Identify the letter of the choice that best matches the phrase or definition.

A. An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
B. A notice that guarantees a user or a website is legitimate
C. An authorized person or company that issues and verifies digital certificates
D. Any event or action that could cause a loss of or damage to computer or mobile device hardware
E. Protects a network's resources from intrusion
F. A group of compromised computers
G. The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
H. A scam in which a button or link on a website contains a malicious program
I. In the encryption process, the encrypted (scrambled) data
J. An assault whose purpose is to disrupt computer access to an Internet service
K. Outlines the activities for which a computer or network may and may not be used
L. In the encryption process, the unencrypted, readable data
M. A program that performs a repetitive task on a network
N. The unauthorized and illegal duplication of copyrighted software
O. Hacker who usually does not have advanced computer and technical skills


A. digital signature
B. digital certificate
C. CA
D. digital security risk
E. firewall
F. botnet
G. zombie
H. clickjacking
I. ciphertext
J. DoS attack
K. AUP
L. plaintext
M. bot
N. piracy
O. script kiddie

Computer Science & Information Technology

You might also like to view...

A(n) ________ is used exclusively by a select group of employees, customers, suppliers, volunteers, or supporters

Fill in the blank(s) with correct word

Computer Science & Information Technology

A JCheckBox is selected when its isSelected method returns _____________.

a) on b) true c) selected d) checked

Computer Science & Information Technology

Write a program that merges two ordered list objects of integers into a single ordered list object of integers. Function merge should receive references to each of the list objects to be merged and reference to a list object into which the merged elements will be placed.

What will be an ideal response?

Computer Science & Information Technology

In Delicious, you can search for bookmarks by entering a tag into the ____.

A. search prompt B. See more bookmarks box C. search box D. Explore Tags tab

Computer Science & Information Technology