cgs2060 midterm
Full HD resolution is expressed as
1920 x 1080
a group of comprised computers controlled by a hacker is called a
bottnet
which of the following represents the highest amount of storage
terabyte
used in a variety of ATM and POS systems, __________ allow for the input of data with the use of stylus or finger
touchscreens
persistent cookies store info about
user preferences
software that infects a computer and is created using computer code is called a
virus
non-malicious computer security experts that test the security measures of an organizations information systems are
white hat hackers
a destructive program that replicates itself throughout a single computer or across a network is called a
worm
a computer controlled by a hacker is called a
zombie
most new laptop computers come with how much storage
256GB-1 TB
when you buy a new laptop how much RAM should it come with
4-8 GB
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a
DDos
a small text file of info created by websites you visit that your web browser stores on your hard disk si called a
cookie
which of the following is a strength of the android platform
most widely used OS for smartphones and tablets
a gigabyte equals approximately _______ bytes
one billion
a kilobyte is equal to _______ bytes
one thousand
all of the following are common ports included with laptops except
MIDI ports
software that collects the users web browsing history and uses the data collected to crate unsolicited targeted pop up ads
adware
the fact that detain servers is nearly always backed up onto other servers gives ______ storage a major advantage over others
cloud
a digital device that accepts input, processes and stores the input, and provides output is a
computer
a site on the windows operating system where you can uninstall programs, adjust settings and manage tasks is the
control panel
the malicious use of computer code to modify the normal operations of a computer or network is called a
cyberattack
harming or harassing a person or group of people via IT and networks in a repeated/ malicious way
cyberbullying
a crime in which a computer is the object of a crime or is used to commit a crime or offense is called a
cybercrime
a person who use computers and the internet to launch attacks against computer systems for political or ideological reasons
cyberterrorist
one disadvantage of cloud storage is that
data is only available when you're online
which of the following is considered a cyber crime
data manipulation
how is the screen size of a laptop measured
diagonally from left corner to right corner
a DDoS attack is when computers that have been infected by a virus act as zombies and work together to send out illegitimate info stands for
distributed denial of service
a person who gains unauthorized access to networks and in order to step and corrupt information and data is called a
hacker
the act of hacking of breaking into a computer system for a politically of socially motivated purposed
hacktivism
adding software to a digital device or adding hardware to a digital device is called
installing
firewall software used to block a users access to specific internet content is called a _______ filter
internet
a form of spyware that records all actions typed on a keyboard is called a ______ logger
keystroke
which of the following represents the least amount of storage
kilobyte
a mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ______
laptop
which of the following is a strength of the Linux platform
less susceptible to viruses than Mac OS
what is the name of a virus written in a macro language and placed within a document pr spreadsheet
macro virus
windows OS is owned and manufactured by
microsoft
which if the following may be risky to uninstall from a windows PC laptop
microsoft works 6-9 converter
a megabyte equals one _____ bytes
million
a terabyte equals ______ bytes
one trillion
what manages hardware and software, supports the computers basic functions and runs programs
operating system
many manufacturers have made _______ optional equipment when purchasing a new laptop
optical drives
cookies store on a computers hard drive and is used to collect and store info about users preferences , password, are _______ cookies
persistent
a type of phishing that seeks to obtain personal info through malicious software that is inserted on a persons computer is called
pharming
blu-ray stores data using
pits and lands that are read by a blue spectrum laser beam
which type of touchscreen uses a single coated metallic panel and uses electricity to calculate touch points
progressive capacitive
in general the _____ the access time, the faster the hard drive
shorter
specialized hardware or software that captures packets transmitted over a network are called packet _____
sniffers
an unsolicited email message is called
spam
a computer that is highly mobile, has a smaller OS, and uses a touchscreen sd the primary input method is called a
tablet