Computer Forensics Exam Paper

28402 Words114 Pages
Quiz Submissions - Exam Studying 1 / 1 point Being ________ means being familiar enough with computers that you understand their capabilities and limitations. 1) computer savvy 2) technology literate 3) computer literate 4) computer competent Question 2 Unwanted e-mail is called ________. 1 / 1 point 1) spam 2) spyware 3) adware 4) software Question 3 1) avoiding hackers and viruses 2) protecting your privacy 3) being able to build a computer 4) using the Internet wisely Question 4 1) Computer forensics 2) Database mining 3) RFID 4) Information technology Question 5 1) data mining 2) data searching 3) data warehousing 4) data retrieval Question 6 0 / 1 point ________ is a wearable device that hangs around your neck consisting of…show more content…
1) True 2) False Question 38 0 / 1 point Computer forensics analyzes computer systems in gathering potential legal evidence. 1) True 2) False Question 39 0 / 1 point Biomedical chip implants are being used to provide sight to the blind. 1) True 2) False Question 40 0 / 1 point Affective computing is a science that attempts to produce machines that understand and can respond to human emotion. 1) True 2) False Question 41 0 / 1 point Being computer literate means being able to separate the real privacy and security risks from things that you don't have to worry about. 1) True 2) False Question 42 0 / 1 point Understanding how to use e-mail effectively is one example of what it means to be computer literate. 1) True 2) False Question 43 0 / 1 point Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information. 1) True 2) False Question 44 0 / 1 point A study by the National Research Council concludes that by the year 2030, computers will displace humans in 85 percent of the current…show more content…
1) system unit 2) output device 3) motherboard 4) input device Question 83 1) Toggle key 2) Function key 3) Control (Ctrl) key 4) Windows key Question 84 0 / 1 point ________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. 0 / 1 point The ________ is used in combination with other keys to perform shortcuts and special tasks. 1) Alt keys 2) Function keys 3) Control (Ctrl) keys 4) Windows keys Question 85 ________ microphones pick up sound from only one direction. 0 / 1 point 1) Magnetically shielded 2) Wireless 3) Unidirectional 4) Omnidirectional Question 86 0 / 1 point Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors. 1) two 2) three 3) five 4) six Question 87 0 / 1 point The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________. 1) stylus 2) touch pad 3) game control 4) trackball Question 88 0 / 1 point The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer

More about Computer Forensics Exam Paper

Open Document