Match each item with an statement below:

A. unsolicited e-mail.
B. U.S. law against spam.
C. software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
D. a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
E. term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
F. determines how many days a user must keep new passwords before they can change them.
G. determines the number of unique new passwords a user must use before an old password can be reused.
H. how many days a password can be used before the user is required to change it.
I. attempts to prevent multiple wireless devices from transmitting at the same time.


A. Spam
B. CAN-SPAM
C. Adware
D. Password
E. Malware
F. Minimum password age
G. Password history
H. Maximum password age
I. CSMA/CA

Computer Science & Information Technology

You might also like to view...

You can specify certain actions and configurations, called ____, that Access performs when a database opens.

A. database actions B. events C. macros D. start-up options

Computer Science & Information Technology

Theevt.pageYproperty returns the vertical coordinate (in pixels) of the mouse pointer relative to the document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A. dictionary B. brute force C. DoS D. rogue AP

Computer Science & Information Technology

With a dial-up connection, you use your regular phone lines to connect to the Internet

Indicate whether the statement is true or false

Computer Science & Information Technology