Computer Science test
Malicious software
Malware
_______ is software intended to do harm to a computer connected to the Internet
Malware
_______ is the choice of disapproving to use of information
Opt Out
______ is the choice of approving to a use of information
Opt in
______ refers to the relationship between computers that are communicating over the Internet where each of the computers--yours and someone else's--is a "file server" for the other
Peer-2-peer
A(n) _____ is a light-sensitive material used to make a chip.
Photoresist
Programming languages are most helpful to programmers because they are ____
Precise
The______ limits the government's ability to interfere with people's privacy.
Privacy Act of 1974
A(n) ________ is published by the receiver and used by the sender to encrypt messages.
Public key
The ______ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date.
Quality
The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms.
RSA129
Malware that directly manipulates operating system tables to hide is presence is known as______.
Rockit
_______ communication involves message exchange in which the content is encrypted to keep it private.
Secure
The ability to control when ______ do and don't conduct electricity is the main process used in computer construction.
Semi conductor.
What encryption algorithm requires the use of a secret key know to both the sender and the receiver?
Symmetric
________, the practice of a Web site automatically sending details about your visit to other content providers, is an emerging problem of concern to privacy experts.
Tracking
A(n) ______ is a connector between two wires that controls whether they are electrically connected.
Transistor
A ______ is a computer program that, unbeknownst to the user, contains code that performs malicious attacks
Trojan horse
A company can place a cookie on your computer even if you've never visited its Web site.
True
Americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purpose and Security.
True
Android, an open source OS, and Apples, iOS are examples of operating systems for mobile devices
True
Computer can only execute instructions; therefore, rerunning a program with the same data produces exactly the same result every time
True
Cookies can be used to track ad placement on Web sites.
True
Each byte in memory is limited in size
True
Emptying the trash is no guarantee that the data has been erased.
True
Every memory location in the computer is numbered, starting at 0.
True
Hyperlinks have two parts: the part you read and the part the computer reads--the actual place you will go to when you click the link.
True
Identity theft is the crime of posing as someone else for fraudulent purposes.
True
In contrast to the "omnibus" solution of adopting the OECD list, the United States uses an approach called "sectoral", meaning that it passes laws to deal with specific industries (business sectors) or practices.
True
In the United States, the protection of an individual's privacy is the responsibility of the government.
True
Information is generated when buying goods and services at a store.
True
Modern browsers let you control the cookie policy for your computer.
True
Non-EU countries that want information on EU citizens must show that they have privacy laws consistent with the OECD principles.
True
Partial backups should be made more often than full backups.
True
Starting a computer is calling booting.
True
The United States has not adopted the OECD principles
True
The United States provides limited enforcement of OECD privacy principles.
True
The fear of computers taking over the world has died down since the 1950's and 1960's.
True
The laws protecting the information of individuals place more limits on the government than on business.
True
The purpose of encryption is to allow private transmission and storage of sensitive information.
True
Viruses often distributed through email attachments.
True
The method by which malware gets into your computer is known as_____of attack.
Vactors
______ is a computer program that infects a host computer and then spreads
Virus
LOOP A
Will repeat the following instructions A times until ending, and exiting
A ______ can send copies of itself to other nodes on a computer network without having to be carried by an infected host file
Worm
In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ________.
Zombies
END
ends loop, and you can proceed or stop
Due to its simplistic design, Microsoft's Vista operating system reportedly contained fewer than 4,000 lines of program code when it was released in 2007.
false
a megabyte is exactly one million bytes
false
computer memory is divided into bytes of 9 bits
false
the ADD instruction adds the values, not the address numbers of the memory locations
false
The ability to create software by combining other software is known as______.
functional composition
Programs and their data must reside in the computer's ______ when programs run.
memory
A(n) _____ starts the computer, manages memory, and controls the peripherals
operating system
Data Fetch gets the values, called _____, from memory that the ALU needs to perform operations like ADD and MULTIPLY
opperands
_____ write the instructions for a computer
programmer
Computers have instructions for both transforming and ______ information
transferring
the ability to store different values in its memory locations makes the computer a flexible tool.
true
(operator operand 1 operand 2)
(+12 53) #add 12 to 53
_______ is simply an alternative form of machine language expressed using letters and normal numbers so people can understand it.
Assembly language
What algorithm has a key for encryption and decryption that are quite different but related?
Asymmetric
The common name for an integrated circuit is a computer ______
Chip
The rate of the Fetch/Execute Cycle is determined by the computer's _______.
Clock
A(n)_____ is information stored on a Web client computer by an HTTP server computer.
Cookie
What is the science of "secret writing"?
Cryptography
_____ is the process of recovering encrypted cipher text.
Decryption
_______ is the reversing encryption process
Decryption
Every peripheral communicates with the computer through a(n)_____.
Device driver
_____, considered by many to be the world's first electronic computer, was created by J. Presper Eckert and John Mauchly of the University of Pennsylvania.
ENIAC
______ is transforming representation so it is no longer understandable.
Encryption
"Opt-in" means the business can use it unless the person explicitly prohibits the new use.
False
A field effect transistor is a connector between two wires that can be controlled to allow a charge to flow between the wires (conduct) or not.
False
A passage is the path in a semiconductor where electricity travels.
False
A single device driver will generally work with serveral different peripheral devices.
False
A third-party cookie is initiated by a direct request by the user.
False
American privacy laws are much stricter than European laws
False
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States.
False
Messages encrypted using a public key RSA129 cryptosystem code have not yet been cracked.
False
Miniaturization is the biggest achievement of microchip technology.
False
Personal computer can only be backed up to another hard disk.
False
The Do-Not-Call List was so successful that it has now been applied to email.
False
The difference between a worm and virus is the the worm program "rides along" with other software, while the virus can actually send itself to other devices on the internet.
False
The vast majority of business transactions are anonymous.
False
The _____ Cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.
Fetch/Execute
A(n)______ is a force one object can have on another without touching it.
Field effect
A(n) ______ is a barrier between two computers on a network, or between the Internet and a personal computer.
Firewall
+-*/
Four operator OAMPL supports
Recovery after a disaster involves installing the most recent ________ backup copy.
Full
______ and _____ entities are the two biggest threats to privacy
Government and Business
____ ______ takes password the user originally chooses, chops it up, and stirs it around according to a given formula
Hash function
C, C++ and Java are all examples of a(n) ______ programming language
High-level
______ is the crime of posing as some else for fraudulent purposes.
Identity theft
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be "made more secure" simply by ________ the size of the key.
Increasing
The process of executing a program is called _______.
Instruction interpretation
IC is short for ____ _____
Integrated circuit
Most Americans wrongly assume that their privacy regarding business information is restricted to _______.
Internal use
ALU is short for _____
arithmetic/logic unit
Programs written in a high-level language are ______, i.e., translated, into assembly language programs, which are then assembled into binary.
compiled
A(n) ______ is an "instruction execution engine" , cycling through a series of operations, performing an instruction on each round.
computer
The ______ is the part of the computer that gets instructions from memory and carries them out.
control unit