryption, secure password

  • 4

    Dos and don'ts in internet

    use strong password, dont share your password, dont share personal information, be careful with ads, two factor authentication, dont open attachments from unknown sources

  • 5

    REFERS TO CREATIONS OF THE MIND, SUCH AS INVENTIONS, LITERARY AND ARTISTIC WORK, DESIGN, AND SYMBOLS, NAMES AND IMAGES USED IN COMMERCE.

    IP

  • 6

    IS AN EXCLUSIVE RIGHT GRANTED FOR AN INVENTION. GENERALLY SPEAKING, A ___ PROVIDES THE ___ OWNER WITH THE RIGHT TO DECIDE HOW – OR WHETHER – THE INVENTION CAN BE USED BY OTHERS.

    patient

  • 7

    IS A LEGAL TERM USED TO DESCRIBE THE RIGHTS THAT CREATORS HAVE OVER THEIR LITERARY AND ARTISTIC WORKS

    copyright

  • 8

    IS A SIGN CAPABLE OF DISTINGUISHING THE GOODS OR SERVICES OF ONE ENTERPRISE FROM THOSE OF OTHER ENTERPRISES.

    trademark

  • 9

    is the practice of protecting networks, devices, and data from unauthorized access or malicious attacks

    cyber security

  • 10

    the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

    hacking

  • 11

    Also known as "white-hat hacking," this involves authorized testing of systems to identify and fix vulnerabilities. Ethical hackers work to protect systems.

    ethical hacking

  • 12

    Includes activities like data theft, installing malware, or disrupting systems, often performed by "black-hat hackers."

    malicious hacking

  • 13

    Falls between ethical and malicious. _______ might explore vulnerabilities without permission but don't exploit them for malicious purposes.

    gray hat hacking

  • 14

    Tricking individuals into providing sensitive information. Malware: Using malicious software like viruses, worms, or ransomware.

    phishing

  • 15

    Repeatedly guessing passwords or encryption keys. Social Engineering: Manipulating people into revealing confidential information

    brute force attacks

  • 16

    A hacking technique that use malicious software

    malware

  • 17

    Manipulating people into revealing confidential information

    social engineering

  • 18

    Techniques Used in Hacking

    phishing, malware, social engineering, brute force attacks

  • 19

    Motivations for Hacking

    financial gain, political, curiosity, personal gain

  • 20

    Types of E-commerce

    b2c, b2b, c2c, c2b

  • 21

    Involves transactions between businesses and individual consumers.

    b2c

  • 22

    Involves transactions between two businesses.

    b2b

  • 23

    Involves transactions between individual consumers, often facilitated by a third-party platform.

    c2c

  • 24

    Involves individuals selling products or services to businesses.

    c2b

  • 25

    Trade cycle

    search, negotiation, order, payment, delivery, invoicing, warranty, after sales service

  • 26

    Mobile generation

    1g(1980), 2g(1991), 3g(2003), 4g(2009), 5g(2019)

  • 27

    1g features

    large, no data, analog voice communication

  • 28

    2g

    digital voice communication, sms and mms, encryption, 64 kbps

  • 29

    3g

    2mbps, video calling, mobile app

  • 30

    4g

    1gbps, HD video, enchance mobile app, based on ip

  • 31

    5g

    low latency, 10 gbps, massive iot, enchanced mobile broad

  • Understanding the self 4

    Understanding the self 4

    dethevos gaming · 34問 · 2年前

    Understanding the self 4

    Understanding the self 4

    34問 • 2年前
    dethevos gaming

    Chapter 1 US quizz

    Chapter 1 US quizz

    dethevos gaming · 11問 · 2年前

    Chapter 1 US quizz

    Chapter 1 US quizz

    11問 • 2年前
    dethevos gaming

    US2

    US2

    dethevos gaming · 44問 · 2年前

    US2

    US2

    44問 • 2年前
    dethevos gaming

    US3

    US3

    dethevos gaming · 34問 · 2年前

    US3

    US3

    34問 • 2年前
    dethevos gaming

    Midterm test US

    Midterm test US

    dethevos gaming · 68問 · 2年前

    Midterm test US

    Midterm test US

    68問 • 2年前
    dethevos gaming

    STS

    STS

    dethevos gaming · 77問 · 2年前

    STS

    STS

    77問 • 2年前
    dethevos gaming

    purposive communication 1st reporter-Language, communication processes, principles, and ethics.

    purposive communication 1st reporter-Language, communication processes, principles, and ethics.

    dethevos gaming · 83問 · 2年前

    purposive communication 1st reporter-Language, communication processes, principles, and ethics.

    purposive communication 1st reporter-Language, communication processes, principles, and ethics.

    83問 • 2年前
    dethevos gaming

    sts 2&4

    sts 2&4

    dethevos gaming · 29問 · 2年前

    sts 2&4

    sts 2&4

    29問 • 2年前
    dethevos gaming

    midterm US

    midterm US

    dethevos gaming · 88問 · 2年前

    midterm US

    midterm US

    88問 • 2年前
    dethevos gaming

    US f

    US f

    dethevos gaming · 58問 · 2年前

    US f

    US f

    58問 • 2年前
    dethevos gaming

    rph des

    rph des

    dethevos gaming · 82問 · 2年前

    rph des

    rph des

    82問 • 2年前
    dethevos gaming

    elextech

    elextech

    dethevos gaming · 23問 · 2年前

    elextech

    elextech

    23問 • 2年前
    dethevos gaming

    not agian comp

    not agian comp

    dethevos gaming · 17問 · 2年前

    not agian comp

    not agian comp

    17問 • 2年前
    dethevos gaming

    porny

    porny

    dethevos gaming · 29問 · 1年前

    porny

    porny

    29問 • 1年前
    dethevos gaming

    GEC ART

    GEC ART

    dethevos gaming · 5問 · 1年前

    GEC ART

    GEC ART

    5問 • 1年前
    dethevos gaming

    final lie

    final lie

    dethevos gaming · 31問 · 1年前

    final lie

    final lie

    31問 • 1年前
    dethevos gaming

    GEC TCW finals

    GEC TCW finals

    dethevos gaming · 85問 · 1年前

    GEC TCW finals

    GEC TCW finals

    85問 • 1年前
    dethevos gaming

    Entrepreneur_Midterm

    Entrepreneur_Midterm

    dethevos gaming · 91問 · 19日前

    Entrepreneur_Midterm

    Entrepreneur_Midterm

    91問 • 19日前
    dethevos gaming

    FOLA 2_basic

    FOLA 2_basic

    dethevos gaming · 43問 · 19日前

    FOLA 2_basic

    FOLA 2_basic

    43問 • 19日前
    dethevos gaming

    FOLA 2_ midterm

    FOLA 2_ midterm

    dethevos gaming · 97問 · 14日前

    FOLA 2_ midterm

    FOLA 2_ midterm

    97問 • 14日前
    dethevos gaming

    問題一覧

  • 1

    is the practice of Protecting networks, devices, And data from unauthorized Access or malicious attacks.

    cyber security

  • 2

    TYPES OF CYBER THREATS:

    malware, phishing, ransomware, denial of service attack

  • 3

    BUILDING A STRONG DEFENSE against cybers attacks

    regular software update, firewall, encryption, secure password

  • 4

    Dos and don'ts in internet

    use strong password, dont share your password, dont share personal information, be careful with ads, two factor authentication, dont open attachments from unknown sources

  • 5

    REFERS TO CREATIONS OF THE MIND, SUCH AS INVENTIONS, LITERARY AND ARTISTIC WORK, DESIGN, AND SYMBOLS, NAMES AND IMAGES USED IN COMMERCE.

    IP

  • 6

    IS AN EXCLUSIVE RIGHT GRANTED FOR AN INVENTION. GENERALLY SPEAKING, A ___ PROVIDES THE ___ OWNER WITH THE RIGHT TO DECIDE HOW – OR WHETHER – THE INVENTION CAN BE USED BY OTHERS.

    patient

  • 7

    IS A LEGAL TERM USED TO DESCRIBE THE RIGHTS THAT CREATORS HAVE OVER THEIR LITERARY AND ARTISTIC WORKS

    copyright

  • 8

    IS A SIGN CAPABLE OF DISTINGUISHING THE GOODS OR SERVICES OF ONE ENTERPRISE FROM THOSE OF OTHER ENTERPRISES.

    trademark

  • 9

    is the practice of protecting networks, devices, and data from unauthorized access or malicious attacks

    cyber security

  • 10

    the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

    hacking

  • 11

    Also known as "white-hat hacking," this involves authorized testing of systems to identify and fix vulnerabilities. Ethical hackers work to protect systems.

    ethical hacking

  • 12

    Includes activities like data theft, installing malware, or disrupting systems, often performed by "black-hat hackers."

    malicious hacking

  • 13

    Falls between ethical and malicious. _______ might explore vulnerabilities without permission but don't exploit them for malicious purposes.

    gray hat hacking

  • 14

    Tricking individuals into providing sensitive information. Malware: Using malicious software like viruses, worms, or ransomware.

    phishing

  • 15

    Repeatedly guessing passwords or encryption keys. Social Engineering: Manipulating people into revealing confidential information

    brute force attacks

  • 16

    A hacking technique that use malicious software

    malware

  • 17

    Manipulating people into revealing confidential information

    social engineering

  • 18

    Techniques Used in Hacking

    phishing, malware, social engineering, brute force attacks

  • 19

    Motivations for Hacking

    financial gain, political, curiosity, personal gain

  • 20

    Types of E-commerce

    b2c, b2b, c2c, c2b

  • 21

    Involves transactions between businesses and individual consumers.

    b2c

  • 22

    Involves transactions between two businesses.

    b2b

  • 23

    Involves transactions between individual consumers, often facilitated by a third-party platform.

    c2c

  • 24

    Involves individuals selling products or services to businesses.

    c2b

  • 25

    Trade cycle

    search, negotiation, order, payment, delivery, invoicing, warranty, after sales service

  • 26

    Mobile generation

    1g(1980), 2g(1991), 3g(2003), 4g(2009), 5g(2019)

  • 27

    1g features

    large, no data, analog voice communication

  • 28

    2g

    digital voice communication, sms and mms, encryption, 64 kbps

  • 29

    3g

    2mbps, video calling, mobile app

  • 30

    4g

    1gbps, HD video, enchance mobile app, based on ip

  • 31

    5g

    low latency, 10 gbps, massive iot, enchanced mobile broad