CGS2060 Midterm Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

COMPUTER STORAGE QUIZ 100%

----------------

NETWORKING AND CONNECTING TO THE INTERNET QUIZ 92%

---------------------

Select the domain name.

.gov

Blu-rays provide approximately ___ of storage space.

25-50 GB

According to YouTube, approximately how much video is uploaded to its site every minute?

300 hours

Sage was developed during the _____ war.

Cold

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

Cube

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.

DNA

The Internet service that tends to provide the most consistent speeds is _____.

DSL

SAGE was developed by the US Department of ___ .

Defense

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transer Protocol

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

File Transfer

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

Graphical

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

Internet

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Which of these browsers was developed by Microsoft?

Internet Explorer

ISP stands for:

Internet Service Provider

What 3 items are needed to install a home WiFi network?

Internet Signal a modem a router

A switch distinguishes between various devices within a network by their __ addresses.

MAC

The 2 most common audio file formats are WAV and ___ .

MP4

Broadband is measured in _____ .

Mbps

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.

RAID

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

Safari

Select the sites that offer Internet speed test services.

Speedtest.net TestMy.net

The World Wide Web was created through a collaboration led by ___ .

Tim Berners-Lee

The highest level in the domain name hierarchy is known as the ___ .

Top Level Domain

One type of storage device is a ___ .

USB drive

URL stands for ___ Resource Locator.

Uniform

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

WEP

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

WIFI hotspot

The standard for wireless network privacy and protection is known as ___ .

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

WPA

n addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

WWW stands for ___ ___ ___ .

World Wide Web

What group determines the standards for the World Wide Web?

World Wide Web Consortium, known as the W3C.

DVDs store data using ___ .

a reflective coating that has pits and lands

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

The capacity of a particular transmission medium is called its _____.

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

The smallest unit of data storage is a ___ .

bit

A group of compromised computers controlled by a hacker is called a _____.

botnet

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

Which might be a choice for Internet service in your area?

cable internet

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

charming

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ storage.

cloud

Emailing a file to yourself is an example of using ___ storage.

cloud

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cybercrime

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

One disadvantage of cloud storage is that

data is only available when you're online.

Which of the following would be considered a cybercrime

data manipulation

A ___ name identifies a server site on the Internet.

domain

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

dual-band

Which transmission media has the largest bandwidth?

fiber optic

A URL identifies a particular __ address on the World Wide Web.

file

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

filters

A security system separating 2 networks or even computers on the same network is called a ___ .

firewall

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.

helium

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

holographic

When determining how much cell phone data you need it is important to consider

how much data you currently use.

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

individual users

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

macro virus

A million bytes of data equals approximately one ___

megabyte

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

memristor

The word modem stands for ____.

modulator-demodulator

Fiber optic cable is _____ expensive than coaxial cable to install.

more

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

optical drive

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.

packet

The BitTorrent protocol is often called ___ file sharing.

peer-to-peer

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .

ping

Blu-ray stores data using ___ .

pits and lands that are read by a blue spectrum laser beam

Software that can be added to a browser to increase its functionality are called ___ .

plug in

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

Solid state drives store data using ___ .

reflective coatings

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

shorter

In general, the ___ the access time, the faster the hard drive.

shorter

Contact your ISP if your actual Internet speed is _____ than advertised.

slower

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

An unsolicited email message is called _____.

spam

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

The device that connects 2 networks is a _____.

switch

Persistent cookies store information about

user preferences

Software that infects a computer and is created using computer code is called a computer _____.

virus

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white-hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm

A computer controlled by a hacker is called a _____.

zombie


Kaugnay na mga set ng pag-aaral

RNSG 1430 Thermoregulation, comfort, mobility

View Set

The Percent Proportion and Percent Equation

View Set

Bio 101 w/L Ch 9. Processes & Steps of DNA Replication

View Set

Chapter 28: Color (Conceptual Physics Exam review)

View Set

MKTG 4280 Ch. 12 McGraw-Hill Connect

View Set

Basic Spanish Colors with nouns (agreement)

View Set

Laboratory Math Practice Problems

View Set

Voicethread: Brain & Spinal Cord

View Set

Chapter 14 Managerial Accounting Concepts & Principles

View Set