What is the term used to denote the unauthorized and illegal accessing of computer programs, often with criminal intent?
- (A) Virus
- (B) Hacking
- (C) Plagiarism
- (D) Breach
- (B) Hacking
________ is done to protect data and passwords.
- (A) Verification
- (B) Encryption
- (8) Authentication
- (D) Authorization
- (B) Encryption
Small files that are deposited on user’s hard drive when they visit a website are best described as:
- (A) Trackers
- (B) Profiles
- (C) Cookies
- (D) Codes
- (C) Cookies
Any crime that involves a computer and internet is:
- (A) Organized Crime
- (B) Cyber Crime
- (C) Professional Crime
- (D) Social Crime
- (B) Cyber Crime
The exclusive right to use a creative work or allow someone else to do so is called:
- (a) Copyright
- (b) Software license
- (c) Copyleft
- (d) Sharing
- (a) Copyright
Making illegal software is called: copies of copyrighted:
- (a) Copyleft
- (b) Theft
- (c) Piracy
- (d) Either b or c
- (c) Piracy
A person who commits computer crimes is called a:
- (a) Hacker
- (b) Spy
- (c) Computer consultant
- (d) Company inside
- (a) Hacker
GUI stands for:
- (a) Graphical User Internet
- (b) Graphical user Interface
- (c) Geographical User Interface
- (d) Get up Interface
- (b) Graphical user Interface
The file to which a virus is attached is called:
- (a) Useless file
- (b) Corrupted file
- (c) Infected file
- (d) Quarantine file
- (c) Infected file