Final Exam Day 5 Flashcards
A cell ____________ is the coordinates of that cell.
Reference
The _____________ may be used to copy formulas to adjacent cells.
Fill handle
Use an ____________ function to determine the value of a cell based on a logical test.
IF
The ____________ function displays the smallest value in a range.
MIN
_________________ is an excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.
Flash Fill
The term ___________ refers to all online or internet based attacks.
Cybercrime
____________ may download a virus onto a mobile device when an object on the display is tapped.
Key logging
______________ is the act of stealing digital equipment.
Hardware Theft
A ______________ examiner will inspect the contents of a computer or network to discover, collect an analyze evidence.
Digital Forensics
The most common form of software theft is _____________, which is the unauthorized and illegal duplication of software theft.
Software Piracy
A secure site is a website that uses ____________ techniques to secure its data.
Encryption
____________ is a scam in which an official looking email is used in an attempt to obtain information from you.
Phishing
A ____________ is a written guideline that helps determine whether a specification is ethical/unethical/not allowed.
Code of Conduct
A botnet is used to _____________.
Attach other networks.
A fingerprint reader, used to gain access to a computer, is an example of a ___________ device.
Biometric
A person who pays to obtain software to use in hacking into a system would be an example of a ____________.
Script Kiddie
One type of ____________ theft occurs when a program is intentionally erased.
Software
A digital ___________ is an encrypted code that can be attached to an electronic message to verify the identity of the user.
Signature
____________ is gathering unauthorized access to or obtaining confidential information by taking advantage of the trusting nature of some victims and the naivety of others.
Social Engineering
The restriction of access to certain material on a network is ___________.
Content Filtering
A ____________ is a notice that guarantees that a user or a website is legitimate.
License Agreement
A _____________ is hardware or software that protects against network intrusion.
Firewall
A _______________ gives authors, artists, and other creators of original work exclusive right to duplicate, publish, or sell their materials.
Copyright
A ___________ could be a file that is duplicated and stored offsite for use in case the original is destroyed.
Backup
_____________ is used by some manufacturers to ensure that computers using their software are legally licensed.
Product Activation