CIS Final
A(n) _______ is application software that allows users to access and view Web pages. You answered correctly!!! reader host browser server
browser
A Web page may contain a(n) ______, which is a built-in connection to another Web page or part of a Web page. portal directory link index
link
What can you trust to be secure 100 percent of the time? text messages emails browser history apps none of these
none of these
Each document on the Web, called a Web ______, can contain text, graphics, audio, and video. You answered correctly!!! host net reader page
page
The ________ is the destructive event or prank that malware is intended to deliver. payload hash cookie spam
payload
A(n) ________ is a program that extends the capability of a browser. plug-in IrDA chat client VoIP
plug-in
The _____ interprets and carries out the basic instructions that operate a computer
processor
A _________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer. cookie worm rootkit payload
rootkit
As related to the use of computers, __________ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. social engineering phishing a virus hoax pharming
social engineering
A computer falls into the ______ category if it is, at the time of construction, one of the fastest computers in the world. minicomputer mainframe microcomputer supercomputer
supercomputer
______ consists of programs that control or maintain the operations of the computer and its devices. GUI A communications device System software Application software
system software
The first step in cleaning a computer is
turning it off
In an email address, the ____ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user. domain name user name subject directory address book
user name
Most ____ are open to modificatins by the general public. blogs content aggregators portals wikis
wikis
An EULA permits users to give copies to friends and colleauges, while continuing to use the software. T or F
False
An IP address usually consists of four groups of numbers, each separated by a comma. T or F
False
An IP address, such as www.google.com, is the text version of a domain name. T or F
False
Each enterprise user spends time on the computer for different reasons that include personal financial mangement, web access, communications and entertainment. T or F
False
Factors that cause CVS include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard. T or F
False
Grace Hopper was important to the history of computers and Mrs. Nuffer's hero because she created integrated circuits. T or F
False
Mainframes are the fastest, most powerful computers - and the msot expensive. T or F
False
Most computers are analog which means they recognize only two states on and off T or F
False
Multimedia files cannot be infected with malware. T or F
False
RAM stores data permanently T or F
False
Real time means that you and the people with whom you are conversing must be online at different times. T or F
False
Satelllite Internet service provides high-speed Internet access through the cable television network via a cable modem. T or F
False
Signals that travel through the air are always stronger and faster than hard wired signals. T or F
False
The Internet is one of the more popuar services on the Web. T or F
False
The more widely used search engines for personal computers are IE, Firefox, Safari, and Google Chrome. T or F
False
The motherboard carries out basic instruction that operate a computer T or F
False
To develop a Web page, you have to be a computer programmer. T or F
False
You don't need to proofread email or text messages before sending them because spell check will catch any errors. T or F
False
A _______ is part of the motherboard and connects the processor to the main memory
Front side bus
What computer part stores stuff long term
Hard drive
A(n) _____ address is a number that uniquely identifies each computer or device connected to the Internet. TCP IP NSF DNS
IP
A(n) ______ is a business that provides access to the Internet free or for a fee. CATV ISP OSP TLD
ISP
A(n) ______ message is a real-time Internet communication, where you exchange messages with other connected users. text picture instant video
Instant
A(n) ______ circuit is a super-thin slice of semiconducting material packed with microsopic circuit elements such as wires, transistors, capacitors, logic gates, and resistors. digital integrated analog ion
Integrated
The ____ is worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. Internet microblog Web NSF
Internet
A blog is a Web site that uses a regularly updated journal format to reflect the interests, opinions and personalities of the author and sometimes site visitors. T or F
True
A computer uses the binary system in which the digit 0 and 1 represents the electronic state of a circuit T or F
True
A firewall is like a security guard that decides which network traffic is allowed and which ports are open. T or F
True
A mainframe is a large and expensive computer, capable of simultaneously processing data for hundereds or thousands of users. T or F
True
A port is a point at which a peripheral attaches to or communicates with a system unit so that the peripheral can send data to or receive information from the computer T or F
True
According to Netiquette, using ALL CAPS is the equivalent of shouting and should be avoided. T or F
True
An ISP is a regional or national access provider.T or F
True
Installing is the process of setting up software to work with the computer, printer, and other hardware. T or F
True
It is legal to download copyrighted music only if the song's copyright holder has granted permission for users to download and play the song. T or F
True
Just about any personal computer can be configured to perform the work of a server. T or F
True
Never open an email attachment unless you are expecting it and it is from a trusted source. T or F
True
Output is the result produced by a computer. True or False
True
Public domain software is software that has been donated for public use and has no copyright instructions T or F
True
The system unit is a case that contains mechanical components of the computer used to process data T or F
True
The term bit comes from shortening and combining the two words binary digit. T or F
True
Vacuuming the dust from around the system unit will help air circulate through the system unit and help to keep it cool T or F
True
When working or cleaning inside a computer, it is important to wear and antistatic wristband to avoid damaging internal components with state electricity T or F
True
With desktops and laptop computers, users access account balances, pay bills, play games, watch videos, and much more. T or F
True
volatile memory is a type of memory that loses its contents when the computer loses power or is turned off T or F
True
______ enables users to speak to other users over the Internet (instead of the public switched telephone network). IrDA CAD VoIP POST
VoIP
The _____ is a collection of linked documents, graphics, and sounds that can be accessed over the Internet. web blogosphere digital divide cyberspace
Web
which part of the computer does the mathematical and logical calculations
ALU
________ was a networking project designed by the US Department of Defense to allow scientists to share information. It was started in September of 1969 and is considered the precursor of the Internet. ISP ARPANET TLD WWW
ARPANET
How can you tell if a website encrypts its traffic? A. Google it. B. Look for the lock symbol in a URL. C. All websites encrypt their traffic D. Encrypted sites take longer to load
B
Why are cyber vulnerabilities unlikely to ever go away? A.The government won't allow people to fix them. B. Criminals need them to steal identities C. They are side effects of the freedom and ease of communicating online. D.They're protected in a secret base on the moon.
C
Data is processed in the ________. CPU MC SU PDA
CPU
This type of broadband internet service provides access via cable TV networks and modems. Cable Internet Service DSL FTTP Wi-Fi
Cable Internet Service
This type of broadband internet service provides a hi-speed internet connection to devices such as smart phones with built in or "on board" wireless modems. Cable Internet service DSL Cellular radio network FTTP
Cellular Radio Network
This type of broadband internet service provides internet via high speed connection using regular phone lines. Cable internet service DSL FTTP Wi-Fi
DSL
_______ is/are a collectin of unprocessed items, which can include text, numbers, images, audio, and video. Data Programs Instructions Information
Data
The computer pictured here is a closet sized computer that is used by thousands of users at the same time in corporations for daily business. What type of computer is pictured? Personal computer Mainframe Supercomputer Embedded computer
Mainframe
_______ is an area of a computer that temporarily holds data that is waiting to be processed, stored, or output. Memory Storage Input Output
Memory
Jaunita is a broke college student studying programming. She just built her own computer and needs a cheap option for an operating system that she can manipulate and code to customize to her liking. What category of software would best fit her needs
Open source
Which of these is regularly used for secure online communication? Caesar cipher Public-key cryptography morse code enigma code
Public-Key cryptography
_______ refer to memory chips storing permanent data and instructions
ROM
________ is the process of tranferring data in a continuous and even flow. Uploading Flowing Downloading Streaming
Streaming
________ consists of the programs that control or maintain the operations of the computer and its devices. Application software System software GUI Communication device
System software
A content _______ is a business that gathers and organizes Web content and then distributes, ior feeds, the content to subscribers for free or a fee. collector navigator aggregator browser
aggregator
Malware is a term that can be used to describe _________. viruses rootkits Trojan horses all of the above.
all of the above
Which of the following does data represent? events ideas things All of the above
all of the above
Which of these groups exploits cyber vulnerabilities? Criminals Government Hacktivists All of the above
all of the above
Many Web pages use ________, which is the apperance of motion created by displaying a series of still images in sequence. multimedia keyframes animation keystoning
animation
Broadband connections provide greater _________, the speed at which information travels over the Internet. You answered correctly!!! DSL modulation multiplexing bandwidth
bandwidth
a ______ is an opening inside the system unit in which you can install additional equipment, usually a storage device
bay
Factors that cause CVS include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard. T or F
false
Claire is trying to decide what kind of internet connection would be best for her. she lives in the city but three miles from the local telephone switch. Which is the best option for her? cable DSL dial-up satellite
cable
Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _________. computer programming computers and their uses computer repair all of the above
computers and their uses
Web 2.0 sites rely upon the fact that many people wil visit them and provide new ________ that keeps them fresh. content videos scripts programs
content
Phishing is the discovery, collection, and analysis of evidence found on computers and networks. T or F
false
You can assume that information on the Web is correct. T or F
false
A ________ is an assualt whose purpose is to disrupt computer access to an Internet service such as the Web or email. zombie denial of service attack Trojan horse virus hoax
denial of service attack
Most computers store data in a(n) _____ format as a series of 1s and 0s. analog digital logical executable
digital
___________ involves the examination of computer media programs, data and log files on computers, servers, and networks. Encryption key Digital forensics Email filtering Trusted source.
digital forensics
On the Web, a subject ______ classifies Web pages into an organized set of categories and related subcategories. glossary index dictionary directory
directory
A(n) _______ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrupt the ciphertext. botnet certificate authority encryption algorithm encryption key
encryption algorithm
A __________ is a socket on the motherboard that can hold an adapter card
expansion slot
A Web browser classifies Web pages in an organized set of categories and related subcategories. T or F
false
In the web address http://www.nps.gov/grsm/planyourvisit.htm the planyourvisit.htm is the _________. protocol domain name file name path
file name
a _____ equals approximately 1,000,000,000 bytes
gigabyte
Physical access controls, such as locked doors and windows, usually are adequate to protect against __________. software piracy hardware theft unauthorized access all of the above.
hardware theft
What is etched onto a computer chip
integrated circuits
What is a network? super computer interconnected computers or devices ISP workstation
interconnected computers or devices
The term decoding refers to the process of
translating an instruction into a signal
According to Netiquette you should always use proper spelling, grammar and punctuation when communicating electronically. T or F
true
Spam is Internet junk mail. T or F
true
To browse the Web, you need a computer that is connected to the Internet and that has a Web browser. T or F
true
To protect against data loss caused by a system failure, computer users should backup files regularly. T or F
true
To use a search engine your system must be running a web browser. T or F
true