Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.

_____ 1. A group of sectors where files are stored on a disk.
_____ 2. A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks.
_____ 3. The action or attack by a computer virus or malware.
_____ 4. A form of malware that prevents you from using your computer until you pay a fine or fee.
_____ 5. A concentric circle created on a disk during low-level disk formatting.
_____ 6. An anonymous, digital, encrypted currency.
_____ 7. A software update that addresses individual problems as they are discovered.
_____ 8. A form of self-replicating malware that does not need a host to travel.
_____ 9. A setting that disables or turns off all network adapters on a device.
_____ 10. A process that occurs as files are broken into small pieces that are stored in nonadjacent or noncontiguous clusters on the disk.

A Airplane mode
B Bitcoin
C Cluster
D Computer zombie
E File fragmentation
F Hotfix
G Payload
H Ransomware
I Track
J Worm


1. A group of sectors where files are stored on a disk.
C. Cluster
2. A computer that is part of a botnet, controlled by a master, and used to launch various types of attacks.
D. Computer zombie
3. The action or attack by a computer virus or malware.
G. Payload
4. A form of malware that prevents you from using your computer until you pay a fine or fee.
H. Ransomware
5. A concentric circle created on a disk during low-level disk formatting.
I. Track
6. An anonymous, digital, encrypted currency.
B. Bitcoin
7. A software update that addresses individual problems as they are discovered.
F. Hotfix
8. A form of self-replicating malware that does not need a host to travel.
J. Worm
9. A setting that disables or turns off all network adapters on a device.
A. Airplane mode
10. A process that occurs as files are broken into small pieces that are stored in nonadjacent or noncontiguous clusters on the disk.
E. File fragmentation

Computer Science & Information Technology

You might also like to view...

Applying normalisation to 3NF on the table shown results in the formation of the three 3NF tables shown

What will be an ideal response?

Computer Science & Information Technology

Explain why a view is like a subroutine.

What will be an ideal response?

Computer Science & Information Technology

To change the spacing after a paragraph use ________ to adjust the spacing

A) Page Layout tab, spacing B) Page Layout tab, paragraph C) Insert tab, line spacing D) Insert tab, paragraph

Computer Science & Information Technology

A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.?

A. ?function B. ?goto C. ?method D. ?iteration

Computer Science & Information Technology