Quiz: 3e
___ allows you to store your files and use various applications in an online account.
cloud computing
A(n) ___ utility can scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
encryption
___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.
ethics
The scam referred to as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
scareware
___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
social engineering
One or more computer programs that are packaged together for a unified purpose are known as:
software
Which type of software is used for entering, calculating, and analyzing sets of numbers?
spreadsheet
Which type of malware is designed to report activity on your computer to another party?
spyware
A designation of ___ means that a blank optical disc can be recorded to only once.
-R
All of the cloud applications below would allow you to share and collaborate on documents and lists EXCEPT:
Amazon Cloud
Which of the following is NOT an example of solid state storage?
BD-XL
Which of the following units is represented as an on (1) or off (0) value?
Bit
Which type of software aids architects, engineers, and many others who need to create a digital model of an object?
CAD
A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
The ___ of a website or forum contains common questions and their responses.
FAQ
Which of the following units is the smallest?
Kilobyte
___ file sharing uses a distributed network of individual users instead of a central server to transfer files.
P2P
Which of the following "new social challenges" was NOT mentioned by the author?
Performing in-class research with a smartphone
Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?
Trojan horse
The internet is decentralized.
True
___ translates analog voice signals into digital data and uses the Internet to transport the data.
VoIP
Which type of software provides tools for creating and editing all kinds of text-based documents?
Word processing
___ is a set of instructions that directs the computer to perform a variety of tasks.
a computer program
Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?
acceptable use policy
Which term refers to the large volumes of data that are constantly being generated by our devices and digital transactions?
big data
Adobe Photoshop excels in editing ___ graphics such as JPGs.
bitmap
___ utilities use a variety of techniques that can "squeeze" one or more files into a smaller file, such as a ZIP.
compression
The small data files known as ___ are used by websites to remember users and their preferences.
cookies
What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?
copyright
A ___ is any step you take to ward off a threat.
countermeasure
What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?
fair use
A(n) ___ is a short, unique sequence of characters located after the file's name that indicate the file type.
file extension
Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?
virus
Copyright protection lasts for ___ years after the death of the author.
70
Making copies of important files to the cloud or to an external storage device is known as:
Backing up
With capacities starting at 25 GB, the ___ is the optical media with the most storage.
Blu-ray Disc
Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?
Botnets
The file management tool on a Mac is called:
Finder
Which software title allows users to create works that require complex layouts, such as magazines and newspapers?
InDesign
A(n) ___ is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton, Harvard, and MIT.
MOOC
Which software title would help a business manage all aspects of their company's finances?
NOT access (I got this question wrong)
Services such as ___ and Microsoft Teams include many real-time communication tools, along with a variety of apps and services, to make it easier for teams to wok on projects together.
Slack
Which of the following is NOT a cloud storage or synchronization service?
Solid State Drive
Many navigation and traffic apps rely on ___ to determine which roads have accidents/construction and which gas stations have the lowest prices.
crowdsourcing
The ___ command removes the selected object (or objects) from their current location and places them into the clipboard.
cut
___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.
cyberbullying
In some operating systems, folders may be referred to as:
directories
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.
expert
Most desktop operating systems include a(n) ___ utility that is dedicated to examining and blocking Internet traffic.
firewall
Preparing a storage device for use by an operating system is known as:
formatting
Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
hacker
Your browser's ___ keeps the name and URL of every site you have visited, and allows browsers to autocomplete the URL when you type the first few characters.
history
Unlike an email, which can be read by the recipient at any time, ___ engage individuals in a live conversation.
instant messengers
Data ___ is the discovery of new patterns or relationships between data.
mining
___ allow us to communicate and share information between computers.
networks
Which software title would an employee most likely use to send email, manage contacts, create appointments and set up meetings?
outlook
The processed results that a computer sends out to you are known as:
output
Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?
phishing
Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:
piracy
A browser ___ is a separate program that allows your web browser to play several types of multimedia content.
plug-in
Which type of software enables users to create electronic slideshows that contain a combination of text, images, charts, videos, and other elements?
presentation
Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?
worm
To protect the data on your mobile devices, set a password, pin, or other security measure on your:
Lock Screen
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
MIS
Android Pay and Apple Pay rely on ___ to make the smartphone payments in stores.
NFC
FAT and NTFS are two popular types of:
file systems
___ is generally any part of the computer you can touch.
hardware
You should run a(n) ___ if you want to run one operating system on top of another operating system.
virtual machine