CGS2060 Final Exam FSU Winston
Select the reasons for compressing a file.
reduce the bandwidth needed to transmit a file reduce storage space requirements
The type of database that uses common fields to create links between tables is called a ___ database.
relational
Select the characteristics of a OneDrive account
requires a Microsoft Email account provides free cloud storage can serve as extra storage space
Which of these extensions, if you open it, will probably install software onto your computer? Be careful!
.exe
Which of the following file extensions is commonly used for drawings?
.gif
If you just need a phone for calling and texting, a ___ phone can save you money.
3G
Select the advantages of using a database instead of a traditional filing system.
A database can hold larger amounts of data A database can provide better data integrity
o remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.
CTRL + X
Cyberattacks include
DDoS attacks identity theft
Select what's true about session cookies.
Determine the start and end of a session. Analyze and measure traffic on a web page. Determine the web browser being used.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
Which of the following are ways to prevent computer virus infections.
Downloaded content from the web should only be from trusted sites. Limit your web surfing to trusted sites. install antivirus software
Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .
OneDrive
You own a pet care center. what fields might you enter when you create a table for dogs that you care for?
Owner's last name Pet's name Owner's address
Which of the following are common email viruses.
Ransomware keystroke logging Trojan
There are several ways to create a new folder in Windows. Which of these would work?
Right-click On the command bar Right-click
Select what's true about passwords.
Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. Regularly check your accounts to ensure they have not been tampered with.
Match the following regarding file compression: Zip Lossless Lossy
Zip - a lossless compression format Lossless - reduces space required by reducing redundancy within files Lossy - reduces space required by removing less valuable data
Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).
allow delete block
Identify what's true about script kiddies.
amateur computer hackers with little programming expertise illegally gain access to computer systems using programs (scripts) that others have written
In order to change sound waves into digital signals, smartphones contain ___ - digital converter.
analog
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
application
Select the functions of a Mobile Switching Station.
assigns frequencies to your calls sends your call to the receiver's MSS changes the cell and base station your transmissions go through as you travel
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
Select the characteristics of a Base Transceiver Station
connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)
If you believe you have fallen victim to a phishing scam you should
contact the institution the message was allegedly sent from. contact US-CERT.
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
cube
Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .
database
Identify common symptoms of a computer virus.
documents won't save computer runs extremely slowly programs launch on their own
If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
drag
Which of these devices are manufactured by Samsung?
galaxy note
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
graphical
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
individual users
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
An unsolicited email message is called _____.
spam
Choose the Samsung Galaxy tablet options.
tab series note series
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
zombie
Before you can start tethering, verify that it's included in your cell phone's ___ plan
data
In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.
field
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
filters
in order to keep your files organized, it's a good idea to create ___ and place your files in them.
folders
When you need to link 2 tables in a database that don't have a field in common, one solution is to create a _____ in one table that links to the primary key in the other table.
foreign key
Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.
internet
Apple's mobile device with the largest display is the ___ .
ipad pro
In order to sync your iPhone to your MacBook you must first open the ___ app.
itunes
Select the characteristics of fiber optic lines.
made of 1 or thousands of fibers high-speed transmission
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.
management
Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .
organize
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
players
If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .
restore
An easy way to rename a folder in Windows is to ___ -click on the folder and then click Rename.
right click
Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .
roaming
The device that connects 2 networks is a _____.
router
The two major concerns regarding cloud storage are reliability and ___ .
security
Select the methods of placing a file in the recycle bin.
select the item and press the Delete key right-click the item and select Delete drag the item to the Recycle Bin
our college has a database with a Students table. Which of the following could be a primary key in the table?
student number social security number
A collection of related records in a database is referred to as a _____.
table
You must individually adjust cookie settings in every browser you use. true or false
true
Persistent cookies store information about
user preferences
Select the characteristics of a modem.
usually provided by the ISP converts analog signals into digital signals converts digital signals into analog signals
To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .
view