Computer Science Ch. 5 & 6 online test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

offshoring

when companies outsource functions of another country it is referred to as:

turing test

which of the following is a popular test of a system's ability to think?

fair use

Copyright law contains an exception known as ___ which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission

Dashboard

Google allows users to view and control all their data with a tool known as:

FISA

Laws such as the patriot act and ___ give the U.S. government broad surveillance powers

footprints

You and your devices usually leave digital ___ which is a trail of your data, activity, and even the locations where devices are used

fault-tolerant

___ computers are able to continue their operation even when problems are present

redundant

___ computers are ones that have multiple hardware systems performing the same task at the same time

SEO

___ involves improving the ranking of a website when users enter relevant keywords in a search engine

phishing

___ involves luring individuals into entering personal information into a website controlled by the hacker

Nanotechnology

___ involves the creation or manipulation of matter at the smallest possible scale

spyware

___ is a type of malware which is designed to report activity on your computer to another party

data mining

___ is discovery of new patterns or relationships between data

wireless

___ networks use radio signals that travel through the air to transmit data

strong

___ passwords are long and generally use a mix of upper and lower case letters

attenuation

___ refers to the loss of intensity and clarity of the data signal being transmitted

DDoS

a ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests

quantum

a ___ computer can represent data in states beyond the two bits (0's and 1's) of today

software engineer

a ___ is responsible for the development of computer software

repeater

a ___ is used to prevent attenuation when packets are traveling long distances

router

a ___ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination

keyloggers

a type of spyware known as ___ can record the individual keystrokes of a user

cybercrimes

actions ranging from creating viruses to disrupting computer networks are often referred to as:

surge protector

an ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur

countermeasure

any step you take to ward off a threat is called a:

Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?

can the exposure

mission-critical

certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure

zombies

computers which are under the external control of a hacker are known as:

packets

data moves through networks in structures known as ___ which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

bandwidth

for modern networks ____ is measured in either megabits per second (Mbps) or gigabits per second (Gbps)

paperless

many companies and individuals are going ___ which means they are using technology to lower their consumption and reliance on paper

NSA

many government agencies, such as the ____ monitor the internet and mobile activities of individuals all over the world

encryption

many types of software and devices use ___ to scramble your data of communication

FAQ

many websites have an ___ area that should be checked for common questions and their responses

cyberterrorism

no form of hacking is as dangerous as ___ which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure

protocols

systems follow certain rules or ___ to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed

backups

very few countermeasures are as effective as ___ which can help you recover data that was lost to almost any type of threat


Kaugnay na mga set ng pag-aaral

Diseases Preventable By Vaccines UMT 12

View Set

Anatomical Position and Planes' Terminology

View Set

Annuity Basics and Definitions Chapter Quiz

View Set

Geo Bee Questions: Bodies of Water

View Set

. Which of the following statements are true of the time of flight for a projectile? List all that apply.

View Set

Wk 5 - Practice: Ch. 19 - Advertising, Sales Promotion... [due Day 5]

View Set

Digestive System and Metabolism Exam Study Guide (Pt. 7)

View Set