Computer Concepts pt. 2
The creation or manipulation of matter at the smallest possible scale is known as:
Nanotechnology
The scam referred to as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
Scareware
Which type of malware is designed to report activity on your computer to another party?
Spyware
Which device can guard connected equipment against large power spikes or surges that may infrequently occur?
Surge Protector
Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?
Switch
One popular test of a machine's ability to think is known as the ___ test.
Turing
Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?
Virus
Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?
Watson
Copyright protection lasts for ___ years after the death of the author.
70
A ___ is any step you take to ward off a threat.
Countermeasure
A(n) ___ uniquely identifies every network-connected device in the world.
MAC Address
A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails.
UPS (Uninterruptable Power Supply)
The act of alerting the public about harmful activities that are being hidden by an organization is called:
Whistleblowing
Which of the following is NOT one of the specifications of Wi-Fi technology?
802.11z
All nodes connect to a wireless ___ in order to communicate wirelessly.
Access Point
Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.
Bandwidth
The use of living organisms to manufacture new products or improve existing ones is called:
Biotechnology
What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?
Copyright
___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
Two-factor authentication
Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?
Acceptable use policy
Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used.
Attribution
Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:
Automation
Which term refers to the large volumes of data that are constantly being generated by our devices and digital transactions?
Big Data
Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?
Botnets
A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
Systems known as ___ are able to continue their operation even when problems are present.
Fault-Tolerant
Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current?
Fiber-optic
Many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware.
File-sharing
Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
Hacker
___ robots are those that are created to imitate the appearance or capabilities of humans.
Humanoid
Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.
Logs
Data ___ is the discovery of new patterns or relationships between data.
Mining
Which of the following statements about recycling and reducing waste is FALSE?
Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems.
Which of the following statements regarding employee monitoring is FALSE?
Most types of employee monitoring and Internet restrictions at the workplace are illegal.
Which of the following is a government agency that has the capability to monitor the Internet and mobile activities of individuals?
NSA
___ allow users to communicate and share information between computers and various devices.
Networks
Which of the follows companies does NOT offer digital movie rentals?
Pandora
Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?
Phishing
Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:
Piracy
Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?
Privacy Policy
Which browser feature will delete your history, cache, and cookies the moment you close the special window?
Private browsing
The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.
Topology
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?
Trojan Horse
A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):
VPN
A(n) ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area.
WAN
There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?
Who you know
Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?
Worm
___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.
Cyberbullying
___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks.
DRM (Digital Rights Management)
Which of the following terms refers to the technology gap between different social and economic classes?
Digital divide
___ can clog cooling systems such as fans, which in turn may cause hardware to overheat.
Dust
___ is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Ethernet
___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.
Ethics
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.
Expert
The ___ of a website or forum contains common questions and their responses.
FAQ
What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?
Fair use
An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as:
Neural network
Networks use media to carry data from one ___, or connection point, to another.
Node
Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe.
Online
When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.
Outsourcing
___ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
Packets
For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them.
Prosthetics
Machines that communicate over a network must follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly.
Protocols
The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for Internet connectivity.
Routers
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
MIS (Management Information System)
___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.
Scalable
The ___ mode on a computer will place it in a low-power state when it is not being used.
Sleep
___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Social Engineering
___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems.
Software engineers
The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.
Telecommuting