QUESTION 5 In order for the CPU to process a program\'s instructions, it must fi
ID: 3872956 • Letter: Q
Question
QUESTION 5
In order for the CPU to process a program's instructions, it must first be loaded into _____ .
A. RAM
B. ROM
C. the bus
D. cyberspace
QUESTION 6
A Gigabyte of data is roughly ________ bytes.
A. one thousand
B. one million
C. one billion
D. one trillion
QUESTION 7
In its raw binary form, ______ language is the only language directly interpretable by the CPU.
A. assembly
B. high-level
C. processing
D. machine
QUESTION 8
The word SECURITY would require _____ of storage on a computer
A. 8 bits
B. 8 bytes
C. 16 bits
D. 16 bytes
QUESTION 9
A new hard drive must be ____ before it can be used by the computer.
A. formatted
B. initialized
C. defragmented
D. erased
QUESTION 10
Computers specifically tuned to offer service to end users over the Internet are referred to as _____ .
A. zombies
B. web browsers
C. servers
D. web pages
.
QUESTION 11
Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2?
A. 26 * 26
B. 52 * 52
C. 26 * 2
D. 52 * 2
QUESTION 12
_____ is a common term that includes spyware, adware, Trojan horses, etc.
A. Malware
B. Exploit
C. Virus
D. Spam
QUESTION 13
It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.
A. memory blocks
B. RAM
C. registers
D. buffers
QUESTION 14
Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .
viruses
exploits
denial of service attacks
malicious code
QUESTION 15
The period of time when viruses were mainly spread through portable media is referred to as the _____ era.
A. classical
B. floppy
C. macro
D. Internet
QUESTION 16
Attack kits _______________ .
A. continuously try all password combinations until successful
B. facilitate the creation of custom attack mechanisms
C. install themselves on a computer and launch various spyware/adware applications
D. spread through the Internet via e-mail
QUESTION 17
Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .
A. RAM; ROM
B. RAM; RAM
C. ROM; RAM
D. ROM; ROM
QUESTION 18
An operating system is not responsible for _____ .
A. access control
B. permissions and privleges
C. safe web browsing
D. file system management
QUESTION 19
Unlike passwords, usernames (or userIDs) are typically ______ .
A. public and easy to locate
B. private and hard to locate
C. frequently changing
D. very long sequences of characters
QUESTION 20
A series of programs, known as _____, attack an operating system hoping to discover all passwords.
A. worms
B. malware
C. pwdcrack
D. L0phtcrack
QUESTION 21
For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______ .
A. replace passwords
B. supplement passwords
C. replace usernames
D. supplement usernames
QUESTION 22
_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.
A. spyware
B. adware
C. Trojan horses
D. worms
QUESTION 23
Websites will often use ____ to store session data for easy recall the next time a user visits.
A. RAM
B. brownies
C. cookies
D. the CPU
QUESTION 24
The FBI MoneyPak was a famous example of _______ .
an e-mail virus
adware
spyware
ransomware
QUESTION 25
_______ is structured in such a way that every location is uniquely addressed byte by byte.
A. Memory (RAM)
B. Storage (ROM)
C. A flash drive
D. The CPU
Explanation / Answer
In order for the CPU to process a program's instructions, it must first be loaded into
Answer: RAM
A Gigabyte of data is roughly ________ bytes.
Answer: one billion
In its raw binary form, ______ language is the only language directly interpretable by the CPU.
Answer: assembly
The word SECURITY would require _____ of storage on a computer
Answer: 8 bits
A new hard drive must be ____ before it can be used by the computer.
Answer: formatted
Computers specifically tuned to offer service to end users over the Internet are referred to as
Answer: servers
Assuming you can only use upper and lower case letters, how many possible passwords are there of length 2
Answer: 26 * 26
_____ is a common term that includes spyware, adware, Trojan horses, etc.
Answer: Virus
It is common for programs to temporarily reserve blocks of memory for use while running. These blocks are referred to as _____.
Answer: registers
Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _________ .
Answer: malicious code
The period of time when viruses were mainly spread through portable media is referred to as the _____ era.
Answer: Internet
Operating systems are stored in ______ and when a device is booted, it loads pieces into _____ .
Answer: RAM; ROM
An operating system is not responsible for _____ .
Answer: safe web browsing
Unlike passwords, usernames (or userIDs) are typically ______ .
Answer: public and easy to locate
A series of programs, known as _____, attack an operating system hoping to discover all passwords.
Answer: pwdcrack
For increased security, biometric devices (hand readers, retinal scanners, fingerprint readers, etc.) are often used to ______
Answer: replace passwords
_____ are programs that appear legitimate, so users willingly install them on their machines only to find out they also include malicious code.
Answer: Trojan horses
Websites will often use ____ to store session data for easy recall the next time a user visits.
Answer: cookies
The FBI MoneyPak was a famous example of _______ .
Answer :ransomware
_______ is structured in such a way that every location is uniquely addressed byte by byte.
Answer: Storage
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.