Computer Concepts Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

The trend toward online collaboration is usually called workgroup computing. (T/F)

True

Tim Berners-Lee proposed the idea of the World Wide Web.

True

With a(n) peer-to-peer (P2P) network, a central server is not used. (T/F)

True

List at least five strategies for virus prevention. (essay)

- antivirus software to detect and eliminate computer viruses and other types of malware - control access to computers and networks - intrusion protection systems can help businesses detect and protect against DoS attacks - prevent programs from being installed without permission using security settings - use mobile security software to protect mobile devices

Describe what is a Malware and list 4 types of malware? (essay)

- any type of malicious software that is written to perform destructive acts - computer virus -- a software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system - computer worm -- a malicious program designed to spread rapidly by sending copies of itself to other computers via a network - Trojan horse -- malicious program that masquerades as something else, usually an application program - Mobile malware -- Primary goal is to obtain mobile banking credentials

Describe the importance of data integrity, security, and privacy and how they affect database design (essay)

- integrity -- Quality of data entered determines the quality of generated information -- Data validation refers to the process of ensuring that data entered into the database is valid - security -- protects data against destruction and misuse (both intentional and accidental) -- Protects against unauthorized access to and unauthorized use of a database and data loss - privacy -- addresses protecting the privacy of personal data stored in databases

What are the phases involved in program development? (essay)

- problem analysis -- specifications are developed and reviewed by systems analyst and programmer - program design -- program specifications are used to develop an algorithm - program coding -- writing the code using programming language - program debugging and testing -- ensures program is free of errors (bugs) and works as it is supposed to - program implementation and maintenance -- getting programmed installed and running and then updating software as needed

Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences. a. cookies b. blogs c. podcasts d. filters

A. COOKIES b. blogs c. podcasts d. filters

One common way to deal with spam that makes it to your computer is to use a(n) ____. a. e-mail filter b. war drive c. encryption scheme d. hot site

A. E-MAIL FILTER b. war drive c. encryption scheme d. hot site

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital Counterfeiting

A. INFORMATION PRIVACY b. information security c. information piracy d. digital Counterfeiting

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network. a. network interface card (NIC) b. powerline card c. data communications card (DCC) d. USB

A. NETWORK INTERFACE CARD (NIC) b. powerline card c. data communications card (DCC) d. USB

Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement. (T/F)

False

Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more. (T/F)

False

The use of cookies provides no benefits to consumers. (T/F)

False

A(n) computer network is a collection of computers and other hardware devices connected together so that network users can share hardware, software, and data, as well as communicate with each other electronically. (T/F)

True

. ____________________ cable is the newest and fastest wired transmission medium. (F/I)

Coaxial cable

A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data is sent (T/F)

False

A(n) copyright is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. (T/F)

False

Direct Internet connections are much slower than dial-up connections. (T/F)

False

FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________ (T/F)

False

Security software protects devices against malware and other threats.(T/F)

True

Describe the star network topology (essay)

In local area networks where the star topology is used, each machine is connected to a central hub. The star topology allows each machine on the network to have a point to point connection to the central hub. All of the traffic which transverses the network passes through the central hub. Advantages: *Easy to install and reconfigure. *No disruptions to the network when connecting or removing devices. *Easy to detect faults and to remove parts. *Less expensive. *Includes robustness, that is, if one link fails, only that link is affected, other links remain active. Disadvantages: *If the hub fails, the whole system is dead. *If the hub, switch, or concentrator fails, nodes attached are disabled. *Requires more cable length than a bus topology. *More expensive than bus topologies because of the cost of the hubs, etc.

A(n) ____________________ is a private network, such as a company LAN, that is designed to be used by an organization's employees and is set up like the Internet. (F/I)

Intranet

Some monitoring systems in use today use the RFID tags and RFID readers to monitor the status of objects (such as shipping boxes, livestock, or expensive equipment) to which the RFID tags are attached. (T/F)

True

Structured programming embodies a top-down design philosophy. (T/F)

True

System failure can occur because of a hardware problem, a software problem, or computer sabotage.(T/F)

True

___________________ is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection. (F/I)

Spyware

A government database is a collection of data about people that is collected and maintained by private industry. (T/F)

True

TCP/IP is the protocol used for transferring data over the Internet. (T/F)

True

In ____, data is sent when it is ready but all data must be delivered at the time that it is needed. a. synchronous transmission b. isochronous transmission c. asynchronous transmission d. endrosynchronous transmission

a. synchronous transmission B. ISCOCHRONOUS TRANSMISSION c. asynchronous transmission d. endrosynchronous transmission

____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information. a. Framing b. Pharming c. Profiling d. Auctioning

a. Framing B. PHARMING c. Profiling d. Auctioning

____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies. a. Object-oriented programming (OOP) b. Structured programming c. Object programming (OP) d. Aspect-oriented programming (AOP)

a. Object-oriented programming (OOP) b. Structured programming c. Object programming (OP) D. ASPECT-ORIENTED PROGRAMMING (AOP)

____ is the use of networking technology to provide medical information and services. a. Telecommuting b. Remote medicine c. Telemedicine d. Remote health

a. Telecommuting b. Remote medicine C. TELEMEDICINE d. Remote health

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. a. Trojan horse b. hub c. firewall d. bridge

a. Trojan horse b. hub C. FIREWALL d. bridge

____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. a. Twisted-pair cable b. Fiber-optic cable c. Coaxial cable d. Single-wire cable

a. Twisted-pair cable b. Fiber-optic cable C. COAXIAL CABLE d. Single-wire cable

Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming b. object-oriented programming c. function programming d. virtual programming

a. aspect-oriented programming B. OBJECT-ORIENTED PROGRAMMING c. function programming d. virtual programming

The technique used for data sent over the Internet is ____. a. docket switching b. wideband switching c. packet switching d. data switching

a. docket switching b. wideband switching C. PACKET SWITCHING d. data switching

In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program. a. flowchart b. object c. algorithm d. module

a. flowchart b. object C. ALGORITHM d. module

A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a. logic error b. assembly error c. syntax error d. coding error

a. logic error b. assembly error C. SYNTAX ERROR d. coding error

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy

a. piracy policy b. security policy c. identity policy D. PRIVACY POLICY

A(n) ____ is a network designed to service an urban area, typically a city or county. a. supernet b. metropolitan area network (MAN) c. local area network (LAN) d. intranet

a. supernet B. METROPOLITAN AREA NETWORK (MAN) c. local area network (LAN) d. intranet


Conjuntos de estudio relacionados

Chapter 28: Assessment of Hematologic Function and Treatment Modalities

View Set

4.4.3Test (CST): The Modern and the Media English IV Sem 2

View Set

Chapter 2: Developing Visual Literacy

View Set

RP:23-Contracts, listing agreements,MLS, brokers authority, net listings, CA RE Purchasing Agreement, disclosures

View Set