CSA 2 3.00 and 4.00 Open Notes Quiz

Is this your test? Login to manage it. If not, you can build an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Using the Microsoft logo on your business card without obtaining permission from Microsoft is a copyright violation.
2.
1 point
The owner of ________ ________ has the rights to control the use of the information.
3.
1 point
Microsoft Word is an example of a:
4.
1 point
The protection of a computer system and its data from accidental or intentional loss and tampering is computer privacy.
5.
1 point
Computer Security and Computer Privacy are two very similar things.
6.
1 point
A trojan horse is a type of what?
7.
1 point
Which of the following passwords is the STRONGEST?
8.
1 point
Copying a report from someone and putting your name on it is an example of what?
9.
1 point
What type of person/people extracts personal information, such as passwords and credit card details, from computer users and then uses the information for malicious purposes.
10.
1 point
How high should a firewall be set if you do not want ANY type of inappropriate information on websites to show up, be seen, or come through your computer? (Hint: picture a wall and how much or how little can go over it)
11.
1 point
Software is also known as:
12.
1 point
Which has the potential to do the most damage to a computer?
13.
1 point
This type of program allows your to send and receive messages instantly.
14.
1 point
This type of software allows users to create budgets and manage accounts and perform mathematical calcuations.
15.
1 point
A cookie is a small file on a computer that is created when a user visits a Web site.