1. Question: This word describes something designed to protect from harm, damage, or danger?
a safeguard
1. Question: This crime involves obtaining money or goods by deceiving someone.
fraud
1. Question: A collection of information stored in a computer under one name is called this.
file
1. Question: A small plastic card used to purchase goods and services is called this.
credit card
2. Question: Precautions taken to protect computer systems from danger or attacks are called this?
security measures
2. Question: Someone who is guilty of fraud is called this
fraudster
2. Question: A small fault or error in a computer program is called this.
bug
2. Question: A person who commits a crime is known as this.
criminal
3. Question: A person who writes instructions to control a computer's operations is known as this?
programmer
3. Question: The act of stealing secret information from a rival company is known as this.
industrial espionage
3. Question: A short program that spreads and causes damage to a computer system is known as this.
computer virus
3. Question: This word describes a person who is dishonest or not straight.
crooked
4. Question: To start using a computer system, you must do this.
log on
4. Question: To order or deceive someone into giving you money dishonestly is to do this.
swindle
4. Question: The act of removing something from a file or disk is called this.
delete
4. Question: A verb meaning to be very careful and watch for signs of danger or difficulty.
"be on one's guard"
5. Question: This term describes someone gaining unauthorized access to a computer system.
hacking
5. Question: If something is done without official permission, it is called this.
unauthorized
5. Question: A group of related things that work together to form a whole is called this.
system
5. Question: The knowledge and skills of someone who is an expert in a field are called this.
expertise