Exam 1 questions
false
The Internet and the Web are exactly the same thing
duplexing
The ability to automatically print to both sides of a piece of paper.
keyloggers
a type of spyware known as ---- can record the individual keystrokes of a user
virtual reality
allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets
logs
are files that record activities and events on a computer
CPU
as the main processor of a computer, the--- is responsible for organizing and carrying out instructions in order to produce a desired output
VPN
because it increases the security of a network connection, a ----- is often required for users who wish to access a company's private network over an internet connection
fault-tolerant
computers are able to continue their operation even when problems are present
zombies
computers which are under the external control of a hacker are known as
data
consists of individual facts or pieces of information
packets
data moves through networks in structures known as ----- which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device
false
elements (like the body and paragraph element) are surrounded by the # symbol
firewall
examines and blocks internet traffic in order to protect your private network
hacker
generally refers to an individual who uses a computer and/or network to commit a variety of crimes
acceptable use policy
is a document containing an organizations policies for the ethical, secure, and appropriate use of computing resources
social engineering
is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs
Trojan horse
is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system
virtual machine
is a special environment that allows you to run an operating system on top of another operating system
data validation
is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered
telecommuting
is the process of working for a company without being physically present at the companies office
ergonomic
keyboards, which are designed to be comfortable and tailored for the human body, have keys which are angled and a palm rest at the base in order to keep your wrists straight
function
keys which are labeled F1 F2 and so on, are used to perform an action within a program
HTML
language which was used in the first web page ever created, is still in use today
ERP
large organizations use-----systems because they bring together many types of business functions into one software solution
volume
license allows companies to install the software on multiple (or all) machines that they own
router
looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination
encryption
many types of software and devices use ----- to scramble your data or communication
3D
printers are unique in that they can create a physical object made of various materials, such as a plastic toy
Web 2.0
refers to a new way to use the World Wide Web, whereby any user can create and share content, as well as provide opinions on existing content
biometrics
refers to the measurements of patterns or characteristics found in the human body
netiquette
refers to the set of online behaviors that are considered polite and proper
database
simply put, a computer ----- is an organization method for storing and retrieving information such as customers, employees, inventory, and sales record
project management
software allows managers to create and track a sophisticated plan in order to achieve a variety of goals
beta
software companies will often release an ---- version to a limited audience that will test it on their systems. Programmers can then collect information form these users about any errors that were encountered
DRM
software is sometimes illegally modified in order to disable ---- technologies such as copy protection and authenticity checks
operating systems
such as Windows or Mac OS, exist primarily to help the computer run and manage its resources
true
the HTML behind a web page can determine how well that web page is ranked (in search results)
true
the World Wide Web consortium (or W3C) sets the standards for the HTML language
creates a hyperlink
the a (or anchor) element does the following to a web page:
multitasking
the ability to run multiple programs at the same time is known as:
authentication
the security principle known as ----- requires that individuals must confirm their identity
ARPANET
the seeds of the internet were planted in 1969 with----, which connected computers at four universities in the western United States
solid state
the tiny memory cards used by digital cameras and mobile devices are an example of
Shareware
to keep using ---- after the trial period, you must purchase a full version or a code that can be entered into the software
URL
web pages have a standard addressing system known ----- which allows them to be located on the Internet
5
which is the current version of HTML
bluetooth
which of the following is a short-range wireless technology that can connect your smartphone with a wireless headset worn on the ear or the hands-free systems in some cars?
processing
which of the following refers to the ability of a computer tp perform a variety of actions based on instructions from the user or a program
cloud computing
which of the following technologies allows you to store your files and use various applications in an online account
hyperlinks
you will often find-----on a web document that, when clicked, act as connectors to another document on the World Wide Web