CISY Ch 4,5,6,7
Files saved to a hard disk are stored in ________.
Clusters
Windows ________ helps to protect a computer from viruses and spyware.
Defender
Windows ________ is a program that protects against viruses and spyware.
Defender
Which operating system is specialized and can run on simple hardware?
Embeded
________ software blocks unauthorized access to your computer.
Firewall
The Android operating system is the embedded version of ________.
Linux
________ is the ability to do more than one task at a time.
Multitasking
When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.
PnP
When you set up your wireless router, you should change the ________, which is also called the wireless network name.
SSID
All of the following are examples of malware, EXCEPT ________.
Spam
Chromebooks rely on an Internet connection, web apps, and cloud storage rather than traditional software.
True
Installing software updates requires an Internet connection.
True
PNP allows you to easily add new hardware to your computer.
True
The Windows Embedded OS can be found on many devices from set-top cable boxes to medical devices.
True
Your school network is most likely a client-server network.
True
Which is NOT a mobile embedded operating system?
UNIX apache
The macOS operating system is based on ________.
Unix
A(n) ________ creates a private network through the Internet.
VPN
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
VPN
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
WAN
Which of the following applications is NOT an example of presentation software?
acrobat
A router is a form of security because it ________.
acts like a firewall
When two wireless devices are directly connected to each other, they form a(n) ________ network.
ad hoc
________ hackers hack into systems to steal or vandalize.
black hat
A(n) ________ is a flaw in programming.
bug
Which of the following items below is NOT a cloud service offering?
business as a service
The intersection of a row and a column in a spreadsheet is called a ________.
cell
A ________ network is one that has at least one computer that provides centralized management, resources, and security.
client server
An email claiming that you have won a lottery might be an example of ________.
computer fraud
Which cybercrime is considered to be a form of harassment?
cyber stalking
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
cyber terrorism
A ________ is a network composed of a group of clients and servers under the control of one central security database.
domain
________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.
donation ware
A workgroup and a homegroup refer to the same network feature.
false
Apache OpenOffice is offered for only a small fee based on the number of computers on which you want to install it.
false
If you want to create a peer-to-peer network, you must first install a specific software program.
false
Jane purchased some financial software at the local office store. She brought it home and installed it on her computer. She actually owns the software program now because she purchased it from a local merchant.
false
Microsoft Office Online web apps are full-featured versions of the Microsoft Office applications.
false
Spam CANNOT be sent as a text message.
false
Spyware is easy to remove from your computer.
false
The only authority responsible for investigating cybercrime in the United States is the FBI.
false
The only program you need to fully protect your computer is a good antivirus program.
false
The unauthorized use of your neighbor's wireless network is called trolling.
false
In a database, a person's email address is an example of a(n) ________.
field
A(n) ________ can prevent unauthorized access to a network.
firewall
Which of the following is an example of a personal Software-as-a-Service (SaaS)?
google drive
Which of the following is NOT a common LAN topology?
hierarchical
Instead of purchasing and maintaining their own cloud-based servers, a company could use a(n) ________-as-a-Service provider.
infrastructure
Which of the following is NOT a cloud service provider?
intel
The ________ was created in an effort to make it easier for victims to report cybercrimes.
internet crime complaint center
________ is a program that is harmful or malicious to your computer.
malware
Web apps which will run on any device with a supported browser and Internet access are called platform-________.`
neutral
________ software can be copied, modified, and redistributed without paying a fee.
open source
The ________ is the most important software on a PC.
operating system
Each computer is considered equal in a ________ network.
peer to peer
A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.
personal information manager
________ redirects you to a phony website by hijacking a domain name.
pharming
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
phishing
When you decide to use your neighbor's open wireless network without permission, you are ________.
piggybacking
A(n) ________ app is a program that can be carried and run from a flash drive.
portable
Rajiv purchased some great gaming software and wants to make copies for all of his friends. Rajiv is restricted from making copies of the software for his friends because it has a(n) ________ software license.
proprietary
A(n) ________ contains information about a single entry in a database.
record
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
router
In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.
spreadsheets
In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network.
star
A(n) ________ allows someone to use software for a monthly or yearly fee.
subscription
A ________ is a device that connects multiple devices on a LAN.
switch
A(n) ________ is a device that is used to connect multiple devices on a LAN.
switch
Most home routers also include a built-in ________.
switch
The ________ software makes the computer run.
system
When you purchase software in a box, reading the ________ is important to know if the software will function properly.
system requirements
The term "cloud" in cloud computing refers to ________.
the internet
Which of the following transmission media is NOT used to transmit signals on an Ethernet network?
topology
A ________ appears to be a legitimate program, but is actually something malicious.
trojan horse
A benefit to cloud service providers is that they can operate from remote places.
true
A bug is a flaw in programming of a software application.
true
A centralized server provides access to file and print services as well as email.
true
A firewall can be used to shield your computer from direct access to the Internet.
true
A hotfix resolves individual software problems as they are discovered.
true
A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
true
Antispyware software prevents adware software from installing itself on your computer.
true
Bluetooth technology connects peripherals wirelessly at short ranges.
true
Cruising a neighborhood in search of open wireless networks is called wardriving.
true
Encryption converts plain text into ciphertext.
true
Fiber networks use optical network terminals to connect to the Internet.
true
Firewalls can be implemented by hardware and/or software.
true
Freeware can be used at no cost for an unlimited period of time.
true
In a bus topology, data travels along a single cable that is terminated at both ends.
true
In a network, a file can be an example of a resource.
true
In a peer-to-peer network, all the computers are set up to share resources with every device on the network, but none provide centralized authority.
true
Queries allow you to pull out records from a table that meet specific criteria.
true
Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
true
Rootkits are very difficult to detect.
true
Shareware is also referred to as trialware.
true
The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
true
Two wireless devices that are directly connected to each other form an ad hoc network.
true
Worms spread over network connections without any help from users.
true
The difference between a virus and a worm is a ________.
virus needs a host file, but a worm does not
Moving through a neighborhood trying to locate open wireless access points is called ________.
wardriving
When a company pays people to hack into its own system, it calls in ________ hackers.
white hat