chp 4-6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

true

"192.168.1.101" is an example of an IPv4 address.

true

3G, 4G, and LTE are all terms that refer to mobile Internet connectivity.

DDoS

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

fiber-optic

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

worm

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

Trojan horse

A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

virus

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

surge protector

A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

switch

A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

domain name

A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.

extension

A browser ___ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.

fair use

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

packets

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

footprints

Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

MAC

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.

FAQ

Many websites have a(n) ___ area that should be checked for common questions and their responses.

Ethernet

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

privacy policy

Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.

Reddit

Social news sites, such as ___, encourage users to share links to news and other interesting content they find on the Web.

DRM

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

sharing

The ___ economy is an expression that refers to the way in which the Internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.

World Wide Web

The ___ is a global system of linked, hypertext documents.

Twitch

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

broadband

The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

netiquette

The term ___ refers to the set of online behaviors that are considered polite and proper.

hacker

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

Private browsing

___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Two-factor authentication

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Cryptocurrency

___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.

Spyware

___ is a type of malware which is designed to report activity on your computer to another party.

Biotechnology

___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Wikipedia

___ is not always considered to be a reliable site because you cannot be certain that the information you are reading comes from a credible source.

Whistleblowing

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

Trolling

___ is the act of being annoying and antagonistic in online social interactions.

Instant messaging

___ is the act of having an online, text-based conversation with one or more individuals that occurs in real time.

Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity.

false

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

false

Social engineering is a form of hacking that has a social or political agenda behind it.

false

The Internet is managed centrally by the United States government, as it was primarily developed in this country.

false

The sleep mode on a computer generally saves more electricity than hibernate mode.

false

DSL technology is currently faster than cable or fiber-optics.

fasle

Creative works such as books, songs, and photographs are protected by copyright law.

true

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

true

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

true

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

true

access point

A wireless ___ is the device that all nodes connect to in order communicate wirelessly.

acceptable use policy

A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

blog

A(n) ___ is a web page or small website that contains a series of chronological posts and comments.

bcc

Any email address placed in the ___ will be invisible to the recipients of your message.

countermeasure

Any step you take to ward off a threat is called a:

VPN

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

Copyright protection lasts 20 years after the date of publication or release.

False

In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.

False

bandwidth

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

WAN

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.

bookmarks

If you visit a website or page that you would like to remember for the future, you can add it to your browser's ___ or favorites.

attachments

If you want to include a file with your email message, it should be placed it in the __ area.

data analytics

In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data.

pay-per-click

In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.

piracy

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

LinkedIn

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?

licensing

It is through ___ that a copyright holder can grant usage or distribution rights to others.

crowdfunding

Kickstarter is known as a(n) ___ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.

forums

Many companies and specialty websites offer ___, or discussion boards, where individuals can ask questions and reply to each other.

NSA

Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.

HTTP

The ___ protocol is used to deliver requested web pages to a computer.

P2P

The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.

scareware

The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.

ARPANET

The seeds of the Internet were planted in 1969 with ___, which connected computers at four universities in the western United States.

microblogging

Tumblr and Twitter and both examples of ___ services, where users share brief thoughts, links, and multimedia.

hashtag

Twitter popularized a system that uses the ___ symbol to mark keywords or topics in a message.

backups

Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.

Big data

We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.

URL

Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the Internet.

UPS

When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.

Ad-supported streaming

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Bing

Which of the following is NOT a web browser?

802.11x

Which of the following is NOT one of the specifications of Wi-Fi technology?

Who you know

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

Repair

Which of the following words is NOT part of the green computing model?

AI

__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.

Neural networks

___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.

Logs

___ are files that record activities and events on a computer.

Cookies

___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.

Search engines

___ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.

Watson

___ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Phishing

___ involves luring individuals into entering personal information into a website controlled by the hacker.

Nanotechnology

___ involves the creation or manipulation of matter at the smallest possible scale.

Telecommuting

___ is the process of working for a company without being physically present at the company's office.

Outsourcing

___ occurs when an organization transfers some aspect of their business to a third party.

Automation

___ occurs when computers or machines can perform the work that was once done by a human.

Strong

___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Digital divide

___ refers to the technology gap that exists between different social and economic classes.

Botnets

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

VoIP

___, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

false

PayPal is an example of an online payment service that allows you to pay for goods online and transfer money to other individuals.

true

Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.

true


Kaugnay na mga set ng pag-aaral

the origins and spread of Homo sapiens-anatomically modern humans - from c. 400,000 to 12,000 years ago

View Set

Unit 3: Trading, Accounts, Prohibited Activities

View Set

{{Richard}} English Midterm 𝙂𝙧𝙖𝙢𝙢𝙚𝙧 ***in order for this to actually help you: use the writing tool NOT multiple-choice tool**

View Set

History Exam Study Questions (Chapter 14)

View Set

Chapter 21 - Decomposition and Nutrient Cycling

View Set

"Continuidad de los parques" - Continuity of the parks

View Set