Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as _ _ _ _

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as _______.
waring
trolling
phishing
ransom
2 points
QUESTION 3
The programming language that provides a direct one-to-one correspondence between human-understandable words and machine-understandable numbers is ________ language.
scripting
assembly
visual basic
2 points
QUESTION 4
Which of the following two office suites are most closely related to one another? (Select two.)
LibreOffice + OpenOffice
GNOME Office + Microsoft Office
KOffice + Microsoft Office
Microsoft Office + GNOME Office
2 points
QUESTION 5
True or false: You can modify graphics files from a text-mode login using Linux.
True
False
2 points
QUESTION 6
True or false: All Linux Web browsers are GUI programs.
True
False
2 points
QUESTION 7
Which of the following programming languages is most often implemented as a compiled language?
Python
Bash shell
Perl
C++
PHP
2 points
QUESTION 8
Postfix is a server that implements the SMTP protocol. (Provide the protocols acronym.)
True
False
2 points
QUESTION 9
True or false: xinetd is a super server.
True
False
2 points
QUESTION 10
True or false: KDE is built atop the Qt widget set.
True
False
2 points
QUESTION 11
Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system?
Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft.
The server computer, if compromised, could create a new account on your computer, thus compromising it.
A malicious Web site can steal your local Linux login password and use it to break into your computer.
A virus intended for Windows, when delivered via a Web site to a Linux system, will damage your video card.
2 points
QUESTION 12
A terminal is a GUI program in which text-mode programs (including shells) run.
True
False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Server Query Performance Tuning

Authors: Sajal Dam, Grant Fritchey

4th Edition

1430267429, 9781430267423

More Books

Students also viewed these Databases questions

Question

How do Excel Pivot Tables handle data from non OLAP databases?

Answered: 1 week ago