Graphs, diagrams and maps belong to which data type?
Visual data
What is spam?
Unwanted email, usually advertisements
Ada Lovelace
An ancient calculating tool
Abacus
Data received via sense of sound
Aural data
What means 'legitimate'
Reasonable and acceptable/allowed by law
The share of spams in all emails that we receive daily
48%
What means BYOD?
Bring your own device
Data that is generated or related to touch
Haptic data
software designed by criminals to prevent computer users from getting access to their own computer system unless they pay money
Ransomware
An example of Ransomware which used fake emails from police about traffic violations.
CryptoLocker
Under whose leadership Microsoft surpassed Apple to become the world's most valuable publicly traded company.
Satya Nadella
Computer software that is designed to damage the way a computer works
Malware
An attempt to trick a particular person or group into giving private information over the internet, especially by sending emails that seem to be from someone they know
Spear phishing
What did Colossus (Turing's machine) use to input data?
Punched tape
What is the meaning of word 'obsolete'?
Ancient, historical, old
Intended to harm other people
Malicious
a type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate business, a neighbor, or some other innocent party
Spoofing
A machine that is used to loom fabrics and simplified the process of manufacturing textiles with such complex patterns, and which led to the development of computer programming
The Jacquard loom machine
How much percent of phishing emails infected with ransomware?
93%