Chapter 2 Computer Concepts, Tech Quiz 3, SIMnet LetMeTry Q&A Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

DDoS

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

VPN

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

UPS

A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails.

MIS

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

WAN

A(n) ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area.

Expert

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.

Piracy

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:

Access Point

All nodes connect to a wireless ___ in order to communicate wirelessly.

The ratio of monitor's width to its height is known as the:

Aspect ratio

Which of the following is NOT an example of solid state storage?

BD-XL

Why are many computers, especially ultraportable ones, using SSDs instead of traditional magnetic hard drives?

Because SSDs are faster and consume less power

Which of the following units is represented as an on (1) or off (0) value?

Bit

With capacities starting at 25 GB, the ___ is the optical media with the most storage.

Blu-Ray disc

The ___, or microprocessor, is the main processor of a computer.

CPU

Most computers provide a sound subsystem directly on the motherboard and do not require a separate sound ___ for audio output

Card

70

Copyright protection lasts for ___ years after the death of the author.

The ___ appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line.

Cursor

Mining

Data ___ is the discovery of new patterns or relationships between data.

Which type of printer is most likely to be used by a business that uses carbon-copy forms?

Dot Matrix

Logs

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.

Which keyboards are designed to be comfortable and tailored for the human body?

Ergonomic

Today's processors have reached the ___ mark, capable of processing billions of instructions per second.

GHz

A(n) ___ connector carries both digital video and sound.

HDMI

File-sharing

Many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware.

Attribution

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used.

Node

Networks use media to carry data from one ___, or connection point, to another.

___ technology can translate a scanned image into text that can be edited and formatted.

OCR

Turing

One popular test of a machine's ability to think is known as the ___ test.

The speed of a printer is measured in:

PPM

A(n) ___ code, which appears as a square filled with dots and lines, is often used to direct a smartphone to open a specific web address.

QR

Which type of memory temporarily holds the programs and files that you are actively working on?

RAM

A(n) ___ scanner uses radio frequencies to read the data stored in special tags.

RFID

Which type of memory contains device-specific information and handles a computer's basic functions when it is powered on?

ROM

A modern monitor might have a(n) ___ of 1920x1080 pixels.

Resolution

What is the name of the pen-like tool that allows you to tap or write notes on many touchscreen interfaces?

Stylus

The main component of a desktop computer is the ___, which is the case that houses the computer's critical parts, such as the processing and storage devices.

System unit

Fault-tolerant

Systems known as ___ are able to continue their operation even when problems are present.

Scareware

The scam referred to as ___ (or ransomware) typically comes in form of an alert message that claims to be from the FBI or your security software.

Telecomuting

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.

Routers

The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for Internet connectivity.

Who you know

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

Online

Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe.

Worm

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

Trojan horse

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?

Virus

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?

Spyware

Which type of malware is designed to report activity on your computer to another party?

Networks

___ allow users to communicate and share information between computers and various devices.

Packets

___ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

Dust

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat.

Two-factor authentication

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Social Engineering

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Ethernet

___ is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Ethics

___ is the philosophical study of morality. It is a rational analysis.

DRM

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks

A(n) ___ input device authenticates you based on patterns or characteristics found in the human body.

biometric

Higher ___ cameras can capture more detail, but they will produce a larger image file on your storage media.

megapixel

As the largest circuit board in a personal computer, the ___ contains a variety of slots, connectors, and plugs for hooking up all the other parts of a computer.

motherboard

___ technology produces output in the form of vibration, motion, or physical resistance.

Haptic

The magnetic ___ often serves as the primary storage device of a personal computer.

Hard drive

Which of the following choices is NOT a speech recognition program/assistant?

Intel's Eris

Which of the following units is the smallest?

Kilobyte

___ technology changes the way LCD monitors are illuminated.

LED

Protocols

Machines that communicate over a network must follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly.

Suppose that a laptop identifies its processor as follows: AMD's A8-4500M. What does the AMD represent?

Manufacturer

Many individuals are using ___ to turn their computers into DVRs, which allow you to record television shows for future playback.

TV tuners

___ are often used to back up or archive large quantities of information.

Tape Drives

Sleep

The ___ mode on a computer will place it in a low-power state when it is not being used.

Typology

The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network.

FAQ

The ___ of a website or forum contains common questions and their responses.

Whistle-blowing

The act of alerting the public about harmful activities that are being hidden by an organization is called:

Hacker

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

Which rectangular, stationary pointing surface is found on almost all laptop computers?

Touchpad

Bandwith

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.

The ___ port is used to connect almost all of today's external devices.

USB

Automation

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

Fair use

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

Copyright

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

Outsourcing

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.

Private Browsing

Which browser feature will delete your history, cache, and cookies the moment you close the special window?

Surge Protector

Which device can guard connected equipment against large power spikes or surges that may infrequently occur?

Switch

Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

Watson

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?

802.11z

Which of the following is NOT one of the specifications of Wi-Fi technology?

Acceptable Use Policy

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

NSA

Which of the following is a government agency that has the capability to monitor the Internet and mobile activities of individuals?

Privacy Policy

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?

Botnets

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

Most organizations have found that going paperless is worse for the environment and for their productivity than their pervious paper based system

Which of the following statements about recycling and reducing waste is FALSE?

Most types of employee monitoring and internet restrictions at the workplace are illegal

Which of the following statements regarding employee monitoring is FALSE?

Digital Device

Which of the following terms refers to the technology gap between different social and economic classes?

Pandora

Which of the follows companies does NOT offer digital movie rentals?

Phishing

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

Fiber-optic

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current?

Humanoid

___ robots are those that are created to imitate the appearance or capabilities of humans.

Scalable

___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.

Cyberbullying

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.

Bringing your thumb and index together in a pinching motion (for zooming in and out) is an example of:

a gesture

A designation of ___ means that a blank optical disc can be recorded to only once.

-R

Which type of printer is most likely to be used by an engineer who needs to create a small, plastic model?

3D

Countermeasure

A ___ is any step you take to ward off a threat.


Ensembles d'études connexes

Chapter 15: Psychological Disorders

View Set

A&P Chapter 11 Fundamentals of the Central Nervous System and Nervous Tissue - Notes Part 2 of 2

View Set

American Revolution Set 2 Marquis De Lafayette — James Armistead

View Set