Computer Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

How do I create secure passwords and manage all of my passwords?

Use more than 14 letters including, numbers, symbols, upper and lower case letters, nothing that is relative to you, no words that are in the dictionary, changing it often and by using a password management software.

Worms

Use transport methods like e-mail and networks to spread without human interaction

denial-of-service (DoS)

Users are denied access to computer system because hacker is making repeated requests. When flooded with requests, the system shuts down.

Which protocol uses standard Internet connections to make phone calls over the Internet?

VoLP

Types of Hackers

White-hat or ethical - Black-hat - Grey-hat

Rootkits

are programs (or sets of programs) that allow hackers to gain access to your computer and take control without your knowledge

Distributed denial-of-service (DDoS)

attack launches attacks from more than one zombie computer

In Windows, which character is used as a path separator?

backslash (\)

The ________ language consists of just two digits: 0 and 1.

binary

The term "bit" is short for ________.

binary digit

In the Windows operating system, the hard drive is represented as the ________.

c drive

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

device driver

Zombie

is computer controlled by hacker

Running the Disk Defragmenter utility will ________.

make the hard drive work more efficiently

A ________ is approximately 1 million bytes.

megabyte

The small circuit boards that hold a series of RAM chips are called ________.

memory modules (memory cards)

When referring to hard drives, access time is measured in ________.

milliseconds

The ________ contains the central electronic components of the computer.

motherboard

Inkjet printers and laser printers are examples of ________ printers.

non-impact

The most essential software in your computer system is the ________.

operating system software

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.

output

USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.

parallel and serial

Incremental backup

partial backup

Network Address Translation

provides a way to hide the IP addresses of a private network from the Internet while still allowing computers on that network to access the Internet

Some video games require a ________ operating system.

real time

Domain names can be purchased from companies called _____; examples include Network Solutions, eNOM and Godaddy.

registrars

A(n) ________ is a device that looks like a skinny pen but has no ink. A(n) ________ is a device that looks like a skinny pen but has no ink.

stylus

Image backup

system backup

Which of the following is an open source operating system?

Linux

Logic bombs

Logic bomb is triggered when certain logical conditions are met

macro viruses

Macro virus attaches itself to a document that uses macros

Front side bus speed is measured in ________.

Megahertz

________ is the communications methodology where data is broken into smaller chunks to be sent over various routes at the same time.

Packet Switching

Polymorphic viruses

Periodically rewrite themselves to avoid detection

An accumulation of temporary Internet files has no effect on your computer's overall performance.

Pertaining to system reliability, False

________ is the place in a computer where the programs and data the computer is currently using are stored.

RAM

An expansion hub allows you to provide new, external ports to your computer.

True

Spam

Unwanted or junk e-mail

Spyware

Unwanted piggyback programs that download with other software you install from Internet that transmit information about you

Linux is an open source operating system that can be used both on personal computers and as a networking operating system.

True

Modern printers feature Bluetooth connectivity technology.

True

Solid state drives have no platters or motors.

True

Some CPUs now have three levels of cache memory. Some CPUs now have three levels of cache memory.

True

Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.

True

The ALU is the part of the CPU that performs mathematical operations and makes comparisons.

True

The CPU is located on the motherboard.

True

The CPU machine cycle starts with the Fetch step.

True

The amount of memory your video card needs depends on what you want to display on your monitor.

True

The operating system provides the means for users to interact with a computer. Answer

True

The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time.

True

The user interface is part of a computer's operating system.

True

Video cards often include their own RAM.

True

You can download a version of Linux from the Internet for free.

True

You can download open source software for free from Web sites and install it on as many computers as you like.

True

You can use System Restore to restore your system's settings back to a specific date when everything was working properly.

True

Scareware

Type of malware downloaded onto computer that tries to convince you that computer is infected with virus Then directed to site to buy fake removal tools

Which of the following operating systems is used primarily with mainframes as a network operating system?

UNIX

All of the following are terms related to part of the boot process EXCEPT:

USB

________ ports are now the most common ports for connecting input and output devices to the computer.

Universal serial bus USB

How to Keep hackers out

Protect your digital information • Use passwords - Hide activities from prying eyes

The basic input/output system is stored on a ________ chip.

ROM

________ is a form of permanent memory that holds all the instructions the computer needs to start up.

ROM

Biometric Authentication Devices

Read unique personal characteristics - Fingerprint - Iris pattern in eye - Voice authentication - Face pattern-recogniton • Provide high level of security - Eliminate human error

Which of the following is NOT a step in the CPU machine cycle?

Register

Main Purpose of viruses

Replicate themselves and copy code to as many other files as possible

Boot-sector viruses

Replicates itself into hard drive's master boot record

Encryption viruses

Run program that searches for common types of data files Compress files using a complex encryption key that makes files unusable Asks for payment to receive the program to decrypt your files

A(n) ________ uses the same kind of memory that flash drives use and has no spinning platters or motors.

SSD

Script

Script is miniprogram hidden on Web sites that is executed without user's knowledge

Computer virus

a program that attaches itself to another computer program, Attempts to spread to other computers when files are exchanged, One of the most widespread types of cybercrimes

Trojan horse

appears to be useful but while it runs it does something malicious in background

Running the Disk Cleanup utility is a quick way to ________.

clear out unnecessary files

________ binary digits (or bits) combine to create one byte.

eight

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.

eight bits

________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

ergonomics

C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.

file path

The CPU is connected to the system memory by the ________.

front side bus

Broadband

general term used to refer to high-speed network connections

CPU speed, also called clock speed, is currently measured in ________.

gigahertz

Microsoft Windows and Mac OS use a ________ interface.

graphical user

Any computer parts that you can actually touch are considered to be ________.

hardware

The ________ number system uses the digits 0-9 and the symbols A-F.

hexadecimal

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.

hyperthreading

To make sure your computer performs reliably, you can do all of the following EXCEPT:

increase the front side bus speed.

________ is data that has been organized or presented in a meaningful fashion.

information

A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.

input device

Phishing

lures users to reveal personal information that could lead to identity theft

A ________ enables your computer to connect to other computers or to the Internet.

network interface card (NIC)

The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.

nonvolatile

Computers process data into information by working exclusively with ________.

numbers

The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.

operating system

A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.

port

The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.

power supply

________ is the semiconductor material used to make transistors.

silicon

During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.

swap

If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.

task scheduler

RAM is considered volatile storage, which means it is ________.

temporary

Which of the following does NOT occur during the power-on self-test?

the OS is moved into RAM

Cache memory levels are determined by ________.

the chips proximity to the CPU

Moore's Law is a rule that predicts ________.

the pace at which CPUs improve

"Bandwidth"

the relative speed of a network connection

________ microphones pick up sound from only one direction.

unidirectional

The percentage of time your CPU is working is referred to as CPU ________.

usage

The earliest generation of electronic computers used ________ as switches.

vacuum tubes

Pharming

when malicious code is planted on your computer

A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.

True

Adobe Dreamweaver is a Web authoring program.

True

All students are expected to maintain a working WKU email account at all times during the semester. This includes managing the quota to avoid missed messages.

True

An expansion card that translates binary data into images is a(n) ________.

True

Boot Camp is a utility that allows you to run Windows and Mac OS X at the same time.

True

Cell phones, PDAs, and portable music players should be turned off PRIOR to entering a classroom.

True

Every computer is designed with a maximum limit on the amount of RAM it can support.

True

External hard drives are an ideal solution when you need more storage than a flash drive can provide.

True

External hard drives are often used to back up data that is contained on the internal hard drive.

True

Hard drive access time is measured in milliseconds.

True

Hard drives have been growing in storage capacity by about 50 percent each year.

True

Hard drives have the largest capacity of any storage device.

True

If you install a device that is not PnP, you will be prompted to install a driver.

True

Installing a device driver can sometimes cause system instability.

True

It is important that if you are building your own computer, you make sure that the motherboard that you buy accommodates the CPU you have chosen.

True

All computer labs maintain a strict "No food, drink, or tobacco products" policy.

True

All data input into a computer will be stored as 1s and 0s.

True

The ASCII code can represent ________ unique characters.

256

OpenOffice includes all of the following components EXCEPT:

Access

What type of memory stores frequently used instructions or data needed by the CPU?

Cache

Cache memory is a form of ROM.

False

The OS allows you to organize the contents of your computer in a hierarchical structure of ________.

directories

A ________ is approximately 1 billion bytes.

gigabyte

Adware

- Displays sponsored advertisements - Pop-up windows

How hackers gain access

- Installing hacking software -Indirect access - Through Internet connection - Logical ports

Hardware firewall devices

- Routers - Keep unused logical ports closed

Malware

- Software that has malicious intent

Antivirus Software Companies

- Symantec - Kaspersky - AVG - McAfee

Threats to Data

- Unauthorized access - Tampering - Destruction

What is cybercrime and who perpetrates it?

-criminal action perpetrated primarily through the use of a computer -individuals who use computers, networks, and the Internet to perpetrate crime.

A set of rules for exchanging electronic information is called ________.

...

When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server. When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server.

...

________ lines are high-speed, fiber-optic communications lines.

...

If Microsoft Word 2010 is used to create a file, which file extension is added automatically?

.docx

A single alphabetic or special character is equal to ________ bit(s).

1

How many points are available in this course? In other words, if you got 100% on everything there is to do, how many points would you earn?

1100

Unicode uses ________ bits to code character data.

16

New technologies pushing the boundaries of printing include ________.

3D printing, cloud printing, inkless printing

What is a firewall, and how does it keep my computer safe from hackers?

A software program or hardware designed to protect computers from hackers by putting a barrier between you and the hacker.

From which types of viruses do I need to protect my computer?

All types.

Hoaxes

Attempt to make someone believe something that is untrue - Target large audiences - Practical joke, agents of social change, or time wasters - Mostly by e-mail

How do I manage online annoyances such as spyware and spam?

Avoid malware, adware, spyware and spam.

How can I surf the Internet anonymously and use biometric authentication devices to protect my data?

By using onion router, by using personal characteristics to identify you.

In Windows, a file path starts with a ________.

Drive letter

When virtual memory is in use, the condition of excessive paging is called swapping.

False

Which of the following activities is carried out by the ALU?

Completion of all arithmetic calculations

The ________ is used in combination with other keys to perform shortcuts and special tasks.

Control Key

The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.

DVI

Situational ethics

Decision making should be based on circumstances

Antivirus software

Designed to detect suspicious activity

Which of the following Windows utility programs arranges files on your hard drive in sequential order?

Disk Defragmenter

Stealth viruses

Erase their code from the hard drive and reside in the active memory

Rule utilitarianism

Espouses establishing moral guidelines through specific rules

________ plug into slots on the motherboard and provide additional functionality for your computer.

Expansion cards

If you regularly download and upload files, chances are that you are using ________.

FTP

Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.

False

Level 1 cache is located farther away from the CPU than Level 2 cache.

False

Linux is available in various packages called GIMPs.

False

One bit is equal to eight bytes.

False

RAM is nonvolatile storage.

False

RAM is stored directly on the CPU.

False

The percentage of time that your CPU is working is referred to as processing time.

False

Upgrading your CPU can increase how quickly data can move to or from the CPU.

False

The amount of RAM recommended for most systems today is measured in ________.

GB

Societal Ethics

General set of unwritten guidelines for people to follow

Multipartite viruses

Infect multiple file types

What can I do to protect my computer from viruses?

Install Antivirus, have software and hardware firewalls, do not click on unknown links or downloads.

The ________ contains all of the different configurations used by the OS and by other applications.

Kernel

Software firewalls

Most operating systems include firewall - Many security suites include firewall software

Relativism

No universal moral truth, only beliefs, perspectives, and values

Unethical behavior

Not conforming to a set of approved standards of social or professional behavior Not all illegal behavior is unethical

displays use organic compounds that produce light when exposed to an electric current.

OLED

Secondary objectives of viruses

Slow down networks, Display annoying messages, Destroy files or contents of hard drive

Cookies

Small text files that Web sites automatically store on hard drive to make return visit more efficient and better geared to your interests

Firewalls

Software program or hardware designed to protect computers from hackers

All of the following can be considered to be network operating systems EXCEPT:

Symbian OS

________ is the main suite of protocols used on the Internet.

TCP/IP

Windows ________ is similar to the Activity Monitor of a Mac that analyzes computer performance.

Task Manager

You can use the Windows ________ to check on a nonresponsive program.

Task manager

Which of the following is the first step in the boot process?

The BIOS is activated by powering on the CPU.

The CPU consists of which two parts?

The control unit and the arithmetic logic unit.

How can hackers attack my computing devices, and what harm can they cause?

They can gain access through directly Installing hacking software,and indirectly Through Internet connection, and Logical ports. They can steal information, break into sites, capture login ID and password, purchase items, sell credit card info.

time bombs

Time bomb is triggered by the passage of time or on a certain date


Conjuntos de estudio relacionados

Chapter 12.2 The Harding Presidency

View Set

Chapter 6 Quiz (BANK), Big Data Exam 2, ISDS 2001 CH. 4 TEST BANK, Test 2 Chap 4, ISM4402 Exam 2

View Set

Catcher in the Rye Questions and Quizzes

View Set

Financial Statements and Ratio Analysis

View Set

E-Commerce - Chapter 1, E-commerce Chapter 2 MCQ, E-Commerce Chapter 3, E-Commerce Chapter 4, E-commerce chapter 5, Ecommerce chapter 5 quiz 1, E-commerce chapter 6, E-commerce Chapter 7, E-commerce chapter 8, Ecommerce Quiz 2- Chapter 9, Chapter 9,...

View Set

Ch8 Comprehensive Medical Eye Examination

View Set

NUR 2144 Pharmacology II Chapter 55: Drugs Acting on the Lower Respiratory Tract

View Set

Advance Accounting Study Guide Chapter 17

View Set