INFO 160
subject directory
A ________ is a structured outline of Web sites organized by topics and subtopics.
botnet
A large group of software programs that run autonomously on zombie computers is called ________.
metasearch engine
A(n) ________ actually searches other search engines rather than individual Web sites.
spider
A(n) ________ is the part of the search engine responsible for collecting data on the Web.
port
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
indexer
A(n) ________ organizes the data in search engine programs into a large database.
custom
A(n) ________ software installation allows you to decide which features you want to install on the hard drive.
encryption
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
plug-ins
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
RAM
All of the following can be used for backing up data files EXCEPT: RAM. flash drives. external hard drives. DVDs.
quarantine
Antivirus software segregates infected files to prevent further spread in a process known as
false
Bluesnarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an Internet connection. (T/F)
numbers
Computers process data into information by working exclusively with ________.
peripheral devices
Devices such as monitors and printers that are connected to the computer are called ________.
B2B
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
false
Each time you connect to the Internet, your computer is assigned the same IP address. (T/F)
True
Even a properly installed surge protector may fail to protect a computer from all power surges. (T/F)
hypertext transfer protocol
HTTP is the abbreviation for ________.
white-hat hackers
Hacker who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) are called ________.
script kiddies
Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called
top-level domain
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
protocol
In the URL http://www.prenhall.com, the portion labeled http is the ________.
nonimpact
Inkjet printers and laser printers are examples of ________ printers.
false
Photocopiers do not present any vulnerability for potential hackers. (T/F)
templates
Predesigned forms that provide the basic structure for a particular kind of document are known as ________.
temporary
RAM is considered volatile storage, which means it is ________.
a warm boot
Restarting a computer when it is already powered on is called ________.
a spider, an indexer, and search engine software
Search engines have which three parts?
prior to installing new hardware or software
Setting a system restore point should be done ________.
engineering
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
programs
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
shareware
Software that is freely distributed but comes with conditions is
true
Some mice include wireless USB receivers that contain flash memory to store your files. (T/F)
keystroke loggers
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
secure socket layer
The "s" in https stands for ________.
DVI
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
...
The ________ is the top level of a computer's hard drive filing structure.
binary
The ________ language consists of just two digits: 0 and 1.
The Cold-War crisis
The concept of the Internet developed from ________.
nonvolatile
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
keywords
The individual words you search for when using a search engine are referred to as ________.
system requirements
The minimum set of recommended standards for a program is known as the
thrashing
The term that defines excessive swapping of files between RAM and virtual memory is:
URL
The text version of a Web site's Internet address is called the ________.
false
To remove a program you no longer want, it's better to delete it than uninstall it.
True
VCU offers students server space for personal websites at ramsites.net. (T/F)
a trend of new Web applications that combine the functionality of multiple applications
Web 2.0 describes ________.
are not updated automatically
Webcasts differ from podcasts in that webcasts ________.
network interface card
What enables your computer to connect with other computers?
web-based application
What is another name for Software as a Service (SaaS)?
sophos
What is the free antivirus software available to all VCU students?
use applications uninstall program
When available, the best way to remove an unwanted software application is to ________.
...
When hackers use zombie computers to launch an attack on another computer or Web site, the attack is known as a
trojan horses
Which are programs that pretend to be a useful program but do something malicious on your computer?
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?
ROM
Which holds the instructions the computer needs to start up?
subject directory
Which is NOT part of a search engine?
...
Which is the correct order of the boot process?
Plug-ins can present security risks.
Which is true about plug-ins?
...
Which of the following could be detected by antivirus software?
...
Which of the following is true about open source software?
Cookies obtain your personal information by searching your hard drive.
Which of the following statements about cookies is NOT true?
S-video
Which of the following ways of connecting a device to your computer does NOT need a cable?
Printers do not require power surge protection.
Which of the statements about protecting against power surges is FALSE?
One port can connect different types of devices
Which statement about USB ports is TRUE?
path
You can determine the location of a file by its
embedded
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
ROM
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ergonomics
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
expansion cards
________ plug into slots on the motherboard and provide additional functionality for your computer.
system
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
computer virus
a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
encryption virus
a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
polymorphic virus
a virus that changes its own code to avoid detection
worm
attempts to travel between systems through network connections to spread an infection
macro
automated sequence of commands in productivity software
system restore
brings system back to a previously stable state
error-checking
checks the hard drive for damaged files
spider
collects data on the Web, following links in Web sites
freeware
commercial software available at no charge
shareware
commercial software available for use for a limited or trial period of time
tracks
concentric circles on the hard drive
task manager
displays performance measures for processes
dpi
measurement of printer resolution
ppm
measurement of printing speed
subject directory
organized by topics
indexer
organizes search engine information into a database
suite
package containing multiple commercial software products
sectors
pie-shaped wedges on the hard drive
beta
prerelease version of commercial software
Disk Defragmenter
regroups related pieces of files on the hard disk
disk clean-up
removes unnecessary files from the hard drive
platters
round, thin plates of metal that make up a hard drive
clusters
smallest segments within disk sectors
Boolean
special word or symbol used to refine a search
resolution
the clearness or sharpness of an image
pixel
tiny dot that creates an image on the computer monitor
hertz
unit of measure for processor speed
keyword
used by search engines to determine what to look for