Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
By default, File Explorer shows you file ownership.
What is a protocol for the rules of communication that web sites use to exchange data.
A ___________is an agreed upon set of rules. In computer networking, they define the rules for how computers exchange data.
When a computer has a problem, such as a power outage, malware, or other unexpected condition, you can lose data. Many operating systems have a ___________ so that if a major problem occurs, the system can recover quickly.
What type of file is ImportantMessage1.txt.bat?
A ___________ is an identification number used by an operating system to manage specific programs and their activity.
What does the "S" stand for in HTTPS?
______________ software is one of the most important tools you have to fight malware. It runs on your computer, looking for many different types of malware from many different sources. But new malware is created and invented every day, so it needs to be updated frequently.
Its always best practice to share identity-revealing information to the general public.
A malicious program disguised as legitimate software. Users intentionally install a Trojan horse, thinking they are installing valid software.
In diagram 1, which is a firewall?
What is the policy of favoring native-born individuals over immigrants called?
You receive an email from a person that says it's your friend. The email contains links to online coupons and tells you to pass it on to 10 friends. Do you:
While the internet can pose many dangers and risks, there are also many ways you can protect yourself against those dangers and risks. How can you protect yourself?
In cybersecurity terms, a _________________ is a weakness in a system that allows an attacker to gain unauthorized access.
_______________ your software helps you avoid becoming a weak link and it strengthens the entire internet.
In a simple local area network, a _________ is a computer that contains resources needed by users of the LAN, such as files, computer applications, or large databases.
Malicious software that bypasses the normal, secure, or restricted access.
Keep your devices up to date; frequently check for operating system and software updates, or configure your devices for automatic updates.
Click hyperlinks in a suspicious email because they might send you to malicious websites or unwanted commercial sites that will send you more spam email.