CGS 1000

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

-Keystrokes -Passwords -Confidential information

Select what's true about packet sniffers.

-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information.

Select what's true about Trojan malware

-Often found attached to free downloads and apps. -Often used to find passwords, destroy data, or to bypass firewalls.

Select the characteristics of a modem

-Usually provided by the ISP -Converts analog signals into digital signals -Converts digital signals into analog signals

Which of the following are true statements regarding LinkedIn?

-You can use LinkedIn to apply for jobs. -LinkedIn includes a resume tool to assist you in creating a professional resume.

Select the advantages of using a database instead of a traditional filing system.

-A database can hold larger amounts of data. -A database can provide better data integrity. -A database can never be hacked

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ____ step.

Analysis

Which of the following HTML objects will find web pages with hyperlinks?

Anchor

The volume of data that can be carried on an Internet transmission media in an amount of time is called ______.

Bandwidth

The capacity of a particular transmission medium is called its ____.

Bandwith

Which might be a choice for Internet service in your area?

Cable Internet

A program that takes an entire program, check the source code for errors, and converts it into a machine language is a ________.

Compiler

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A _____ name identifies a server site on the internet.

Domain

In a database a _________ is a group of related characters in a database table that represents a characteristic of someone or something.

Field

When determining how much cell phone data you need it is important to consider

How much data you currently use

All of the following are true about Instagram except

Instagram charges a fee to download the app.

All of the following statements about Instagram are true except

Instagram is difficult to integrate with apps like Facebook and Foursquare.

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .

Integrity

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

Intellectual

Although it sounds ironic, searching the ________ in your area is an efficient way to search for an ISP.

Internet

An object-oriented programming language that is popular for writing apps for android phones and tablets is _______.

Java

A complex database that organizes and stores information in a cube format and has measure attributes and features is called a _____ database.

Multidimensional

Boolean operators are the words "AND", "OR" and _____. The use of Boolean operators can make a search more precise and return better results.

NOT

Use _____ when you are searching for documents including one or another of your search words.

OR

JSON stands for JavaScript _____ Notation

Object

All of the following are protected against unauthorized use or distribution by intellectual property laws except

Open educational resources

Search engine _____ (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

Optimization

BitTorrent utilizes no central server, instead opting to utilize a ________ structure where each device connected to a network has equal access to the shared files.

Peer-to-peer

Software that can be added to a browser to increase its functionality are called _______.

Plug-ins

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.

Profile

Converting a task into commands that a computer can use to perform the task is called_____.

Programming

The type of database that uses common fields to create links between tables is called a database.

Relational

A link between tables in a relational database that defines how the data is related is called a _____.

Relationship

Two main factors concerning your digital identity are privacy and ___.

Security

Pictures or videos taken and shared on Snapchat are called _____.

Snaps

Persistent cookies store information about

User preferences

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

White hat hackers

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

Your anti-virus software will ensure your files are safe.

A computer controlled by a hacker is called a _____.

Zombie

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming _________ or code.

language

You should evaluate websites based on which of the following criteria?

-Authenticity -Objectivity -Bias

Select the Characteristics of a router

-Connects networks -Provides hardware firewall protection -Usually incorporates a switch

The 3 phases that should be accomplished in the investigation step of the SDLC include:

-Defining the problem. -Examining alternatives. -Reporting.

Select what's true about session cookies

-Determine the start and end of a session -Analyze and measure traffic on a web page -Determine the web browser being used.

Identify common symptoms of a computer virus.

-Documents won't save -Computer runs extremely slowly -Programs launch on their own

Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. The highly structured process may be completed using which languages?

-Java -Javascript -C++

You should evaluate websites using which of the following criteria?

-Reliability -Relevance -Validity

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

English

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

Manipulation

Select the examples of uploading files

-Posting a photo on social media -Placing an ad on Craigslist -Posting a YouTube video

Which of the following are common email viruses

-Ransomware -Keystroke logging Trojan

If you're reading an article and are concerned that it may be biased in one way or another, what can you do to judge the author's objectivity?

-Remember that bias is introduced into everything, even though it may be unintentional -When viewing a website, investigate the background and other writings of the author and the site -Try to be aware of all sides of any issue

An Internet search engine can perform which three basic tasks:

-Search the Internet for information based on the search criteria entered by the user -Indexing of keywords that are found -Display the location of the information stored in the indexes

Select what's true about using the Boolean operators "OR" and "NOT".

-Use "OR" when you are searching for documents including one or another of your search words) -You can use /^ to execute an OR search -Use "NOT" if you want to exclude certain results from your search

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

Cybercrime

Which of the following statements about Facebook is true?

Cyberstalking and online predators are a real problem on Facebook.

Most search engines use similar technology to execute an Internet search. The search engine uses a _____ of Internet URLs, each record in the database contains information including the site URL, description and title, and keywords included in the site.

Database

Transferring a file from the Internet to your digital device is called _____.

Downloading

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

Generation

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

Hierarchy

The DBMS engine provides an interface for the end user of the database. This interface is called the _____ view.

Logical

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a _______.

Loop

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Management

Checking how current the information is on a website helps to ensure ______. Out of date information can be an indicator that the site may not be the best resource.

Relevance

To display or distribute information from a database, programmers or database administrators create_______.

Reports

A collection of related records in a database is referred to as a ________.

Table

The highest level in the domain name hierarchy is known as the _______.

Top Level Domain

Software that infects a computer and is created using computer code is called a computer _____.

Virus

The final step in the SDLC has two phases, a system audit and an evaluation phase. The final step is referred to as ______ the system.

Maintaining


Ensembles d'études connexes

Vocabulary Workshop Level E Unit 2 Answers

View Set

What is aquinas argument from contingency and necessity? -ZAW

View Set

Chapter 12 - Spatial Orientation and the Vestibular System

View Set

Unit 8 - Review Questions Real Estate Brokerage

View Set