CIS Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) _______ is application software that allows users to access and view Web pages. You answered correctly!!! reader host browser server

browser

A Web page may contain a(n) ______, which is a built-in connection to another Web page or part of a Web page. portal directory link index

link

What can you trust to be secure 100 percent of the time? text messages emails browser history apps none of these

none of these

Each document on the Web, called a Web ______, can contain text, graphics, audio, and video. You answered correctly!!! host net reader page

page

The ________ is the destructive event or prank that malware is intended to deliver. payload hash cookie spam

payload

A(n) ________ is a program that extends the capability of a browser. plug-in IrDA chat client VoIP

plug-in

The _____ interprets and carries out the basic instructions that operate a computer

processor

A _________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer. cookie worm rootkit payload

rootkit

As related to the use of computers, __________ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. social engineering phishing a virus hoax pharming

social engineering

A computer falls into the ______ category if it is, at the time of construction, one of the fastest computers in the world. minicomputer mainframe microcomputer supercomputer

supercomputer

______ consists of programs that control or maintain the operations of the computer and its devices. GUI A communications device System software Application software

system software

The first step in cleaning a computer is

turning it off

In an email address, the ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user. domain name user name subject directory address book

user name

Most ____ are open to modificatins by the general public. blogs content aggregators portals wikis

wikis

An EULA permits users to give copies to friends and colleauges, while continuing to use the software. T or F

False

An IP address usually consists of four groups of numbers, each separated by a comma. T or F

False

An IP address, such as www.google.com, is the text version of a domain name. T or F

False

Each enterprise user spends time on the computer for different reasons that include personal financial mangement, web access, communications and entertainment. T or F

False

Factors that cause CVS include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard. T or F

False

Grace Hopper was important to the history of computers and Mrs. Nuffer's hero because she created integrated circuits. T or F

False

Mainframes are the fastest, most powerful computers - and the msot expensive. T or F

False

Most computers are analog which means they recognize only two states on and off T or F

False

Multimedia files cannot be infected with malware. T or F

False

RAM stores data permanently T or F

False

Real time means that you and the people with whom you are conversing must be online at different times. T or F

False

Satelllite Internet service provides high-speed Internet access through the cable television network via a cable modem. T or F

False

Signals that travel through the air are always stronger and faster than hard wired signals. T or F

False

The Internet is one of the more popuar services on the Web. T or F

False

The more widely used search engines for personal computers are IE, Firefox, Safari, and Google Chrome. T or F

False

The motherboard carries out basic instruction that operate a computer T or F

False

To develop a Web page, you have to be a computer programmer. T or F

False

You don't need to proofread email or text messages before sending them because spell check will catch any errors. T or F

False

A _______ is part of the motherboard and connects the processor to the main memory

Front side bus

What computer part stores stuff long term

Hard drive

A(n) _____ address is a number that uniquely identifies each computer or device connected to the Internet. TCP IP NSF DNS

IP

A(n) ______ is a business that provides access to the Internet free or for a fee. CATV ISP OSP TLD

ISP

A(n) ______ message is a real-time Internet communication, where you exchange messages with other connected users. text picture instant video

Instant

A(n) ______ circuit is a super-thin slice of semiconducting material packed with microsopic circuit elements such as wires, transistors, capacitors, logic gates, and resistors. digital integrated analog ion

Integrated

The ____ is worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. Internet microblog Web NSF

Internet

A blog is a Web site that uses a regularly updated journal format to reflect the interests, opinions and personalities of the author and sometimes site visitors. T or F

True

A computer uses the binary system in which the digit 0 and 1 represents the electronic state of a circuit T or F

True

A firewall is like a security guard that decides which network traffic is allowed and which ports are open. T or F

True

A mainframe is a large and expensive computer, capable of simultaneously processing data for hundereds or thousands of users. T or F

True

A port is a point at which a peripheral attaches to or communicates with a system unit so that the peripheral can send data to or receive information from the computer T or F

True

According to Netiquette, using ALL CAPS is the equivalent of shouting and should be avoided. T or F

True

An ISP is a regional or national access provider.T or F

True

Installing is the process of setting up software to work with the computer, printer, and other hardware. T or F

True

It is legal to download copyrighted music only if the song's copyright holder has granted permission for users to download and play the song. T or F

True

Just about any personal computer can be configured to perform the work of a server. T or F

True

Never open an email attachment unless you are expecting it and it is from a trusted source. T or F

True

Output is the result produced by a computer. True or False

True

Public domain software is software that has been donated for public use and has no copyright instructions T or F

True

The system unit is a case that contains mechanical components of the computer used to process data T or F

True

The term bit comes from shortening and combining the two words binary digit. T or F

True

Vacuuming the dust from around the system unit will help air circulate through the system unit and help to keep it cool T or F

True

When working or cleaning inside a computer, it is important to wear and antistatic wristband to avoid damaging internal components with state electricity T or F

True

With desktops and laptop computers, users access account balances, pay bills, play games, watch videos, and much more. T or F

True

volatile memory is a type of memory that loses its contents when the computer loses power or is turned off T or F

True

______ enables users to speak to other users over the Internet (instead of the public switched telephone network). IrDA CAD VoIP POST

VoIP

The _____ is a collection of linked documents, graphics, and sounds that can be accessed over the Internet. web blogosphere digital divide cyberspace

Web

which part of the computer does the mathematical and logical calculations

ALU

________ was a networking project designed by the US Department of Defense to allow scientists to share information. It was started in September of 1969 and is considered the precursor of the Internet. ISP ARPANET TLD WWW

ARPANET

How can you tell if a website encrypts its traffic? A. Google it. B. Look for the lock symbol in a URL. C. All websites encrypt their traffic D. Encrypted sites take longer to load

B

Why are cyber vulnerabilities unlikely to ever go away? A.The government won't allow people to fix them. B. Criminals need them to steal identities C. They are side effects of the freedom and ease of communicating online. D.They're protected in a secret base on the moon.

C

Data is processed in the ________. CPU MC SU PDA

CPU

This type of broadband internet service provides access via cable TV networks and modems. Cable Internet Service DSL FTTP Wi-Fi

Cable Internet Service

This type of broadband internet service provides a hi-speed internet connection to devices such as smart phones with built in or "on board" wireless modems. Cable Internet service DSL Cellular radio network FTTP

Cellular Radio Network

This type of broadband internet service provides internet via high speed connection using regular phone lines. Cable internet service DSL FTTP Wi-Fi

DSL

_______ is/are a collectin of unprocessed items, which can include text, numbers, images, audio, and video. Data Programs Instructions Information

Data

The computer pictured here is a closet sized computer that is used by thousands of users at the same time in corporations for daily business. What type of computer is pictured? Personal computer Mainframe Supercomputer Embedded computer

Mainframe

_______ is an area of a computer that temporarily holds data that is waiting to be processed, stored, or output. Memory Storage Input Output

Memory

Jaunita is a broke college student studying programming. She just built her own computer and needs a cheap option for an operating system that she can manipulate and code to customize to her liking. What category of software would best fit her needs

Open source

Which of these is regularly used for secure online communication? Caesar cipher Public-key cryptography morse code enigma code

Public-Key cryptography

_______ refer to memory chips storing permanent data and instructions

ROM

________ is the process of tranferring data in a continuous and even flow. Uploading Flowing Downloading Streaming

Streaming

________ consists of the programs that control or maintain the operations of the computer and its devices. Application software System software GUI Communication device

System software

A content _______ is a business that gathers and organizes Web content and then distributes, ior feeds, the content to subscribers for free or a fee. collector navigator aggregator browser

aggregator

Malware is a term that can be used to describe _________. viruses rootkits Trojan horses all of the above.

all of the above

Which of the following does data represent? events ideas things All of the above

all of the above

Which of these groups exploits cyber vulnerabilities? Criminals Government Hacktivists All of the above

all of the above

Many Web pages use ________, which is the apperance of motion created by displaying a series of still images in sequence. multimedia keyframes animation keystoning

animation

Broadband connections provide greater _________, the speed at which information travels over the Internet. You answered correctly!!! DSL modulation multiplexing bandwidth

bandwidth

a ______ is an opening inside the system unit in which you can install additional equipment, usually a storage device

bay

Factors that cause CVS include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard. T or F

false

Claire is trying to decide what kind of internet connection would be best for her. she lives in the city but three miles from the local telephone switch. Which is the best option for her? cable DSL dial-up satellite

cable

Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _________. computer programming computers and their uses computer repair all of the above

computers and their uses

Web 2.0 sites rely upon the fact that many people wil visit them and provide new ________ that keeps them fresh. content videos scripts programs

content

Phishing is the discovery, collection, and analysis of evidence found on computers and networks. T or F

false

You can assume that information on the Web is correct. T or F

false

A ________ is an assualt whose purpose is to disrupt computer access to an Internet service such as the Web or email. zombie denial of service attack Trojan horse virus hoax

denial of service attack

Most computers store data in a(n) _____ format as a series of 1s and 0s. analog digital logical executable

digital

___________ involves the examination of computer media programs, data and log files on computers, servers, and networks. Encryption key Digital forensics Email filtering Trusted source.

digital forensics

On the Web, a subject ______ classifies Web pages into an organized set of categories and related subcategories. glossary index dictionary directory

directory

A(n) _______ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrupt the ciphertext. botnet certificate authority encryption algorithm encryption key

encryption algorithm

A __________ is a socket on the motherboard that can hold an adapter card

expansion slot

A Web browser classifies Web pages in an organized set of categories and related subcategories. T or F

false

In the web address http://www.nps.gov/grsm/planyourvisit.htm the planyourvisit.htm is the _________. protocol domain name file name path

file name

a _____ equals approximately 1,000,000,000 bytes

gigabyte

Physical access controls, such as locked doors and windows, usually are adequate to protect against __________. software piracy hardware theft unauthorized access all of the above.

hardware theft

What is etched onto a computer chip

integrated circuits

What is a network? super computer interconnected computers or devices ISP workstation

interconnected computers or devices

The term decoding refers to the process of

translating an instruction into a signal

According to Netiquette you should always use proper spelling, grammar and punctuation when communicating electronically. T or F

true

Spam is Internet junk mail. T or F

true

To browse the Web, you need a computer that is connected to the Internet and that has a Web browser. T or F

true

To protect against data loss caused by a system failure, computer users should backup files regularly. T or F

true

To use a search engine your system must be running a web browser. T or F

true


Conjuntos de estudio relacionados

ИКТ экзамен 1 часть

View Set

General Biology 2 - MIDTERMS (Final Test)

View Set

bio test 4 module 11 gene expressions

View Set

Ch 42 Assessment and Management of Patients with Obesity

View Set

ALC Marksmanship Exam 02/13/2017

View Set

From Treasure Island (Section Questions 1-3)

View Set