CGS2060 Midterm Questions
COMPUTER STORAGE QUIZ 100%
----------------
NETWORKING AND CONNECTING TO THE INTERNET QUIZ 92%
---------------------
Select the domain name.
.gov
Blu-rays provide approximately ___ of storage space.
25-50 GB
According to YouTube, approximately how much video is uploaded to its site every minute?
300 hours
Sage was developed during the _____ war.
Cold
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
Cube
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.
DNA
The Internet service that tends to provide the most consistent speeds is _____.
DSL
SAGE was developed by the US Department of ___ .
Defense
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .
File Transer Protocol
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
File Transfer
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
Graphical
Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.
Internet
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
Which of these browsers was developed by Microsoft?
Internet Explorer
ISP stands for:
Internet Service Provider
What 3 items are needed to install a home WiFi network?
Internet Signal a modem a router
A switch distinguishes between various devices within a network by their __ addresses.
MAC
The 2 most common audio file formats are WAV and ___ .
MP4
Broadband is measured in _____ .
Mbps
Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.
RAID
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.
SSDs
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .
Safari
Select the sites that offer Internet speed test services.
Speedtest.net TestMy.net
The World Wide Web was created through a collaboration led by ___ .
Tim Berners-Lee
The highest level in the domain name hierarchy is known as the ___ .
Top Level Domain
One type of storage device is a ___ .
USB drive
URL stands for ___ Resource Locator.
Uniform
The original wireless network privacy and protection standard for Wi-Fi was known as ___ .
WEP
Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.
WIFI hotspot
The standard for wireless network privacy and protection is known as ___ .
WPA
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .
WPA
n addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
WWW stands for ___ ___ ___ .
World Wide Web
What group determines the standards for the World Wide Web?
World Wide Web Consortium, known as the W3C.
DVDs store data using ___ .
a reflective coating that has pits and lands
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
The capacity of a particular transmission medium is called its _____.
bandwidth
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth
The smallest unit of data storage is a ___ .
bit
A group of compromised computers controlled by a hacker is called a _____.
botnet
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
Which might be a choice for Internet service in your area?
cable internet
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
charming
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ storage.
cloud
Emailing a file to yourself is an example of using ___ storage.
cloud
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
cyberattack
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cybercrime
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberterrorist
One disadvantage of cloud storage is that
data is only available when you're online.
Which of the following would be considered a cybercrime
data manipulation
A ___ name identifies a server site on the Internet.
domain
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.
dual-band
Which transmission media has the largest bandwidth?
fiber optic
A URL identifies a particular __ address on the World Wide Web.
file
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
filters
A security system separating 2 networks or even computers on the same network is called a ___ .
firewall
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
helium
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.
holographic
When determining how much cell phone data you need it is important to consider
how much data you currently use.
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
individual users
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
macro virus
A million bytes of data equals approximately one ___
megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
memristor
The word modem stands for ____.
modulator-demodulator
Fiber optic cable is _____ expensive than coaxial cable to install.
more
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .
optical drive
Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.
packet
The BitTorrent protocol is often called ___ file sharing.
peer-to-peer
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
A request for an electronic "echo" or response from another computer or server is called a ____.
ping
A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .
ping
Blu-ray stores data using ___ .
pits and lands that are read by a blue spectrum laser beam
Software that can be added to a browser to increase its functionality are called ___ .
plug in
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
Solid state drives store data using ___ .
reflective coatings
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
router
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
shorter
In general, the ___ the access time, the faster the hard drive.
shorter
Contact your ISP if your actual Internet speed is _____ than advertised.
slower
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
An unsolicited email message is called _____.
spam
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
The device that connects 2 networks is a _____.
switch
Persistent cookies store information about
user preferences
Software that infects a computer and is created using computer code is called a computer _____.
virus
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white-hat hackers
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm
A computer controlled by a hacker is called a _____.
zombie