CIS 101 Final Exam CCC
SPAM
also known as junk email
Solid state
drives that are rapidly increasing in popularity, and in time they might become a viable replacement for the ubiquitous mechanical hard drive.
HTTP (HyperText Transfer Protocol)
electronic communication defining an exact way that data is formatted and transferred back and forth between web browser and server.
2 gigabytes of RAM
is the lowest amount a casual user should have
WPA2
protocol used in routers nowadays in order to maximize security:
cells
sections in batteries that hold the power to be distributed
surge-protecting power strips
to protect equipment from power problems
netbook
traditional structure of notebook computer that doesn't need the full power or size of notebook.
nodes
A computer network's ___ are processing locations such as a PC or a networked printer.
UPS
A good ___ unit can help mitigate the trouble caused by a power outage in a telecommuter's office.
bus
A network with a(n) ___ topology arranges the network nodes in a series, linking one node to the next via a single cable.
ARPANET
A predecessor of the modern Internet was ___, which was a network connecting computers at different universities and defense contractors.
chatterbot
A program known as a(n) ___ simulates conversation with human participants.
router
A(n) ___ creates and manages connections with local wireless users, and communicates data between the users and the Internet.
UPS
A(n) ___ functions as a battery backup and power conditioner for your computer.
transaction
A(n) ___ is a complete information operation. They can be one-step events like adding a new piece of information to a database, or they can be more complex and require many steps.
zombie
A(n) ___ is a compromised computer that is under external control, in many cases without the computer owner's knowledge.
LAN
A(n) ___ is a data communication system consisting of multiple devices such as computers and printers. This type of network contains computers that are relatively near each other.
bridge
A(n) ___ is a device that connects two LANs or two segments of the same LAN.
gateway
A(n) ___ is a node on a network that serves as an entrance to another network.
worm
A(n) ___ is a program that self-replicates, but it is a fully contained program and is not attached to a host file or service.
packet
A(n) ___ is a transmitted network package.
vulnerability
A(n) ___ is a weakness-anything that has not been protected and is open to harm.
surge suppressor
A(n) ___ is an inexpensive product that guards its appliances against large power spikes or surges that may infrequently occur, but does not provide protection against reduced or total loss of power.
virus
A(n) ___ is software that is attached to a host, such as a file or e-mail message, and has the ability to copy itself from one computer to another.
hacker
A(n) ___ is someone who uses a computer and network or Internet connection to intrude into another computer or system to perform an illegal act.
repeater
A(n) ___ is used to prevent attenuation when packets are traveling long distances.
enterprise
A(n) ___ license grants installation and use privileges on any computer within the company.
hub
A(n) ___ provides multiple ports for connecting nodes. When it receives a packet from one port, it transmits the packet without modification to all the other nodes.
personal
A(n) ___ software license is one that grants a single person the ability to use the program, and it may impose terms and conditions that limit the program's use.
Although there are several different major search engines, ___ has firmly established itself as a leader.
hyperlink
As you read a Web page on the browser screen, you can click a word or picture encoded as a(n) ___ and immediately jump to another location within the same document or to a different Web page.
PDAs
Before the iPhone, many people carried ___, which managed appointments, ran spreadsheet programs, and allowed people to take notes with a stylus.
ring tones
Cell and smart phones have a number of conditions where they are directed to play a sound, and those sounds, called ___, can be chosen by the user.
SIM
Cell phones contain ___ cards that identify the user and subscription owner of the phone.
encryption
Data ___ is an ideal solution for keeping your information safe from all eyes but your own because it changes the data to make it completely undecipherable to anyone who does not have the exact key required to restore the data.
backup
Data ___ services focus simply on saving copies of files and allowing users to retrieve the data if needed.
like
Facebook users can click a(n) ___ button, which is a Facebook-generated link that tags an item with a user's approval.
response rate
Gamers should probably focus on the ___ more than other factors.
spreadsheet
If grade processing is not handled at a central site, then the professor may use a local solution such as Microsoft Excel or another ___ program in order to track student performance over time.
identity theft
If someone impersonates you by using your name, Social Security number, or other personal information to obtain documents or credit in your name, you are a victim of:
star
In a network with a(n) ___ topology, all nodes are connected to a hub and communicate through it.
surgical
In healthcare, computers are present to assist with ___ procedures. They can monitor a patient's vital signs during a procedure, and they can also control robotic assistants.
FTP
Internet users can copy files from one computer to another by using this Internet service
open
Mobile devices and networks alike have made it convenient to quickly connect, but you should be very cautious about joining __ wireless networks
warranty
More expensive ___ programs sometimes provide for the on-site repair of your system and may not require that you first diagnose the problem via extended telephone sessions.
smart phones
Much of the software related to mobile computing is for ___ and PDAs.
banner
One of the common methods of advertising on Web pages is the use of ___ ads, thin rectangular advertising boxes commonly placed across the top of a Web page.
terabyte
One to three ___ hard drives should be sufficient for the needs of most users.
accounting
Payroll and sales data can feed into an integrated ___ program, allowing the store owner to focus on sales trends, accounts payable, and receivable, and ways to improve operating efficiency.
fluctuations
Power ___ may cause the strength of your electrical service to rise or fall.
backbones
Private telecommunications companies built their own central network structures, called ___, in order to distribute business and commercial information.
hotspots
Public Internet access points are often called wireless ___.
virtual
Some tablets provide a(n) ___ keyboard as part of their operating environment, displaying a picture of keys on the touch screen.
header
The ___ is the first part of a packet and contains information needed by the network (such as the node address).
The ___ service allows people to transmit micro-status messages up to 140 characters in length.
ring
The ___ topology connects the network's nodes in a circular chain, with each node connected to the next.
handheld
The category of ___ computers includes both PDAs and smart phones.
Microsoft
The desktop and notebook PC market is dominated by the ___ Operating System
GHz
The electric frequency of the processor, measured in ___, is also a measure of its relative speed.
laptop
The goal of ___ computing is to provide users with all the programs and functions of a desktop environment in a package they can comfortably carry and open to use at a moment's notice almost anywhere.
The only Internet service used more frequently than the Web is ___, which is a system for exchanging messages through a computer network.
service
The term Internet ___ provider refers to companies that are in business specifically to provide the infrastructure necessary to connect to the Internet.
broadband
The term ___ is used to describe any data connection that can transmit data faster than is possible through a standard dial-up connection using a modem.
AMD
There are two major processor manufacturers, ___ and Intel.
poach
To ___ a wireless signal means to access a Wi-Fi device whose owner accidentally left it without password protection.
hot
To ___ swap a battery means to remove and replace it while the computer is running and active.
ISP
To connect to the Internet, most individual users set up an account with a(n) ___, a company that provides local or regional access to the Internet backbone.
hypertext
What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text that is able to respond to user input and link to other objects.
cookies
When you visit e-commerce sites, many of them store snippets of information in small files on your system known as:
Podcasts
___ are radio broadcasts suitable for downloading to a portable music player.
Tags
___ are simple labels that help identify the subject of a bookmark. You can search for them in your own list or throughout the entire Delicious service to find bookmarks that are related to that topic.
Fiber-optic
___ cable is a thin strand of glass that transmits pulsating beams of light rather than electric current.
Twisted-pair
___ cable normally consists of four pairs of wires. The individual pairs have two wires that are separately insulated in plastic.
?
___ computing can reduce the amount of hardware required because users share central hardware resources.
Cloud
___ computing is the concept of using computers owned by service providers on the Internet to for storage and program execution services.
YouTube
___ encourages users to upload videos of everything from a funny accident caught on cell phone to serious, professionally-produced presentations.
HTML
___ files contain the information to display web pages, using markup tags that identify headers, paragraphs, images, and links.
Hands-free
___ hardware allows the cell phone user to place calls without typing numbers and holding the handset.
Skype
___ is a VoIP company that offers the ability to lease a telephone number in countries around the world.
Data mining
___ is a business-intelligence-gathering process that every large organization, from banks to grocery stores, employs to sift through computerized data.
Bandwidth
___ is the amount of data over time that the media can carry, typically measured in either megabits per second (Mbps) or gigabits per second (Gbps).
Attenuation
___ is the loss of intensity and clarity of the data signal being transmitted.
Keylogging
___ programs, which save a user's keystrokes, can be used not just by hackers, but also by companies and individuals that want to monitor the detailed activity of people using computers that they own.
LCD
___ projectors and portable computers are common tools for displaying slides to assist in information delivery.
Cloud
___ service companies provide alternatives that do not require up-front hardware purchases, because users transfer data to the service company's servers for storage instead of their own central storage hardware.
Presentation
___ software is employed to create the various slides and multimedia content that are used in lectures.
Open-source
___ software is intended by its creators to be distributed freely to anyone who wants to install, use, study, and modify it.
Word processing
___ software is used to create lesson plans, course outlines, and sets of notes or other student materials that can be either printed and distributed in class, or posted online for students to retrieve on their own time.
VoIP
___ translates analog voice signals into digital data and uses the Internet to transport the data.