Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please tell me each questions\' answer. (X) means that it can\'t be answer. Q1.

ID: 3605836 • Letter: P

Question

Please tell me each questions' answer. (X) means that it can't be answer.


Q1. The word SECURITY would require ______ of storage on a computer.
A: 8 bits
B: 8 bytes
C: 16 bits
D: 16 bytes (X)

Q2. It is common for programs to temporarily reserve blocks of memory for use while runnning. These blocks are referred to as _________.
A: Memory blocks (X)
B: RAM
C: registers
D: buffers

Q3. Since legitimate computer programs are written by humans, they often contain errors and/or bugs. Therefore, these programs may be subject to _______.
A: viruses
B: exploits
C: denial of service attacks
D: malicious code (X)

Q4. The period of time when viruses were mainly spread through portable media is reffered to as the ________ era.
A: classical
B: floppy
C: macro
D: Internet (X)

Q5. Attack kits __________.
A: continously try all password combinations until successful.
B: facilitate the creation of custom attck mechanism. (X)
C: install themselves on a computer and launch various spyware/adware application
D: spread through the internet via e-mail

Q6. Operating systems are stored in ____ and when a device is booted, it loads pieces into ____.
A: RAM ; ROM
B: RAM ; RAM
C: ROM ; RAM (X)
D: ROM ; ROM

Q7. A series of programs, known as _____, attack an operating sysyem hoping to discover all passwords
A: worms
B: malware
C: Pwdcrack (X)
D: L0phtcrack

Explanation / Answer

Q1. A: 8 bits
Because the word contains 8 characters and each character requires 1 byte.
Q2. C: registers
These are temporary storages for the processes.
Q3. B: exploits
Improper code leads to exploits
Q4. B: floppy
Q5. C: install themselves on a computer and launch various spyware/adware application
Used by the ones who do not know coding
Q6. A: RAM ; ROM
Q7.D: L0phtcrack
It is a password auditing and recovery application to recover and test strength of passwords.

**Comment for any further queries.