CIS 150 Modules 1-4
______ such as Tor will mask your IP address from websites in order to protect your privacy when visiting a website that does not have a privacy policy. Select your answer, then click Done.
Anonymity Software
The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science. Select your answer, then click Done.
CSNET
You can see every single page, image, and video for all the web pages you have recently retrieved by looking at the browser ______. Select your answer, then click Done.
Cache
Employees use their company's ______ to access documents, programs, and hardware devices.
Computer network
Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers, then click Done.
Copyrighted photos, music, and videos
A(n) ______ is a type of information system that performs analytical tasks traditionally done by a human. Select your answer, then click Done.
Expert system
Contractors that have ongoing business with a company can log into its ______ by using a valid username and password. Select your answer, then click Done.
Extranet
Many users read today's news by using ______, a mobile app known as a news aggregator. Select your answer, then click Done.
A____ is a node on a network that serves as an entrance to another network
Gateway
In 1990 the first webpage was created in a language called
HTML
A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.
Hacker
A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.
Intranet
Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates. Select your answer, then click Done.
Learning management system
A(n) ______ helps managers use software tools to gather, organize, and evaluate information. Select your answer, then click Done.
Management information system
Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.
NO
Select the buttons that enable you to move back and forward between pages, stop a page if it's taking too long to load, refresh a page for the latest information, and take you to a home page that you designated. Select your answer, then click Done.
Navigation buttons
Who owns the Internet? Select your answer, then click Done.
No single person or group controls the internet
Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.
None
Data moves through networks in structures known as______. Select your answer, then click Done.
Packets
Select five ways to authenticate a user's identity.
Password or PIN, Code sent VIA text to phone, fingerprint iris or face scan, credit or debit card, employee badge
Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."
Password theft
The most popular method for file transfer today is known as ______ file sharing. Select your answer, then click Done.
Peer-to-peer (p2p)
In order to be fault tolerant, ______ computers have multiple hardware systems that perform the same task at the same time. Select your answer, then click Done.
Redundant
In a small business or home network, the gateway is usually the ______. Select your answer, then click Done.
Router
Many ISPs give users a wireless broadband ______ that serves all the networking and Internet functions a home user needs. Select your answer, then click Done.
Router
The ______ refer(s) to the way in which the Internet has enabled people to share (for a price) their time, goods or services. Select your answer, then click Done.
Sharing economy
The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.
Social media
The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.
Software, music, photos, artwork
A large company like Amazon saves enormous amounts of data gathered from multiple databases in a data _____. Select your answer, then click Done.
Warehouse
Websites are typically located or hosted on ______ servers. Select your answer, then click Done.
Web
Select four questions you should ask yourself to determine whether fair use applies to your situation, then click Done.
What is the nature of the use? What is the nature of the work? How much of the word is being copied? How will the copy affect the market?
Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.
office automation system
Many software companies use ______ technology to distribute software and updates to millions of users at a time. Select your answer, then click Done.
p2p
A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.
trojan horse
A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.
wifi, wireless network, wireless lan
Works go into the public domain when their copyright expires, usually _____ years after an author dies. Select the your answer, then click Done.
70
When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.
Acceptable use policy (AUP)
___ is a security utility that protects your computer from various types of malware.
Anti-malware
A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done
Bridge
The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.
Data mining
Select three shared items that multiple users can instantly access on a network, then click Done.
Data, hardware devices, software applications
By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.
Decision support system (DSS)
Ethernets generally use ______ when communicating over long distances. Select your answer, then click Done.
Fiber optic cables
Select three types of media that carry data from one node to another, then click Done
Fiber optic, twisted pair, coaxial
The World Wide Web is a global system of linked, ______ documents. Select your answer, then click Done.
Hypertext
World of Warcraft and Fortnight are two examples of a ______, an online video game set in a virtual world where millions of people play with or against other players. Select your answer, then click Done.
Massively multiplayer online role-playing game
Select two types of network topologies, then click Done.
Mesh, Star
Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.
Network adapter card (NAC)
______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.
Pay-per-click
A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.
Striping with parity, RAID 5
______ can often use portions of copyrighted material under the fair use provision. Select the two correct answers, then click Done.
Students, educators
Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.
Surge protector
______ is the communication protocol that rules how packets of data are transmitted. Select your answer, then click Done.
TCP/IP
______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests. Select your answer, then click Done.
Third party
While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.
Trolling, flaming
Select four websites that are generally a credible source of accurate information, then click Done.
Trusted news organizations, government sites, press release from a well known company, news from research university
A virtual private network (VPN) uses a method called ___ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet.
Tunneling
______ is the most common medium used in homes and businesses. Select your answer, then click Done.
Twisted pair cable
When a recipient opens an infected file, a ______ will activate itself and find more files to infect, often making your operating system unuseable. Select your answer, then click Done.
Virus
______ allows people to cancel their traditional phone service and make calls using their Internet connection. Select your answer, then click Done.
Voiceover Internet Protocol (VoIP)
Also known as ______ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent. Select your answer, then click Done.
White hat
A ______ is the connection of two or more central computers or LANS. Select your answer, then click Done.
Wide area network (WAN)
Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites. Select your answer, then click Done.
World Press
A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.
Worm
Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.
Zombies
The domain name uniquely identifies a company or organization in a URL (uniform resource locator). Click on the URL's domain name, then click Done.
example.com
A ______ provides multiple ports for connecting nodes and transmits packets to all connected nodes. Select your answer, then click Done.
hub
A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done
mission critical
RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.
redundant array of independant discs
______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.
scalable
A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.
switch
The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.
threats
The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.
topology
A radio station can broadcast their programs online via a ___, allowing people from around the world to listen to their shows online. Select your answer, then click Done.
webcast
Web pages that are linked to each other make up a ______. Select your answer, then click Done.
website
Click on the file name of the actual web page, then click Done.
*last part of the URL*