Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 5 In order for the CPU to process a program\'s instructions, it must fi

ID: 3872956 • Letter: Q

Question

QUESTION 5

In order for the CPU to process a program's instructions, it must first be loaded into _____ .

    A.   RAM

    B.   ROM

    C.   the bus

    D.   cyberspace

QUESTION 6

A Gigabyte of data is roughly ________ bytes.

    A.   one thousand

    B.   one million

    C.   one billion

    D.   one trillion

QUESTION 7

In its raw binary form, ______ language is the only language directly interpretable by the CPU.

    A.   assembly

    B.   high-level

    C.   processing

    D.   machine

QUESTION 8

The word SECURITY would require _____ of storage on a computer

    A.   8 bits

    B.   8 bytes

    C.   16 bits

    D.   16 bytes

QUESTION 9

A new hard drive must be ____ before it can be used by the computer.

    A.   formatted

    B.   initialized

    C.   defragmented

    D.   erased

QUESTION 10

Computers specifically tuned to offer service to end users over the Internet are referred to as _____ .

    A.   zombies

    B.   web browsers

    C.   servers

    D.   web pages

.

QUESTION 11

Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2?

    A.   26 * 26

    B.   52 * 52

    C.   26 * 2

    D.   52 * 2

  

QUESTION 12

_____ is a common term that includes spyware, adware, Trojan horses, etc.

    A.   Malware

    B.   Exploit

    C.   Virus

    D.   Spam

QUESTION 13

It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.

    A.   memory blocks

    B.   RAM

    C.   registers

    D.   buffers

  

QUESTION 14

Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .

       viruses

       exploits

       denial of service attacks

       malicious code

  

QUESTION 15

The period of time when viruses were mainly spread through portable media is referred to as the _____ era.

    A.   classical

    B.   floppy

    C.   macro

    D.   Internet

QUESTION 16

Attack kits _______________ .

    A.   continuously try all password combinations until successful

    B.   facilitate the creation of custom attack mechanisms

    C.   install themselves on a computer and launch various spyware/adware applications

    D.   spread through the Internet via e-mail

QUESTION 17

Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .

    A.   RAM; ROM

    B.   RAM; RAM

    C.   ROM; RAM

    D.   ROM; ROM

QUESTION 18

An operating system is not responsible for _____ .

    A.   access control

    B.   permissions and privleges

    C.   safe web browsing

    D.   file system management

QUESTION 19

Unlike passwords, usernames (or userIDs) are typically ______ .

    A.   public and easy to locate

    B.   private and hard to locate

    C.   frequently changing

    D.   very long sequences of characters

QUESTION 20

A series of programs, known as _____, attack an operating system hoping to discover all passwords.

    A.   worms

    B.   malware

    C.   pwdcrack

    D.   L0phtcrack

   

QUESTION 21

For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______ .

    A.   replace passwords

    B.   supplement passwords

    C.   replace usernames

    D.   supplement usernames

QUESTION 22

_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.

    A.   spyware

    B.   adware

    C.   Trojan horses

    D.   worms

QUESTION 23

Websites will often use ____ to store session data for easy recall the next time a user visits.

    A.   RAM

    B.   brownies

    C.   cookies

    D.   the CPU

QUESTION 24

The FBI MoneyPak was a famous example of _______ .

       an e-mail virus

       adware

       spyware

       ransomware

QUESTION 25

_______ is structured in such a way that every location is uniquely addressed byte by byte.

    A.   Memory (RAM)

    B.   Storage (ROM)

    C.   A flash drive

    D.   The CPU

Explanation / Answer

In order for the CPU to process a program's instructions, it must first be loaded into
Answer: RAM

A Gigabyte of data is roughly ________ bytes.

Answer: one billion

In its raw binary form, ______ language is the only language directly interpretable by the CPU.

Answer: assembly

The word SECURITY would require _____ of storage on a computer
Answer: 8 bits

A new hard drive must be ____ before it can be used by the computer.
Answer: formatted

Computers specifically tuned to offer service to end users over the Internet are referred to as
Answer: servers

Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2

Answer: 26 * 26

_____ is a common term that includes spyware, adware, Trojan horses, etc.

Answer: Virus


It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.

Answer: registers

Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .

Answer: malicious code

The period of time when viruses were mainly spread through portable media is referred to as the _____ era.

Answer: Internet


Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .

Answer: RAM; ROM

An operating system is not responsible for _____ .

Answer: safe web browsing

Unlike passwords, usernames (or userIDs) are typically ______ .

Answer: public and easy to locate

A series of programs, known as _____, attack an operating system hoping to discover all passwords.

Answer: pwdcrack

For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______

Answer: replace passwords

_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.

Answer: Trojan horses

Websites will often use ____ to store session data for easy recall the next time a user visits.

Answer: cookies


The FBI MoneyPak was a famous example of _______ .

Answer :ransomware

_______ is structured in such a way that every location is uniquely addressed byte by byte.

Answer: Storage

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote