CGS 2060 MIDTERM

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Cookie

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

Cube

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

Cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

Cybercrime

How is the screensize of a laptop computer measured?

DIAGONALLY

The Internet service that tends to provide the most consistent speeds is _____.

DSL

Which of the following would be considered a cybercrime?

Data Manipulation

SAGE was developed by the US Department of ___ .

Defense

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DoS attack

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a _____ .

Tablet

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C

A ___ name identifies a server site on the Internet.

domain

Which transmission media has the largest bandwidth?

fiber optic

An unsolicited email message is called _____.

spam

Which of the following represent the highest amount of storage?

terabyte

"Full HD" resolution is expressed as:

1920 x 1080

Most new laptop computers come with how much storage?

256 GB - 1 TB

When you buy a new laptop, how much RAM should it come with?

4-8GB

Blu-rays provide approximately ___ of storage space.

700 MB

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

CONTENT

Emailing a file to yourself is an example of using ___ storage.

Cloud

Sage was developed during the _____ war.

Cold war

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

File Transfer

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transfer Protocol

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

Filters

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

Firewall

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

Graphical

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

Hacktivism

A switch distinguishes between various devices within a network by their __ addresses.

IP

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

Individual users

Adding software to a digital device, or adding hardware components to a digital device is called _____ .

Installing

Which of these browsers was developed by Microsoft?

Internet Explorer

All of the following are common ports that are included with laptop computers except

MIDI port

Windows OS is owned and maintained by _____ .

Microsoft

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

The word modem stands for ____.

Modulator-demodulator

What manages hardware and software, supports the computer's basic functions, and runs programs?

Operating system

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .

SSID

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

Safari

A kilobyte is equal to approximately one _____ bytes.

Thousand

A terabyte equals approximately one _____ bytes?

Thousand

The World Wide Web was created through a collaboration led by ___ .

Tim Berners-Lee

The highest level in the domain name hierarchy is known as the ___ .

Top Level Domain

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

Touchscreens

URL stands for ___ Resource Locator.

Uniform

Software that infects a computer and is created using computer code is called a computer _____.

Virus

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

WPA

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

WPA2

The standard for wireless network privacy and protection is known as ___ .

WPA2

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

WiFi hotspot

WWW stands for ___ ___ ___ .

World Wide Web

A computer controlled by a hacker is called a _____.

Zombie

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

What 3 items are needed to install a home WiFi network?

an Internet signal a modem a router

The capacity of a particular transmission medium is called its _____.

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

A group of compromised computers controlled by a hacker is called a _____.

botnet

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

A security system separating 2 networks or even computers on the same network is called a ___ .

firewall

Which of the following is a strength of the Linux platform?

free to download and use

Which of the following represents the least amount of storage?

gigahertz

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

internet

ISP stands for:

internet service provider

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ____ computer.

laptop

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

macro virus

A megabyte equals approximately one _____ bytes?

million

Fiber optic cable is _____ expensive than coaxial cable to install.

more

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

multi-band

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

optical drives

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

packet sniffer

The BitTorrent protocol is often called ___ file sharing.

peer-to-poor

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

A gigabyte equals approximately one _____ bytes.

thousand

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm

Select the domain name

www.cnet.com

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

Computers

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

Control Panel

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.

Packet

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

Persistent

A request for an electronic "echo" or response from another computer or server is called a ____.

Ping

Software that can be added to a browser to increase its functionality are called ___ .

Plug-ins

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

Projective capacitive

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

Router

A URL identifies a particular __ address on the World Wide Web.

computer

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberattacker


Kaugnay na mga set ng pag-aaral

Accounting II- Midterm Study Guide

View Set

Relationships Between Quantities

View Set

ECON 200 Market Equilibrium and Policy

View Set

Chapter 1 // current issues in maternal-newborn nursing

View Set

Critical Reader What, of the Goldfish, Would You Wish

View Set

Ch 8 Water Everywhere: A Most Precious Resource

View Set

Stat Tri 2 multiple choice and fill ins

View Set

𝕨𝕖𝕖𝕜 7 𝕖𝕝𝕓𝕠𝕨 𝕣𝕖𝕘𝕚𝕠𝕟

View Set