Final Exam Day 5 Flashcards

1
Q

A cell ____________ is the coordinates of that cell.

A

Reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _____________ may be used to copy formulas to adjacent cells.

A

Fill handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use an ____________ function to determine the value of a cell based on a logical test.

A

IF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ____________ function displays the smallest value in a range.

A

MIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________________ is an excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.

A

Flash Fill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term ___________ refers to all online or internet based attacks.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____________ may download a virus onto a mobile device when an object on the display is tapped.

A

Key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

______________ is the act of stealing digital equipment.

A

Hardware Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ______________ examiner will inspect the contents of a computer or network to discover, collect an analyze evidence.

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The most common form of software theft is _____________, which is the unauthorized and illegal duplication of software theft.

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A secure site is a website that uses ____________ techniques to secure its data.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____________ is a scam in which an official looking email is used in an attempt to obtain information from you.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____________ is a written guideline that helps determine whether a specification is ethical/unethical/not allowed.

A

Code of Conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A botnet is used to _____________.

A

Attach other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A fingerprint reader, used to gain access to a computer, is an example of a ___________ device.

A

Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A person who pays to obtain software to use in hacking into a system would be an example of a ____________.

A

Script Kiddie

17
Q

One type of ____________ theft occurs when a program is intentionally erased.

A

Software

18
Q

A digital ___________ is an encrypted code that can be attached to an electronic message to verify the identity of the user.

A

Signature

19
Q

____________ is gathering unauthorized access to or obtaining confidential information by taking advantage of the trusting nature of some victims and the naivety of others.

A

Social Engineering

20
Q

The restriction of access to certain material on a network is ___________.

A

Content Filtering

21
Q

A ____________ is a notice that guarantees that a user or a website is legitimate.

A

License Agreement

22
Q

A _____________ is hardware or software that protects against network intrusion.

A

Firewall

23
Q

A _______________ gives authors, artists, and other creators of original work exclusive right to duplicate, publish, or sell their materials.

A

Copyright

24
Q

A ___________ could be a file that is duplicated and stored offsite for use in case the original is destroyed.

A

Backup

25
Q

_____________ is used by some manufacturers to ensure that computers using their software are legally licensed.

A

Product Activation