chapter 5 and 6 college computer

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A(n) _________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

RAID

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

worm

Computers which are under the external control of a hacker are known as:

zombies

Honda's _________ robot can perform a variety of activities that require a great deal of balance and range of motion.

ASIMO

The piracy of music and movies is often evident on file-sharing services that use the _________ protocol.

BitTorrent

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Most network installations use a(n) _________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethernet

Many websites have a(n) _________ area that should be checked for common questions and their responses.

FAQ

Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.

FISA

The _________ lock can make it difficult for thieves to steal a laptop.

Kensington

Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.

NSA

NASA's _________ robot can work alongside astronauts or perform tasks that are too dangerous for humans.

Robonaut 2

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) _________ to connect the systems in these two locations.

WAN

A _________ excels when it comes to installing, configuring, and supporting computer systems.

computer support specialist

The _________ is a legal concept that grants rights and control to the owner of any published work.

copyright

Any step you take to ward off a threat is called a:

countermeasure

A _________ license allows an author to set conditions for the free use and distribution of their work.

creative commons

No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

cyberterrorism

Human _________ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.

enhancement

Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair use

When companies outsource functions to another country it is referred to as:

offshoring

In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users and what is done with that information.

privacy policy

A______looks at each packet header to determine where the packet should go and then determines the best route for the packet to take towards its destination

router

Software is sometimes illegally modified in order to disable _________ technologies such as copy protection and authenticity checks.

DRM

A(n) _________, which is a special application that collects and reports certain types of data, can help managers make better decisions.

DSS

an ____ is a set of software tools that enables managers to gather, organize, and evaluate information

MIS

In which of the following areas are you least likely to find examples of automation?

Technical writing

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

UPS

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

VPN

A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

acceptable use policy

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

access point

Some licenses require that the user provide _________, or credit, to the author wherever the work is used.

attribution

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

A _________ is a device that connects two LANs or two segments of the same LAN.

bridge

Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.

business intelligence

Actions ranging from creating viruses to disrupting computer networks are often referred to as:

cybercrimes

Google allows users to view and control all their data with a tool known as:

dashboard

A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

data warehouse

A _________ is responsible for configuring, maintaining, and securing an organization's database.

database administrator

The ability to recognize, understand, and share the feelings of others is known as:

empathy

Many types of software and devices use _________ to scramble your data or communication.

encryption

A(n) _________ system is a type of information system that performs analytical tasks traditionally done by a human.

expert

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

an_____ examines and blocks Internet traffic in order to protect your private network

firewall

Online social interactions that exhibit anger and/or insults are known as:

flaming

A _________ is a node on a network that serves as an entrance to another network.

gateway

In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

hacker

Most companies have the need for a _________ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.

help desk

Today's web browsers include a feature that will delete all of your browsing _________ with a single click.

history

A _________ provides multiple ports for connecting nodes.

hub

Superficially, _________ can be defined as the processes used in learning, problem solving, and communication.

intelligence

A(n) _________ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.

intranet

A type of spyware known as _________ can record the individual keystrokes of a user.

keyloggers

It is through _________ that a copyright holder can grant usage or distribution rights to others.

licensing

certain types of systems are called _____ because they must run without failure or with nearly instant recovery from failure

mission-critical

The term _________ refers to the set of online behaviors that are considered polite and proper.

netiquette

A _________ is responsible for configuring and maintaining networks and communication systems.

network asministrator

A(n) _________ is a connection point in a network.

node

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

office automation system

Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

Many companies and individuals are going _________, which means they are using technology to lower their consumption and reliance on paper.

paperless

Operating systems use _________ utilities to place computers and devices in low-power states when they are not being used.

power management

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

protocols

A _________ is used to prevent attenuation when packets are traveling long distances.

repeater

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.

rogue hotspots

A _________ is responsible for the development of computer software.

sofyware engineer

Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered _________ by the user community.

spam

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

switch

A _________ specializes in developing plans and recommendations that meet the software and system needs of an organization.

systems analyst

When using a discussion forum, placing your message in the correct _________ will maximize your chances of getting a reply.

thread

The _________ of a network is the logical layout of the cables and devices that connect the nodes of the network.

topology

a____is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system

trojan horse

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus


Kaugnay na mga set ng pag-aaral

Porth's PrepU: Chapter 41: Disorders of Renal Function

View Set

Ch 14 Settlements, Dismissals, and Alternative Dispute Resolution

View Set

Basic Concepts of Economic Analysis Unit 1 Powerpoint

View Set

CCNA I v5: Chapter 6 Network Layer (Routers)

View Set

Jesus Revealed the Kingdom of God

View Set

Humoral Regulation of Blood Pressure

View Set

Introduction to Proprioceptive Modalities

View Set