• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Introduction To Pc Security
 

Introduction To Pc Security

on

  • 523 views

Introduction To Pc Security

Introduction To Pc Security

Statistics

Views

Total Views
523
Views on SlideShare
523
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Introduction To Pc Security Introduction To Pc Security Document Transcript

    •  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 1 quiz results
      Lesson 1 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What is a myth?You chose: An untrue statement presented as fact or truth about a subject.Correct! Yes, a myth is an untrue statement presented as fact or truth about a subject.In computer related terms, what is a cookie?You chose: An ASCII text or a text file written in code.Correct! While the first cookies were ASCII text only, many new cookies are using code to allow tracking you on the Internet.What is an IP address?You chose: A unique numerical identifier.Correct! Correct. Every computer has a unique identifier called an IP address.What port on your PC allows you to access the Internet?You chose: 80.Correct! Yes, this is the Internet port that allows http requests.Although not practical, what is the best way to protect yourself from security breaches?You chose: Do not have an Internet connection.Correct! Yes, while it is not practical, it is the best way to eliminate security concerns.Your score: 100% (out of 100%). Excellent job!Quiz 1Date submitted: 10/17/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion
      Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
       Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 2 quiz results
      Lesson 2 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What is the standard protocol of the Internet?You chose: TCP/IP or IP.Correct! TCP/IP is the accepted standard of the Internet community.What is a network client?You chose: A computer that requests information from another source.Correct! A client does not supply data, but requests it from another source.What is a LAN?You chose: A group of computers connected in close proximity of each other.Correct! A LAN or local area network is a group of computers connected to each other.Why is basic encryption dangerous?You chose: Every operating system has it.Correct! Because every operating system contains basic encryption, it is widely distributed and not a secret.Under normal circumstances, what is the purpose of pinging a computer?You chose: It requests a response from a computer to see if its on the network.Correct! A ping requests a response from a computer on a network to see if its there.Your score: 100% (out of 100%). Excellent job!Quiz 2Date submitted: 10/22/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion
      Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
       Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 3 quiz results
      Lesson 3 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:Why is the OSI model important to networks?You chose: Because it guarantees communication.Correct! Regardless of the operating system, PC manufacturer or software you use, the OSI model guarantees you will always be able to communicate across a network.What is a socket?You chose: A protocol for TCP/IP stacks.Correct! Based on the UNIX operating system for Internet connectivity, a socket is a protocol for the TCP/IP stack.What is open source?You chose: Source code that is openly available and freely distributed to everyone without charge.Correct! This code is also distributed under the GNU General Public License.When is a raw socket dangerous in an operating system?You chose: When it allows unsecured access to the root or core of the network.Correct! Under normal circumstances, the raw socket is protected to allow only administrators who have root privileges. An operating system that grants unrestricted access to this core is dangerous.Excluding the OSI model, hardware, and programming code, what is the weakest link in software?You chose: The responsible party for keeping software updated.Correct! Aside from the vulnerabilities in programming code for software and its interaction with the Application Layer of the OSI model, the responsible party for keeping software updated is the weakest link in software applications.Your score: 100% (out of 100%). Excellent job!Quiz 3Date submitted: 10/23/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 4 quiz resultsLesson 4 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What is the definition of a virus?You chose: A parasitic program or code written (usually intentionally but sometimes accidentally) to enter a computer without the user's permission or knowledge.Correct! This is the technical definition of a virus.What are the types of viruses?You chose: File infection, boot sector, master boot record, multi-partite, and macro.Correct! File infection affects program files, boot sector and master boot record affects your computers boot files and system area files, multi-partite affects both boot records and program files, and macro viruses affect data files. These are the five types of viruses.What is the unique difference between a Trojan Horse and other viruses and worms?You chose: It does not replicate and must be invited into the computer.Correct! Unlike viruses and worms that can self replicate, Trojans do not and must be invited into the computer through a program or file.Which one of the following is used to measure how quickly a threat can spread?You chose: Distribution.Correct! Distribution measures how quickly the threat can spread.In a category 5 threat, what must be present?You chose: All three measurements (Wild, Distribution, and Damage) must be high.Correct! A category 5 threat is the most severe and therefore all three measurements must be valued as high.Your score: 100% (out of 100%). Excellent job!Quiz 4Date submitted: 11/02/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 5 quiz resultsLesson 5 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What makes adware different from the other ware products?You chose: It usually discloses the information collected.Correct! Adware will often disclose the information being collected by the advertiser in the licensing agreement.What file types are used by programmers to design software components?You chose: ActiveX control, dll, and software modules such as executable files.Correct! Whether scripted or coded, these are the file types used to create by programmers to create software components.What would you see in msconfig that would alert you to a ware product existing on your computer?You chose: An unidentified program or module running at the startup.Correct! Most ware products will install on startup so they would appear in the msconfig startup list.What is the lowest Java permission setting you should allow?You chose: Medium.Correct! Medium is the lowest Java permission you should allow in your security settings. It passes standard JavaScript but questions scripting not fitting the normal Java pattern for web use.What is the name of the scumware that resets your browser home page?You chose: Hijacker.Correct! Along with resetting your home page, a hijacker will often redirect your browser to an advertiser page.Your score: 100% (out of 100%). Excellent job!Quiz 5Date submitted: 11/02/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 6 quiz resultsLesson 6 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What port does the Universal Plug and Play vulnerability open to the Internet?You chose: Port 1900.Correct! The Universal Plug and Play vulnerability opens Port 1900 and announces to any computer listening that your PC is an Internet server.What causes an exploit?You chose: A person or program takes advantage of a known vulnerability.Correct! An exploit is a program or technique that takes advantage of a vulnerability.What is the best method for protecting the perimeter?You chose: Use a software or hardware firewall.Correct! The best defense is using a software or hardware firewall to stop activity at the point of contact to untrusted services.What is the difference between a vulnerability and exposure?You chose: In exposure, the possibility for a vulnerability exists but it does not have a universal vulnerability present.Correct! Exposure is a state where a computer system or network does not have a known universal vulnerability but still has the potential to comprise security.What files on a computer are used as translators for hardware to speak to software?You chose: Drivers.Correct! Driver files are the translators used by the computer to interpret commands from programming code.Your score: 100% (out of 100%). Excellent job!Quiz 6Date submitted: 11/05/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 7 quiz resultsLesson 7 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What is bandwidth?You chose: The amount of data flowing through a network connection.Correct! Bandwidth is the amount of data flowing through a network connection.What type of attack sends synchronized packets through Internet servers and routers?You chose: A Distributed Denial of Service (DDoS) or Distributed Reflected Denial of Service (DRDoS).Correct! DDoS and DRDoS attacks send synchronized packets through Internet servers and routers using spoofed addresses.What are the terms used for a modem losing a connection?You chose: Burp or hiccup.Correct! In technical circles, a modem burp or hiccup explains a modem losing connection to its router in cyberspace.Why does a flood of User Datagram Protocol (UDP) packets create a flood of Internet Control Message Protocol (ICMP) packets?You chose: Because the flooded computer tries to compensate by redirecting traffic elsewhere.Correct! When flooded with excess data like UDP packets, a computer will try to redirect traffic by trying to send ICMP packets back to the sending computer.What does it mean to re-cycle a modem?You chose: You power down the PCs, router, and modem and wait 20 seconds before turning it on because it lost connection.Correct! To re-cycle a modem after loss of connection, you power down the PCs, router (if applicable), and the modem. Wait 20 seconds before turning on the modem, router, and PCs.Your score: 100% (out of 100%). Excellent job!Quiz 7Date submitted: 11/05/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 8 quiz resultsLesson 8 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:Where is the best place to stop an unwanted connection?You chose: At the packet.Correct! If you stop the packet there is not communication and therefore no connection is established.What is a breach?You chose: A state when something has entered a network or network device without the necessary permission to do so.Correct! Also called a compromise, this is the condition where your security and safety are questionable causing a breach.For a router with a built-in firewall, where do you find the setting to block ping requests?You chose: The Tools or Filtering tab.Correct! Depending on the manufacturer, you will find ping blocking in the Tools or Filtering tab.Which protocol enables an ISP to assign a dynamic IP address?You chose: DHCP.Correct! Dynamic Host Configuration Protocol or DHCP enables ISPs to dynamically change an IP address when it needs to.What is a wild card?You chose: The asterisk or star (*).Correct! The asterisk or star (*) is a wild card meaning – any and all.Your score: 100% (out of 100%). Excellent job!Quiz 8Date submitted: 11/12/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.  Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 9 quiz resultsLesson 9 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What is enterprise edition software?You chose: A software bundle with one installation CD, multiple licenses, and network capabilities.Correct! Enterprise editions are software bundles that include one installation CD designed for business networks and licenses for five or more users.Why should you share your security settings with your firewall software manufacturer?You chose: Because it helps them discover new threats, worms, and vulnerabilities.Correct! By sharing your settings and alert logs with the software manufacturer, it helps them discover new threats, worms, and vulnerabilities.What does it mean to start the service when configuring a software firewall?You chose: A technical way of saying you want to run the program so it will protect your PC and start automatically when you turn on your computer.Correct! Starting the service is a technical way of saying you want to run the program so it will protect your PC. Failure to do so will stop the program from running automatically when you turn on your computer.What can you do if you make a mistake in configuring and can't access the Internet or network?You chose: Disable the firewall completely or shut it down.Correct! By clicking over the icon, you can instantly disable the firewall allowing Internet and network access. You can also shut it down according to the software methods for turning off the service.What settings in firewall software allows you to add IP addresses, e-mail addresses, and other personal information you want to keep secure?You chose: The privacy controls or ID lock settings.Correct! In Zone Alarm software, it's the ID lock, and in other software, it's the privacy controls that allow you to customize information you wish to keep secure.Your score: 100% (out of 100%). Excellent job!Quiz 9Date submitted: 11/12/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
       Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 10 quiz results
      Lesson 10 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:If your laptop does not have Ethernet capabilities on the motherboard, what additional device would you need?You chose: A Type II PCMCIA card.Correct! A Type II PCMCIA card has modem, fax, and Ethernet capabilities.What is the wireless band frequency?You chose: 2.4 GHz to 5 GHz.Correct! The 802.11 wireless networks work on a frequency between 2.4 and 5 GHz.What is the Wi-Fi Alliance?You chose: An association formed to certify interoperability of wireless Local Area Network products based on the IEEE 802.11 specification.Correct! The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specifications.What is asymmetric encryption?You chose: A two-key encryption system.Correct! Also called public-key encryption, asymmetric encryption requires two keys. One key encrypts data, while the other is used to decrypt the data.What is the best password option to use on a laptop?You chose: A BIOS supervisor password.Correct! A BIOS supervisor password prevents anyone from getting into the setup and changing the user login password.Your score: 100% (out of 100%). Excellent job!Quiz 10Date submitted: 11/16/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion
      Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
       Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 11 quiz results
      Lesson 11 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What makes a VPN different from a conventional network? You chose: The conventional network is always visible where the VPN only becomes real when it's connected to.Correct! You do not share VPN connections openly as you do conventional network connections. A VPN only becomes a reality when a connection is made.
      What is virtual memory? You chose: A creation of the computer.Correct! Virtual memory is the creation of the computer. For instance, like a Window's swap file where memory is set aside to manage tasks. The memory disappears when the computer is shut down.
      What are the three types of VPNs?You chose: Remote access, intranet-based, and extranet-based.Correct! Remote access is a user-to-LAN VPN connection, intranet-based is VPN used to connect remote users to a private network, and extranet-based is a LAN-to-LAN connection.
      How are VPNs created? You chose: A process called tunneling.Correct! VPNs are created through the process of tunneling which wraps data into a packet and send the wrapped packet through another packet across a network.Which is considered the most secure protocol available today?You chose: IPSec.Correct! IPSec, the protocol used for encapsulating VPN data is considered the most secure protocol today.
      Your score: 100% (out of 100%). Excellent job!Quiz 11Date submitted: 11/19/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion
      Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.
       Resources  Lessons  Quizzes  Assignments  Discussion  Completion Introduction to PC Securityquizzes: lesson 12 quiz results
      Lesson 12 Quiz ResultsImportant: This quiz uses a diminishing multiple choice format. What this means is that if you miss a question, this evaluation page will explain why the answer you selected was incorrect. The evaluation has been carefully designed so that it will not identify the correct answer unless you choose that answer yourself. If you want a better quiz score, you are expected to return to your lesson, review the material, and then take the quiz again.Please understand that it would be very easy for me to just spoon-feed you the correct answers each time you miss a question. But if I were to do so, then you would become dependent on me. In the long run, that approach would do more harm than good.I want you to leave this class with a solid understanding of this material and the independence to solve your own problems. This quiz evaluation page has been specifically engineered to fit my teaching philosophy.Thank you,-Your InstructorEvaluation of your answers:What are the three categories that information is divided into?You chose: Individual, small-to-midsized business (SMB), and enterprise.Correct! Figuring out which category you fit into will help you decide on the kind of security information you'll need to keep updated on.
      If you have five people working for you in a home-based business, what category of information might you find specifically for your needs?You chose: SOHOCorrect! Small Office Home Office (SOHO) information is designed for individuals who run a home based business with less than 10 employees.
      What is a webcast? You chose: An online presentation that is broadcast over the Internet or Web.Correct! A webcast is an online presentation that is broadcast over the Internet or Web. You could also call it an online seminar.
      What is the command to check for programs running when the computer starts?You chose: msconfig.Correct! This is the command you use to check for programs running in the statup menu or in the background of a Windows OS PC.
      What is a key chain token? You chose: A gadget that digitally displays new passwords every three-to-five seconds.Correct! A key chain token is a little gadget that digitally generates and displays new passwords every three-to-five seconds. The token is connected to a key chain, and hence, the name, key chain token.
      Your score: 100% (out of 100%). Excellent job!Quiz 12Date submitted: 11/26/2008Please print this evaluation for your records.resources | lessons | quizzes | assignments | discussion | completion
      Course content © 1997-2008 by Debbie Mahler. All rights reserved. Reproduction or redistribution of any course material without prior written permission is prohibited.