computer app mod 1 part 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States.

ARPANET

When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

AUP

Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.

NO

n 1986, the National Science Foundation (NSF) created a new high speed network called _____ that brought all the networks together, creating a "network of networks," otherwise known as the young Internet. Select your answer, then click Done.INSTRUCTION: In 1986, the National Science Foundation (NSF) created a new high speed network called _____ that brought all the networks together, creating a "network of networks," otherwise known as the young Internet.

NSFNET

Select an app that makes it easy for anyone to rent out empty rooms in their house. Select your answer, then click Done.

airbnb

The Internet has increased the piracy of intellectual property such as ______ and many other creative works

all

Web browsers help you find and retrieve a web page. Click on four types of web browsers

all but marketplace

Select three shared items that multiple users can instantly access on a network, then click Done.

all but personnel files

Select five ways to authenticate a user's identity.

all but registered letter

Select three types of media that carry data from one node to another, then click Done.

all but tv cable

Select four websites that are generally a credible source of accurate information, then click Done.

all except facebook and wiki

_____ is one of the most popular business to consumer (B2C) websites and also the web's largest store. Select your answer, then click Done.

amazon

___ is a security utility that protects your computer from various types of malware.

antimalware

If you visit a website or page that you would like to remember for the future, you can add it to your browser's list of ______ or favorites

bookmarks

A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done.

bridge

Select three ways you can connect to the internet,

broadband, dial up, mobile

Click on the part of the window where you would enter the email addresses of individuals other than your primary recipient

cc

The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.

data mining

By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.

decision support

Who regulates or censors the content on the Internet?

each country's gov

Electronic mail, commonly called ______, is a system for exchanging messages through a computer network.

email

A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.

everything but fiber optic cable

The domain name uniquely identifies a company or organization in a URL (uniform resource locator).

example

While not illegal, many unethical behaviors such as ______ affect online users.

flaming and trolling

A ______ is a node on a network that serves as an entrance to another network. Select your answer, then click Done.

gateway

Click on the most popular search engine, then click Done.

google

A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.

hacker

The World Wide Web is a global system of linked, ______ documents.

hypertext

Whenever your operating system or browser issues a software update, you should apply it___.

immediately

Anita is buying airline tickets for her family. Instead of communicating via email, Anita should use ______ so that she gets replies from her family members immediately.

instant messaging

Whether it's dial-up, broadband, or mobile, every type of Internet service requires a connection to a(n) ______.

internet service provider

A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.

intranet

Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates.

learning management system

A coworker told Connor that he saved the files he needed to the server on the network. What is a network? Select your answer, then click Done.

linked computers

Gigi just started looking for a job. What should she do to make sure that she has a good online presence when employers are searching for her

linkedin and delete bad posts

A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done.

mission critical

Select three types of streaming media that are delivered on demand from an online source

music, tv, movies

Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.

network adapter card

Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download

none

Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.

office automation

The most popular method for file transfer today is known as ______ file sharing

p2p

Data moves through networks in structures known as______. Select your answer, then click Done.

packets

Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."

password theft

______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.

pay per click

______ is a feature that will delete your history, cache and cookies the moment you close the private windows.

private browsing

RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.

redundant disks

______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.

scalable

The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.

social media

______ can often use portions of copyrighted material under the fair use provision

students and educators

Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.

surge protector

A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.

switch

______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests

third party

The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.

threats

The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.

topology

A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.

trojan horse

Many people that work from home use ______ to conduct meetings with coworkers located in various locations

videoconferencing

Websites are typically located or hosted on ______ servers.

web

Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites

wordpress

A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.

worms

Teddy wants to create a music video and post it online. Where should she post her music video so she can share it with the world?

youtube

Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.

zombie


Conjuntos de estudio relacionados

Intro to Microeconomics: Chapter 5 Practice Questions

View Set

Dallas PD Radio Signals, Codes, & Channels

View Set

Математика. «Простые задачи на сложение и вычитание» (1 класс)

View Set