chapter 8, 9, modules 3, 5
Eyestrain, headaches, dry eyes, blurry vision, and double vision are symptoms of ____ syndrome.
computer vision
Many businesses use which of the following to limit employees' web access?
content filtering
Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?
pairing
A PIN or ____ is used to get into accounts through an ATM.
personal identification number
What is the term for the smallest element in an electronic image?
pixel
Which of the following is an affordable and lightweight digital camera with lenses built into it and a screen that displays an approximation of the image to be photographed?
point-and-shoot
Which of the following is appropriate for an employee using a business's social network?
post content that reflects the business's professional image
A system that lets people exchange short messages while they're online is called a ____ messaging system.
real-time
Possible causes of data loss include all of the following, except ____:
regular backups
Which of the following is not a determinant of the category in which a computer best fits?
resolution
The email server determines the best route for the message, which often involves sending the message to a series of network devices called ____.
routers
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
What is the term for a website that uses encryption techniques to protect its data?
secure site
With which of the following do users choose which folders and files to include in a backup?
selective backup
Short text messages sent via a text message service are typically fewer than how many characters?
300
How long can digital certificates be valid?
two years
What is the term for an ultrathin laptop that uses the Windows operating system?
ultrabook
Which of the following occurs when the electrical supply or voltage drops, often defined as more than five percent below the normal volts?
undervoltage
A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.
username
____ can lurk undetected in your system, infect it, and spread when you distribute infected files.
viruses
A(n) ____ is an online educational web conference.
webinar
Computers and devices that communicate using radio waves across a medium distance of 100 to 900 feet use ____.
wi-fi
When someone taps into your unprotected Wi-Fi network, it is called ____.
wi-fi piggybacking
Which of the following gets its name from an Hawaiian phrase meaning quick?
wikis
____ can intercept and analyze data transmitted over any network, and it is a risk that can breach what otherwise might have been considered secured data.
wireless sniffing
___ spread by automatically sending themselves to everyone in your address book.
worms
Which of the following privacy measures adds security by requiring two distinct items for verification?
-Two-step authentication -Two-factor verification -Two-factor authentication
Discarded computers, cell phones, and other electronics are considered ____.
-electronic trash -e-trash -e-waste
Privacy can be protected by ____.
-increasing the privacy settings on your social network accounts -deleting old online accounts -blocking third-party cookies from untrustworthy sites
Protect your mobile device from unauthorized use by ____.
-locking the device when not in use -refraining from installing apps from unknown sources
For most posts, you can decide whether the post is visible ______.
-to only people within your friends' networks -to the public -to only your friends and friends of friends
____ disguise themselves as useful programs or apps but do damage when you run them;
-trojan horses and rootkits
How many peripheral devices can you connect with a USB port?
127
____ can infect your computer or compromise your identity.
-Going to an unsecured website -None of the above -Opening an email attachment
When creating a blog, you should create a(n) _______ where you describe yourself, listing any relevant information.
About Page
Which of the following companies does not manufacture computers that use the Windows operating system?
Apple
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
CAPTCHA
Which of the following is a four- or five-digit number assigned to a specific content or mobile service provider, for example, to vote for a television program contestant or donate to a charity?
CSC
A good example of a strong password is ____.
DumFDP076
A ____ protects your system from intruders.
firewall
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
ENERGY STAR
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
Electronic Communication Privacy Act
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
IP
____ is a network protocol that defines how to route data across a network.
TCP/IP
Which of the following is a device that plugs in a USB port on the computer or mobile device and contains multiple USB ports?
USB hub
Which of the following provides the mobile user with a secure connection to the company network server?
VPN
Internet telephone, which refers to voice communications over the Internet, is another name for ______ .
VolP
____ software identifies malware that tries to install on your computer or device.
antivirus
What is another name for public key encryption?
asymmetric key encryption
Which of the following is a program or set of instructions in a program that allows users to bypass security controls?
back door
Which of the following terms refers to making a copy of a file?
backing up
Cloud storage systems have ____ at various online locations that provide additional protection.
backups
One example of content management software is _______ .
blogware
A message ____ is an online discussion site where people participate in a conversation by posting messages.
board
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?
copyright
The numeric score that affects your future ability to obtain credit is your ____.
credit score
The effects of a(n) ____ can include physical damage and a general disruption of regular activities.
cyberattack
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
cyberextortionist
Do not use social networks to monitor or keep track of a member's activities or whereabouts, which could be considered ____.
cyberstalking
____ is the premeditated disruption of computers and networks.
cyberterrorism
A ____ is a unit of data collected as a package so it can be transmitted in a network path.
data packet
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
digital
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
digital security risk
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
distributed
To communicate with a friend while you're on the go or send messages to family members, you can use ____.
A(n) _______ is an image that expresses an idea or concept, such as a picture of clapping hands to mean congratulations.
emoji
A(n) ____ is a symbol for an emotional gesture, such as a smile or frown, that you create using keyboard characters.
emoticon
Which of the following types of computers targets a specific audience and offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games?
gaming desktop
____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.
green
Using a social networking site, you can form a ____, which is a collection of people who share a particular background or interest.
group
People who break into computers and networks are ____?
hackers
Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer?
high blood pressure
A secure website has ____ at the beginning of the URL.
https:/
Which browsing mode will not save your browsing history, temporary Internet files, form data, cookies, usernames, or passwords?
inprivate
Which of the following categories are the rights to which creators are entitled for their work?
intellectual property
Webmail uses the ____ protocol, which leaves messages on the server so you can read them using any device.
internet access message protocol (IMAP)
____ hard drives are especially prone to failure.
magnetic
A ____ allows users to publish short messages, usually between 100 and 200 characters, for others to read.
microblog
Which of the following is a portable, personal computer designed to fit on your lap?
notebook
What is another name for a standby UPS?
offline UPS
Which of the following kinds of UPS runs off a battery?
online UPS
When posting information online, you must always protect your _______, which is information about you that others can find on the Internet.
online reputation
On a secure website, a ____ icon may appear in the address bar.
pad-lock
The main computer in an email system is an email ____.
server
____ on the Internet make up "the cloud."
servers
To use a social network safely, which of the following could create problems?
setting the Check In feature to let people know where you are
A _______ has many features of a computer, including Internet access and an operating system that can run apps.
smartphone
Which of the following is an example of a mobile device?
smartphone
_______ is a messaging app that allows you to limit how long the content will be available.
snapchat
A(n) ______ is a website that links people via the Internet to form an online community.
social network
Junk email, is also known as ____.
spam
Malware includes all but which of the following?
spam
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
spoofing
____ secretly collects user data, such as web surfing habits.
spyware
Which of the following are capable of processing many trillions of instructions in a single second?
supercomputers
Which of the following are the fastest, most powerful computers — and the most expensive?
supercomputers
Real-time messaging systems, such as IM, are primarily ____ communications, which means that everyone who is communicating must be online at the same time.
synchronous
A communications ____ sends electronic data from a source to a destination.
system
An email ____ consists of the computers and software that provide email services.
system
A(n) ____ is a key term associated with a blog post.
tag
A _______ includes the original message and all the replies.
thread
Which of the following is built into an upright cabinet that stands alone?
tower server