exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11x

The seeds of the Internet were planted in 1969 with ___, which connected computers at four universities in the western United States.

ARPANET

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?

Ad-supported streaming

___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Biotechnology

___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.

Cookies

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Many websites have a(n) ___ area that should be checked for common questions and their responses.

FAQ

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?

LinkedIn

_________ are files that record activities and events on a computer.

Logs

___ involves the creation or manipulation of matter at the smallest possible scale.

Nanotechnology

___ occurs when an organization transfers some aspect of its business to a third party.

Outsourcing

__ involves luring individuals into entering personal information into a website controlled by the hacker.

Phishing

___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.

Private browsing

Social news sites, such as ___, encourage users to share links to news and other interesting content they find on the Web.

Reddit

___ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.

Search engines

___ is a type of malware which is designed to report activity on your computer to another party.

Spyware

A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

Web pages have a standard addressing system known as a(n) _________, which allows them to be located on the Internet.

URL

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

VPN

_________, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.

VoIP

_________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Watson

The _________ is a global system of linked, hypertext documents.

World Wide Web

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

access point

___ occurs when computers or machines can perform the work that was once done by a human.

automation

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

Any email address placed in the ___ will be invisible to the recipients of your message.

bcc

Which of the following is NOT a web browser?

bing

A(n) ___ is a web page or small website that contains a series of chronological posts and comments.

blog

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

botnets

The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

broadband

A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.

domain name

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair use

Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.

false

Social engineering is a form of hacking that has a social or political agenda behind it.

false

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

Many companies and specialty websites offer _________, or discussion boards, where individuals can ask questions and reply to each other.

forums

Twitter popularized a system that uses the ___ symbol to mark keywords or topics in a message.

hashtag

The term ___ refers to the set of online behaviors that are considered polite and proper.

netiquette

Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.

privacy policy

A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

surge protector

A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

switch

"192.168.1.101" is an example of an IPv4 address.

true

Ethics involves a rational analysis of the voluntary, moral choices that individuals make.

true

For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

PayPal and Google Wallet are both examples of online payment services that allow you to pay for goods online and transfer money to other individuals.

true

The network that connects the computers in a school's study center or library is considered a LAN.

true

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

worm


Kaugnay na mga set ng pag-aaral

Gross Anatomy Lecture 2 - Bones of Back

View Set

Chapter 10: Antimicrobial Agents

View Set

Intro to Labs, Lab Safety, and Notebooks

View Set

Qualified Plans, and Federal Tax Considerations for Life Insurance and Annuities

View Set

A&P II Chapter 24 Mastering (The Urinary System)

View Set