Sociology Questions
Explore questions in the Sociology category that you can ask Spark.E!
Software that secretly collects information about you; it usually resides on a website or in a service such as your email program.
Which is an example of actions I might take on social media that could jeopardize my safety and the safety of my friends and family?
Read the following scenario. What could you have done differently to prevent this from happening (choose the BEST answer)? You are in your high school cafeteria one morning, planning to meet your friends. You decide to go get something to drink and leave your laptop out on the table. You figure you'll only be away for a minute to two—What's the worst that could happen? You get your drink, come back to the table, and see that your friends arrived while you were away. After chatting with them for a bit, you close your laptop and head off to your classes for the day. The next time you open your laptop, you notice a suspicious file on your Desktop that you've never seen before. You start to think about all of the information available and at risk on your computer and you begin to worry about how that file might have gotten on your computer.
A/an ____________ is software that determines what is allowed into or out of a network. Not everything on the internet should be allowed in, and companies usually don't want everything to get out.
What should you do if you accidentally open a suspicious email?
An emulation of a computer system describes a/an:
. Software that is spread by people, specifically user actions, usually through emails, websites, and chats. A _________ infects your computer, causing a wide variety of problems.
You should reply to suspicious emails to tell them to stop sending you messages.
Which is software that is intended to do harm or damage.
A small local area network of computers and devices is called a:
Similar to a virus except that a ______ does not need a human to spread, rather it can replicate on its own to infect other computers.
Which of the following is NOT a part of the Cybersecurity Lifecycle?
What is software that supports a computer's basic functioning? Every general purpose computer has this.
What is the file extension of the application used to crack passwords?
Which is a broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question?
A ______________ is a network device that controls what data goes to which computer on the network based on a MAC address. Not all of the computers in a LAN need the same data, so a ______________ helps reduce the amount of data getting transferred over the network.
A/An _______________ file (.bat) is about to be downloaded to your computer. This could contain malicious content and could cause harm to your computer.
The arrangement of the various elements (computers, routers, switches, etc) of a network is called a:
Which is irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail?
Which is an example of actions I might take on social media that could be considered unethical or unkind?