CIS final

¡Supera tus tareas y exámenes ahora con Quizwiz!

When analog data is measured and converted to a stream of numerical values, this is referred to as __________ the data.

Digitizing

A 32-character password is an example of using biometrics.

False

A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.

False

A small slice of a data warehouse is called a data mine.

False

An authentication server is used to host websites on a client/server network.

False

Copyright lasts for only 50 years in the United States.

False

Encrypting data is not an appropriate measure for mobile devices such as smartphones.

False

If you use an Internet cache, then the information displayed in your browser is automatically refreshed.

False

Instant messaging is secure because of the type of encryption used.

False

Routers are used to send data on a specific route through an internal network.

False

The term dotted quad means you have four dots in a row in your Java source code.

False

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

File History

Sometimes groups of data packets are sent together in a package called a

Frame

Which of the following is not one of the factors used in multi-factor authentication?

Identity

When someone uses your personal information to pose as you, this is

Identity theft

Which of the following is not a category of intellectual property?

Imprint

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

Inoculation

The collection of large national and international networks used to establish the Internet is called the

Internet backbone.

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Which of the following is not a digital video file format?

PDF

Sending e-mails to lure people into revealing personal information is a technique known as phishing.

Phishing

Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place?

Real-time processing

Which topology tends to provide the fairest allocation of network resources?

Ring

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

Scalability

Which of the following is an advantage of installing a client/server network in a business?

Sharing of Peripherals

A filter is used to create a temporary subset of data from a database.

True

A primary key is used to uniquely identify records.

True

Analog signals are continuous.

True

Data warehouses capture data only from one time period.

True

Digital rights management (DRM) is a system of access control that allows only limited use of the material.

True

MIME is the protocol that supports sending files as e-mail attachments.

True

Most modern operating systems include some type of NOS functionality.

True

Network adapters perform specific tasks to enable nodes to communicate on a network.

True

Plagiarism is technically not illegal in the United States.

True

Star topologies are the most widely used topology.

True

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.

True

Your Internet service provider has a default DNS server to translate a URL into an IP address.

True

Your social security number should never be shared on a website, in an email, or through messaging.

True

Which network cable type is most susceptible to signal interference?

UTP

Which of the following data-mining techniques is used to create charts and dashboards?

Visualization

When is a flat database sufficient to use when organizing data?

When the data is simple and can be organized in one table

An applet is

a small application located on a server computer

IPv6 uses 128 bits to assign a(n)

address to every device connected to the internet

Computer viruses can be spread by

all of the above

It is important to maintain your online reputation

all of the above

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses.

A private key is important

to decode an encrypted message

Data captured as users navigate through a website is called

clickstream data.

Encryption is used to

code your e-mail so only one person can decipher it

Unnecessary duplication of data in a database is referred to as

data redundancy.

Which of the following is not considered metadata?

database name

The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of

digital convergence

Which of the following is an open electronic publishing format?

epub

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as

fake news

Copying a music CD and giving it to a friend is "fair use."

false

Using copyrighted works without permission of the copyright holder

is possible under the "fair use" doctrine.

HTTPS is different than HTTP because

it is a combination of HTTP and the Secure Sockets Layer (SSL)

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

network address translation (NAT)

A process to ensure that data in a database is organized most efficiently is called

normalization.

A customer information table linked to a password table in a business database reflects which type of relationship?

one-to-one

A ______ is a program that takes complete control of your computer without your knowledge.

rootkit

A surge protector may look like just another power strip but it also can

save your device if a voltage spike is sent through the electrical system.

SMTP is the set of rules used to

send e-mail along the Internet to its destination

The information in a data packet includes

the data and the destination

The Internet is primarily funded by

your federal income taxes

The process whereby users prove they have authorization to use a computer network is known as

Authentication

Which server would a client/server network include to ensure only authorized users are logging onto the network?

Authentication

Authentication techniques that rely on personal biological traits are called

Biometrics

The set of instructions that define how to display the HTML elements in your site is

CSS.


Conjuntos de estudio relacionados

Chapter 28: Securing Wireless Networks

View Set