What term best refers to the interconnection of computing devices as a result of the internet that allow devices to send and receive data?

A. the Cloud of Credentials
B. the Internet of Incomes
C. the Malware Median
D. the Internet of Things

Who, in recent years, has warped the intent of cryptographic technology to create cryptovirology?
A. black hat programmers
B. white hat programmers
C. red hat programmers
D. yellow hot programmers

What terms refers to storage for data and software on the internet as opposed to on the computer?
A. credentials
B. cloud
C. big data
D. intranet

Due to the fact that many consumers will check out a business online before ging to make sure that their ______ is as professional as their physical space.
A. Instagram handle
B. tax return
C. online presence
D. personal appearance

At the most recent count, approximately how many websites are in existence online?
A. 2 billion
B. 2 trillion
C. 2 million
D. 22 million

While the connections created by the Internet of Things facilitate much of the technology that society has come to depend on, the fact that they are interconnected means that they can be dangerous when individuals with _____ intent access them.
A. criminal
B. humorous
C. amicable
D. friendly

One of the reasons devices connecting using the World Wide Web are so vulnerable is that millions of non-computing, but technology rich, devices such as refrigerators, doorbells, and automobile ignition system now report ____ to consumers' computers, tablets, and smartphones.
A. pop-ups
B. intent
C. interconnection
D. data

Tyrese recently spoke to an internet security specialist about the best way to back-up his data. The specialist advised Tyrese to store his important information in a different physical location than his computer---why is this?
A. Because the only safe place to physically store a data back-up is in vault at the bank.
B. It will help keep his brain sharp by having to remember multiple locations for his data.
C. Because when data is too close to the computer, the virtual cloud compromises both.
D. This will ensure natural disasters or fires do not destroy the back-up data if the computer is destroyed.

D. This will ensure natural disasters or fires do not destroy the back-up data if the computer is destroyed.