technology at your service

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

project management

___________________ software allows managers to create & track a sophisticated plan in order to achieve a variety of goals.

word processing

___________________ software provides tools for creating & editing all kinds of text-based documents such as letters, resumes, & reports.

creative commons

a ________________ license allows an author to set conditions for the free use & distribution of their work.

gateway

a _________________ is a node on a network that serves as an entrance to another network.

database administrator

a __________________ is responsible for configuring, maintaining, & securing an organization's database.

authentication

the security principle known as _____________ requires that individuals must confirm their identity.

computer program

the set of instructions that directs the computer to perform a variety of tasks is known as a(n):

dreamweaver

which of the following is an example of web development software?

iOS

which of the following operating systems is NOT likely to be running on a server?

server

a network ________________ is a powerful computer with special software & equipment that enables it to function as the primary computer in a network.

smartphone

a(n) ________________ is a combination of mobile phone & handheld computer.

desktop

the computer that has been traditionally found on the desks in many offices & homes is the ________________ computer.

backbones

the connections that carry most of the internet's traffic are referred to as:

scareware

the scam known as ___________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

authorization

the security principle known as _____________ gives individuals a certain level of access based on who they are.

modem

A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.

worm

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

network administrator

A _________ is responsible for configuring and maintaining networks and communication systems.

extension

A browser _________ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.

hotspot

A mobile _________ refers to a device that can connect to a mobile network and offer Internet access to multiple devices near it.

keyloggers

A type of spyware known as _________ can record the individual keystrokes of a user.

portal

A web _________ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.

network

A(n) _________ allows users to communicate and share information between computers.

computer

In the simplest terms, a(n) _________ is a device that accepts input, processes data, and can output or store the result of its actions.

supercomputers

NASA uses _________ to conduct complex modeling and simulations for upcoming missions.

robonaut 2

NASA's _______________ robot can work alongside astronauts or perform tasks that are too dangerous for humans.

flaming

Online social interactions that exhibit anger and/or insults are known as:

LMS (learning management system)

Students often use a(n) _________, such as Blackboard, at school to complete exams, turn in work, and communicate with their instructor and classmates.

protocols

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

tethering

The _________ feature of many smartphones allows them to act as a wireless access point for nearby devices.

world wide web

The _________ is a global system of linked, hypertext documents.

HTTP

The _________ protocol is used to deliver requested web pages to a computer.

dial-up

The earliest way in which most users connected to the Internet was using a 56Kbps _________ connection using their phone line.

internet

The largest network in the world is known as the _________, which connects billions of people and organizations throughout the world.

P2P

The most popular method for file transfer today is known as _________ file sharing, which uses a distributed network of individual users instead of a central server.

hardware

The physical devices that make up a computer system are called:

TCP/IP

The protocols that are at the heart of Internet communication are known as:

browser

To view web pages, you need special software known as a web:

microblogging

Tumblr and Twitter and both examples of _________ services, where users share brief thoughts, links, and multimedia.

plagiarism

Turning in the work of another as if it were your own or failing to cite the source of your work in known as:

blu-ray

Which of the following optical discs can store the MOST data?

terabyte

Which of the following storage units is the LARGEST?

signature

Which part of an email message typically contains the sender's name, title, and contact information?

touchscreen

Which technology has become the primary way in which we interact with our tablets and smartphones?

phishing

_________ involves luring individuals into entering personal information into a website controlled by the hacker.

social engineering

_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

pretexting

_________ is gaining someone's trust by pretending you are someone else.

dot matrix

_________ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms.

CAD

_________ software aids architects, engineers, and many others who need to create a digital model of an object.

presentation

_________ software enables users to create electronic slideshows that are used to present information.

DBMS

_________ software is used to create and manage complex databases.

biometrics

_____________ refers to the measurement of patterns or characteristics found in the human body.

botnets

______________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, & conduct carefully orchestrated network attacks.

application

_______________ software, which is made for the user, allows individuals to complete a variety of work & school-related tasks.

twisted-pair

________________ cable normally consists of four pairs of wires that are twisted around each other.

virtual

________________ memory refers to a portion of your hard drive that is being used as RAM.

anti-malware

________________ software helps protect your computer from various types of malware.

spreadsheet

________________ software is used for entering, calculating, and analyzing sets of numbers.

search engines

_________________ are sophisticated services that store the URL of millions of web pages & most of the content on those pages.

coaxial

_________________ cable consists of a single copper wire that is surrounded by insulation & a wire mesh shield.

ergonomic

_________________ keyboards, which are designed to be comfortable & tailored for the human body, have keys which are angled & a palm rest at the base in order to keep your wrists straight.

system

_________________ software refers to any software that is created for the operation, maintenance, & security of a computer.

DDoS (distributed denial-of-service)

a _____________ attack allows hackers to shut down or block access to websites & other network resources by overwhelming them with requests.

virus

a ______________ is a type of malware that is attached to a host file & has the ability to replicate, or copy, itself.

software engineer

a _______________ is responsible for the development of computer software.

fiber-optic

a ________________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

quantum

a ________________ computer can represent data in states beyond the two bits (0's and 1's) of today.

trojan horse

a ________________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

protocols

computers that communicate over a network must follow certain _______________ to ensure that the transmission is sent properly & understood.

privacy settings

google allows users to view & control all their data with a tool known as:

ASIMO

honda's ____________ robot can perform a variety of activities that require a great deal of balance & range of motion.

wireless

many computers are now being connected via _____________ networks, whereby communication takes place using radio waves.

accelerometer

many mobile devices contain a(n) __________ & gyroscope that can sense even the smallest movements.

spam

posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered _____________ by the user community.

networking

social _______________ sites are used to create connections between friends, family, & organizations.

HTML

the ________________ language, which was used in the first web page ever created, is still in use today.

cache

the browser _____________, or temporary internet files, contains every single page, image, & video for all the web pages you have recently retrieved.

broadband

the term ______________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

netiquette

the term ______________ refers to the set of online behaviors that are considered polite & proper.

malware

the term _______________ encompasses several types of malicious computer programs that are created to harm computer systems & their users.

hacker

today, a ___________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hashtag

twitter popularized a system that uses the _____________ symbol to mark keywords or topics in a message.

residential gateway

users with broadband connections are typically equipped with a(n) ______________ that connects their home's network to the internet.


Kaugnay na mga set ng pag-aaral

Federal Tax Considerations for Life Insurance and Annuities

View Set

Chapter 23: The Digestive System

View Set

Biology Test Your Knowledge Exam 4

View Set

BIOM 250 (Montana State University) Exam #2

View Set

chapter 3 q-2 (Have periodic table in hand)

View Set