Match the following terms to their meanings:

I. viruses
II. spyware
III. firewall
IV. Windows Defender
V. Windows Updates

A. modifications to the operating system
B. computer program that attaches itself to another program and attempts to spread to other computers
C. software that helps to protect against unauthorized access of your computer
D. software that is often downloaded without your being aware
E. antispyware and antivirus software


B, D, C, E, A

Computer Science & Information Technology

You might also like to view...

You can decrease the size of your database file by applying the ________ Database tool

A) Sorting and Filtering B) Delete Data C) Manage D) Compact and Repair

Computer Science & Information Technology

What happens if you send your linked files to another user at another location?

A. The links will be broken. B. The links will remain intact. C. The links will be read-only. D. The links will become icons.

Computer Science & Information Technology

List the six validator tools available in the Validation section of the toolbox that are used for validating user input.

What will be an ideal response?

Computer Science & Information Technology

Which of the following can be used to control specific commands that can be executed on a network infrastructure device?

A. LDAP B. Kerberos C. SAML D. TACACS+

Computer Science & Information Technology