1.       True

2.       False

3.       True

4.       False

5.       True

6.       False

7.       True

8.       False

9.       False

10.   True

11.   True

12.   True


Multiple Choice

1.       C

2.       A

3.       D

4.       B

5.       B

6.       C

7.       B

8.       D



1.       G

2.       I

3.       B

4.       A

5.       D

6.       J

7.       C

8.       F

9.       H

10.   E

Consider This

13. What types of software protect a computer from viruses and other malware?

Installing antivirus software will help keep you protected from viruses and malware. You must keep it up to date. It is also a good idea to have firewall software active.

14.  Why should you use a different password for all websites you access?

You should use a different password for each website you access, because if someone steals your password, they can attempt to use it along with your username/email address on other websites, including online banking.

22. What does a user interface control?

The user interface is what you see when you are interacting with a program. It controls what you see on the computer screen and how you enter data.

Internet Research

4. https://twitter.com/camcoles/status/619307035075547136 I used his twitter post to find the timeline, since skyhigh didn’t have a post date on the blog : https://www.skyhighnetworks.com/cloud-security-blog/you-wont-believe-the-20-most-popular-cloud-service-passwords/


Passwords that appear on both lists: password, 123456, 12345, 1234, 1234567, football, qwerty, dragon, welcome, abc123.

Consumers continue to use bad passwords because they are easy to remember, or they are a pattern on the keyboard such as “qwerty” or “1234567.” I do not use any of these passwords. Creating a strong password requires upper and lowercase letters, symbols, and numbers. You should not, however, use a word followed by number and then a special character. Special characters and numbers are more useful if they are in the midst of the password.  If you are to use a line from a song, make modifications to it so that it isn’t easy to hack. You could substitute $ in for S, or take the first letter from each of the words in the phrase to make an acronym.

The most common passwords list from Splashdata is compiled from all the passwords leaks in the course of the year.