Escolar Documentos
Profissional Documentos
Cultura Documentos
* Instruction: Read each statement or question below carefully and fill in the blank with the correct
answer.
______________________ 1. uses the internet web technologies to deliver information and services to
users or other information systems / application.
______________________ 2. creates a foundation that ensures object code will execute successfully.
______________________ 3. a platform for all the users which are connected to it.
______________________ 4. you can send and receive messages, emails and you can also chat and
make online calls.
______________________ 5. you can send and receive money online.
______________________ 6. you can get update of news and latest events without purchasing
newspapers.
______________________ 7. you can start your online business and can also perform online marketing
of your product
______________________ 8. you can learn online by searching on your required material or learn
through distance learning.
______________________ 9. consists of hardware, an operating system and coordinating programs that
use the instruction set for a particular processor or microprocessor.
______________________ 10. a big network which is formed by connecting multiple small networks.
______________________ 11. current action that could cause a loss of/damage to computer hardware,
software, data, information or processing capability.
______________________ 12. Vulnerable computer that is set up to entice an intruder to break into it.
______________________ 24. Using a computer or it's data for unapproved/possibly illegal activities.
* Instruction: Read each statement or question below carefully and encircle the correct answer.
2. Uses the internet web technologies to deliver information and services to users or other information
systems / application.
A. online system B. platform
C. internet D. collaboration platform
5. Current action that could cause a loss of/damage to computer hardware, software, data, information
or processing capability.
A. COMPUTER SECURITY RISK B. Honeypot
C. CYBERCRIME D. Hackers
7. You can send and receive messages, emails and you can also chat and make online calls.
A. online system B. platform
C. internet D. collaboration platform
14. Program/set of instructions in a program that allows users to bypass security controls.
A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access
15. Technique intruders use to make their network or Internet transmission appear legitimate.
A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access
19. Authenticates a person’s identity by translating a personal characteristic into a digital code that's
compared with a digital code in the computer.
A. Unauthorized use B. Biometric device
C. Hardware theft D. Hardware vandalism