CGS 1060C concept chapter 4,5,6 review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT one of the specialization of Wi-Fi technology?

802.11x

The seeds of the Internet were planted in 1969 with ____, which connected computers at four universities in the western United States.

ARPANET

A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

AUP

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Ad-supported streaming

___ occurs when computers or machines can perform the work that was once done by a human.

Automation

Which of the following is NOT a web browser?

Bing

___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Biotechnology

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Botnets

A ____ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

DRM

___ refers to the technology gap that exists between different social and economic classes.

Digital divide

A ____, such as apple.com and Whitehouse.gov, uniquely identifies a site and a brand on the Web.

Domain name

Most network installations use a(n) ____ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethermet

Many websites have a(n) ___ area that should be checked for common questions and their responses.

FAQ

____ is the act of having an online, text-based conversation with one or more individuals that occurs in real time.

Instant messaging

The ___ lock can make it difficult for thieves to steak a laptop.

Kensington

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?

LinkedIn

___ are files that record activities and events on a computer.

Logs

Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.

NSA

___ involves the creation or manipulation of matter at the smallest possible scale.

Nanotechnology

___ occurs when an organization transfers some aspect of its business to a third party.

Outsourcing

The most popular method for file transfer today is known as ____ file sharing, which uses a distributed network of individual users instead of a central server.

P2P

___ involves luring individuals into entering personal information into a website controlled by the hacker.

Phishing

Browser ____, such as Adobe Flash Player, are separate programs that allow your web browser to play several types of multimedia content.

Plug-ins

___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Private browsing

Social news sites such as _____, encourage users to share links to news and other interesting content they find on the Web.

Raddit

_____ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.

Search engine

___ is a type of malware which is designed to report activity on your computer to another party.

Spyware

___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Strong

___ is the process of working for a company without being physically present at the company's office.

Telecommuting

A ____ is program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

___ is the act of being annoying and antagonistic in online social interactions.

Trolling

If you visit a website or page that you would like to remember for the future, you can add it to your browser's bookmark or favorites.

True

When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.

UPS

Web pages have a standard addressing system known as a(n) ____, which allows them to be located on the internet.

URL

Because it increases the security of a network connection, a ____ is often required for users who wish to access a company's private network over an Internet connection.

VPN

_____, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data

VolP

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

WAN

___ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Watson

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

Whistleblowing

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Who you know

_____ is not always considered to be a reliable site because you cannot be certain that the information you are reading comes from a credible source.

Wikipedia

The ___ is a global system of linked, hypertext documents.

World Wide Web

A wireless ____ is the device to which all nodes connect in order to communicate wirelessly.

access point

If you want to include a file with your email message, it should be placed it in the ____ area.

attachments

For modern networks, ____ is measured in either megabytes per second (Mbps) 0r gigabits per second (Gbps).

bandwidth

Any email address placed in the ___ will be invisible to the recipients of your message.

bcc

A(n) ____ is a web page or small website that contains a series of chronological posts and comments.

blog

The term ____ is used to describe and digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

broaddband

____ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.

cookies

Any step you take toward off a threat is called a:

countermeasure

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair use

Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity.

false

Copyright protection lasts 20 years after the date of publication or release.

false

DSL technology is currently faster than cable or fiber-optics.

false

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

false

Social engineering is a form if hacking that has a social or political agenda behind it.

false

The Internet is managed centrally by the United States government, as it was primarily developed in this country.

false

The sleep mode on a computer generally saves more electricity than hibernate mode.

false

Twitter restricts posts, or tweets, to a maximum of 180 characters.

false

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

Many companies and specialty websites offer ____, or discussion boards, where individuals can ask questions and reply to each other.

forums

Today, a ____ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

Twitter popularized a system that uses the ____ symbol to mark keywords or topics in a message.

hashtag

The term ___ refers to the set of online behaviors that are considered polite and proper.

netiquette

Data moves through networks in structures known as ____, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

In the model known as ____, advertisers pay for their ads only when a website visitor clicks on the ad.

pay-per-click

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.

privacy policy

The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

A ____ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of al the nodes attached to it.

switch

Large organizations often use a ____ library for backups and archives of their data.

tape

"192.168.1.101" is an example of and IPv4 address.

true

3G, 4G, and LTE are all terms that refer to mobile internet connectivity.

true

Creative works such as books, songs, and photographs are protected by copyright law.

true

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

true

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

true

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

true

Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

true

Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.

true

One of the most powerful features of Google Maps is Street View, which shows you almost any part of a map as if you we're driving through that street.

true

PayPal and Google Wallet are both examples of online payment services that allow you to pay for goods online and transfer money to other individuals.

true

The network that connects the computers in a school's study center or library is considered a LAN.

true

The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.

true

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

true

A ____ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

worm


Kaugnay na mga set ng pag-aaral

Chapter 39: Nursing Care of a Child with an Alteration in Sensory Perception/Disorder of the Eyes or Ears

View Set

underwriting insurance and delivery

View Set

Chapter 61: Management of Patients with Dermatologic Disorders 4

View Set

APS SAT Word List - 2005 - KMSchecter

View Set