{ "key_pair_value_system": true, "answer_rating_count": "", "question_feedback_html": { "html_star": "", "html_star_feedback": "" }, "answer_average_rating_value": "", "answer_date_js": "2024-05-26T09:04:05-04:00", "answer_date": "2024-05-26 09:04:05", "is_docs_available": "", "is_excel_available": "", "is_pdf_available": "", "count_file_available": 0, "main_page": "student_question_view", "question_id": "1730893", "url": "\/study-help\/questions\/7-which-of-the-following-statement-isare-false-a-adware-1730893", "question_creation_date_js": "2024-05-26T09:04:05-04:00", "question_creation_date": "May 26, 2024 09:04 AM", "meta_title": "[Solved] 7) Which of the following statement is\/ar | SolutionInn", "meta_description": "Answer of - 7) Which of the following statement is\/are FALSE? A. Adware is a software which can collect users' information (e.g. i | SolutionInn", "meta_keywords": "7,statement,\/,false,adware,software,collect,users,information,internet,surfing,habits", "question_title_h1": " 7) Which of the following statement is\/are FALSE? A. Adware is a software which can collect users' information (e.g. internet surfing habits, personal information,", "question_title": " 7) Which of the following statement is\/are FALSE? A. Adware is", "question_title_for_js_snippet": "7) Which of the following statement is are FALSE A Adware is a software which can collect users' information (e g internet surfing habits, personal information, bank account, etc ), and send to another entity without their consent B Spamming is a software that hides within or looks like a legitimate program and it can open a back door (a security hole) to hackers so that they can hack in the computer or the network C The events of breaking the security mechanism of a computer network are called hacking The person who hacks is called a hacker D Besides hacking, we also use the term routing to describe those activities that may cause damages to computers and networks, or cause some kinds of loss to a user E Distributed Denial of Service (DDoS) is an attempt to make an online service unavailable by overwhelming it with traffic from a single source 8) Which of the following statement(s) is are TRUE A To detect and prevent malware attacks, we should install antivirus software E g NOD 32, McAfee, Norton, Kaspersky, etc B To encrypt is to scramble and convert the original data or information into an unintelligible and meaningless form C To decrypt a file, one needs to provide a piece of data correctly, and the piece of data is 4 usually called the encryption key D Computer hardware and software can be protected through encryption E For an infected computer, firewall can scan viruses and other malware, then remove them, or quarantine the infected files ", "question_description": "\"image", "transcribed_text": "7) Which of the following statement is\/are FALSE? A. Adware is a software which can collect users' information (e.g. internet surfing habits, personal information, bank account, etc.), and send to another entity without their consent. B. Spamming is a software that hides within or looks like a legitimate program and it can open a \"back door\" (a security hole) to hackers so that they can hack in the computer or the network. C. The events of breaking the security mechanism of a computer network are called hacking. The person who hacks is called a hacker. D. Besides hacking, we also use the term \"routing\" to describe those activities that may cause damages to computers and networks, or cause some kinds of loss to a user. E. Distributed Denial of Service (DDoS) is an attempt to make an online service unavailable by overwhelming it with traffic from a single source. 8) Which of the following statement(s) is\/are TRUE? A. To detect and prevent malware attacks, we should install antivirus software. E.g. NOD 32, McAfee, Norton, Kaspersky, etc. B. To encrypt is to scramble and convert the original data or information into an unintelligible and meaningless form. C. To decrypt a file, one needs to provide a piece of data correctly, and the piece of data is 4 usually called the encryption key. D. Computer hardware and software can be protected through encryption. E. For an infected computer, firewall can scan viruses and other malware, then remove them, or quarantine the infected files.", "related_book": { "title": "Cost management a strategic approach", "isbn": "73526940, 978-0073526942", "edition": "5th edition", "authors": "Edward J. Blocher, David E. Stout, Gary Cokins", "cover_image": "https:\/\/dsd5zvtm8ll6.cloudfront.net\/si.question.images\/book_images\/249.jpg", "uri": "\/textbooks\/cost-management-a-strategic-approach-5th-edition-249", "see_more_uri": "" }, "free_related_book": { "isbn": "0130384747", "uri": "\/textbooks\/c-how-to-program-4th-edition-9780130384744-102913", "name": "C++ How To Program", "edition": "4th Edition" }, "question_posted": "2024-05-26 09:04:05", "see_more_questions_link": "\/study-help\/questions\/business-finance-2024-September-22", "step_by_step_answer": "The Answer is in the image, click to view ...", "students_also_viewed": [ { "url": "\/study-help\/questions\/question-47-assault-on-college-campuses-can-no-longer-remain-634714", "description": "\"Assault on college campuses can no longer remain just a female issue, and universities nationwide must prepare males for the same protections it provides their female counterparts in college Title...", "stars": 3 }, { "url": "\/some-observers-compare-open-source-software-to-water-both-the", "description": "Some observers compare open source software to water. Both the software and water are free, but some companies manage to generate revenue from selling them. How?", "stars": 3 }, { "url": "\/study-help\/corporate-financial-accounting\/inventory-turnover-and-number-of-days-sales-in-inventory-obj-1778572", "description": "Inventory turnover and number of days sales in inventory Obj. 7 Financial statement data for years ending December 31 for Tango Company follow: 20Y7 20Y6 Cost of goods sold $3,864,000 $4,001,500...", "stars": 3 }, { "url": "\/study-help\/psychology\/i-think-we-should-wait-if-we-walk-on-the-1984641", "description": "I think we should wait. If we walk on the path and our mothers come to get us, they wont see us, and theyll worry. Missing the bus is bad enough. If my mom cant find me, shell be really mad! In what...", "stars": 3 }, { "url": "\/westan-corporation-uses-a-predetermined-overhead-rate-of-2310-per", "description": "Westan Corporation uses a predetermined overhead rate of $23.10 per direct labor-hour. This predetermined rate was based on 12,000 estimated direct labor-hours and $277,200 of estimated total...", "stars": 3 }, { "url": "\/study-help\/questions\/required-special-journal-where-applicablegeneral-journal-and-ledger-transactions-9856865", "description": "required special journal where applicable,general journal and ledger Transactions - week 5 You are now required to enter transactions that occurred during the final week of June into the company's...", "stars": 3 }, { "url": "\/study-help\/questions\/number-3-4-please-4-mathesons-electronic-device-proposal-is-7323082", "description": "number 3& 4 please. 4. Matheson's electronic device proposal is one of four investment proposal the company is considering. The electronic device is labeled as Investment A. Information relating to...", "stars": 3 }, { "url": "\/study-help\/questions\/tofrom-trucking-serves-two-segments-of-customers-one-segment-a-1008438", "description": "ToFrom Trucking serves two segments of customers. One segment (A) is willing to pay $3.50 per cubic foot but wants to commit to a shipment with only 24 hours' notice. The other segment (B) is willing...", "stars": 3 }, { "url": "\/study-help\/questions\/a-let-z-be-a-standard-normal-find-pr196-3-1002217", "description": "(a) Let Z be a standard normal. Find Pr(-1.96 3). (c) Let X be a t-distribution with df=10. Estimate Pr(-2.2 X*)=.05? (e) Let X be a F10,00 distribution. What value X* solves Pr(X>X*)=.05?", "stars": 3 }, { "url": "\/study-help\/questions\/time-75-minutes-problem-1-2-points-calculate-i-1004564", "description": "Time: 75 minutes Problem 1 (2 points) Calculate I = fc(1+ y)dl, where C is the under half of the circle 2+ y = 4.", "stars": 3 }, { "url": "\/study-help\/questions\/build-a-lp-model-for-the-following-scenario-but-dont-1007082", "description": "Build a LP model for the following scenario, but don't solve the LP model that you made. A company manufactures two products whose unit profits are $17 and $15, respectively. The company has budgeted...", "stars": 3 }, { "url": "\/study-help\/questions\/what-is-the-intercept-for-the-regression-equation-to-forecast-1003339", "description": "What is the intercept for the regression equation to forecast demand, in the worksheet: Food Truck Demand?", "stars": 3 }, { "url": "\/study-help\/questions\/suppose-a-1-x-computer-can-run-n-instructions-in-8421850", "description": "Suppose a 1 X computer can run n instructions in time t . A 2 X computer can run 2 n instructions in time t , etc. How much time would a quadratic complexity algorithm run on a 2 X computer for a...", "stars": 3 }, { "url": "\/outline-some-of-the-major-problems-confronting-an-international-advertiser", "description": "Outline some of the major problems confronting an international advertiser.", "stars": 3 }, { "url": "\/study-help\/international-business\/what-are-some-key-trends-affecting-international-labor-lo1-1678090", "description": "What are some key trends affecting international labor? LO.1", "stars": 3.5 }, { "url": "\/study-help\/international-business\/global-wannabe-gw-a-manufacturer-of-musical-instruments-is-eager-1678093", "description": "Global Wannabe (GW), a manufacturer of musical instruments, is eager to internationalize. New to international business, within the coming four years, senior management wants GW to generate at least...", "stars": 3.5 }, { "url": "\/study-help\/international-business\/suppose-you-are-working-abroad-as-an-expatriate-for-an-1678089", "description": "Suppose you are working abroad as an expatriate for an MNE. What are typical components you would expect to have in your compensation package? LO.1", "stars": 3.5 } ], "next_back_navigation": { "previous": "\/study-help\/questions\/autosave-off-financial-accounting-reviewspring20221-saved-to-my-mac-1730892", "next": "\/study-help\/questions\/teal-mountain-company-leased-equipment-from-costner-company-beginning-on-1730894" }, "breadcrumbs": [ { "name": "Study help", "link": "https:\/\/www.solutioninn.com\/study-help\/questions-and-answers" }, { "name": "Business", "link": "https:\/\/www.solutioninn.com\/study-help\/questions-and-answers\/business" }, { "name": "Accounting", "link": "https:\/\/www.solutioninn.com\/study-help\/questions\/business-accounting" }, { "name": " 7) Which of the following statement is\/are FALSE? A. Adware is", "link": "https:\/\/www.solutioninn.com\/study-help\/questions\/7-which-of-the-following-statement-isare-false-a-adware-1730893" } ], "skill_details": { "skill_id": "9", "skill_name": "Accounting", "parent_id": "1" } } "1" } }