CIS 150 Modules 1-4

¡Supera tus tareas y exámenes ahora con Quizwiz!

______ such as Tor will mask your IP address from websites in order to protect your privacy when visiting a website that does not have a privacy policy. Select your answer, then click Done.

Anonymity Software

The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science. Select your answer, then click Done.

CSNET

You can see every single page, image, and video for all the web pages you have recently retrieved by looking at the browser ______. Select your answer, then click Done.

Cache

Employees use their company's ______ to access documents, programs, and hardware devices.

Computer network

Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers, then click Done.

Copyrighted photos, music, and videos

A(n) ______ is a type of information system that performs analytical tasks traditionally done by a human. Select your answer, then click Done.

Expert system

Contractors that have ongoing business with a company can log into its ______ by using a valid username and password. Select your answer, then click Done.

Extranet

Many users read today's news by using ______, a mobile app known as a news aggregator. Select your answer, then click Done.

Flipboard

A____ is a node on a network that serves as an entrance to another network

Gateway

In 1990 the first webpage was created in a language called

HTML

A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.

Hacker

A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.

Intranet

Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates. Select your answer, then click Done.

Learning management system

A(n) ______ helps managers use software tools to gather, organize, and evaluate information. Select your answer, then click Done.

Management information system

Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.

NO

Select the buttons that enable you to move back and forward between pages, stop a page if it's taking too long to load, refresh a page for the latest information, and take you to a home page that you designated. Select your answer, then click Done.

Navigation buttons

Who owns the Internet? Select your answer, then click Done.

No single person or group controls the internet

Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.

None

Data moves through networks in structures known as______. Select your answer, then click Done.

Packets

Select five ways to authenticate a user's identity.

Password or PIN, Code sent VIA text to phone, fingerprint iris or face scan, credit or debit card, employee badge

Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."

Password theft

The most popular method for file transfer today is known as ______ file sharing. Select your answer, then click Done.

Peer-to-peer (p2p)

In order to be fault tolerant, ______ computers have multiple hardware systems that perform the same task at the same time. Select your answer, then click Done.

Redundant

In a small business or home network, the gateway is usually the ______. Select your answer, then click Done.

Router

Many ISPs give users a wireless broadband ______ that serves all the networking and Internet functions a home user needs. Select your answer, then click Done.

Router

The ______ refer(s) to the way in which the Internet has enabled people to share (for a price) their time, goods or services. Select your answer, then click Done.

Sharing economy

The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.

Social media

The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.

Software, music, photos, artwork

A large company like Amazon saves enormous amounts of data gathered from multiple databases in a data _____. Select your answer, then click Done.

Warehouse

Websites are typically located or hosted on ______ servers. Select your answer, then click Done.

Web

Select four questions you should ask yourself to determine whether fair use applies to your situation, then click Done.

What is the nature of the use? What is the nature of the work? How much of the word is being copied? How will the copy affect the market?

Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.

office automation system

Many software companies use ______ technology to distribute software and updates to millions of users at a time. Select your answer, then click Done.

p2p

A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.

trojan horse

A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.

wifi, wireless network, wireless lan

Works go into the public domain when their copyright expires, usually _____ years after an author dies. Select the your answer, then click Done.

70

When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.

Acceptable use policy (AUP)

___ is a security utility that protects your computer from various types of malware.

Anti-malware

A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done

Bridge

The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.

Data mining

Select three shared items that multiple users can instantly access on a network, then click Done.

Data, hardware devices, software applications

By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.

Decision support system (DSS)

Ethernets generally use ______ when communicating over long distances. Select your answer, then click Done.

Fiber optic cables

Select three types of media that carry data from one node to another, then click Done

Fiber optic, twisted pair, coaxial

The World Wide Web is a global system of linked, ______ documents. Select your answer, then click Done.

Hypertext

World of Warcraft and Fortnight are two examples of a ______, an online video game set in a virtual world where millions of people play with or against other players. Select your answer, then click Done.

Massively multiplayer online role-playing game

Select two types of network topologies, then click Done.

Mesh, Star

Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.

Network adapter card (NAC)

______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.

Pay-per-click

A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.

Striping with parity, RAID 5

______ can often use portions of copyrighted material under the fair use provision. Select the two correct answers, then click Done.

Students, educators

Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.

Surge protector

______ is the communication protocol that rules how packets of data are transmitted. Select your answer, then click Done.

TCP/IP

______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests. Select your answer, then click Done.

Third party

While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.

Trolling, flaming

Select four websites that are generally a credible source of accurate information, then click Done.

Trusted news organizations, government sites, press release from a well known company, news from research university

A virtual private network (VPN) uses a method called ___ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet.

Tunneling

______ is the most common medium used in homes and businesses. Select your answer, then click Done.

Twisted pair cable

When a recipient opens an infected file, a ______ will activate itself and find more files to infect, often making your operating system unuseable. Select your answer, then click Done.

Virus

______ allows people to cancel their traditional phone service and make calls using their Internet connection. Select your answer, then click Done.

Voiceover Internet Protocol (VoIP)

Also known as ______ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent. Select your answer, then click Done.

White hat

A ______ is the connection of two or more central computers or LANS. Select your answer, then click Done.

Wide area network (WAN)

Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites. Select your answer, then click Done.

World Press

A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.

Worm

Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.

Zombies

The domain name uniquely identifies a company or organization in a URL (uniform resource locator). Click on the URL's domain name, then click Done.

example.com

A ______ provides multiple ports for connecting nodes and transmits packets to all connected nodes. Select your answer, then click Done.

hub

A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done

mission critical

RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.

redundant array of independant discs

______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.

scalable

A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.

switch

The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.

threats

The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.

topology

A radio station can broadcast their programs online via a ___, allowing people from around the world to listen to their shows online. Select your answer, then click Done.

webcast

Web pages that are linked to each other make up a ______. Select your answer, then click Done.

website

Click on the file name of the actual web page, then click Done.

*last part of the URL*


Conjuntos de estudio relacionados

stuff to know for 3rd quiz biology

View Set

chapter 43: Restorative and Esthetic Dental Materials

View Set

Spelling Week 6: Ending Words with an S

View Set

anatomy mastering a and p: exam 2

View Set

Chapter 37: Frédéric Chopin Mazurka in B-flat Major, op. 7, no. 1

View Set

Midterm Check Your Understanding Assignment (OPTIONAL)

View Set

Analyzing Data: Understanding Statistics

View Set