CIS 150 Practice 1-2: Internet/Networks/Security/Ethics

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

tunneling

A virtual private network (VPN) uses a method called _____________ in which a packet from the sending computer is encapsulated within another packet before it's sent over the Internet.

management information system (MIS)

A(n) ______ helps managers use software tools to gather, organize, and evaluate information.

expert system

A(n) ______ is a type of information system that performs analytical tasks traditionally done by a human.

encryption

A(n) ________ utility scrambles your data or communication, making it unreadable by anyone who doesn't have the proper key.

social networking activity email messages search history

Agencies such as the NSA and FBI monitor Internet activity and can require companies to turn over your ____________. Select the three correct answers.

"white hat"

Also known as _________ hackers, non-criminal hackers engage in hacking out of curiosity, not criminal intent.

Subject

Always include the topic or purpose of your message in the ___________ box.

social media companies search engines

Automated programs run by ______________ frequently search, organize, and store your information for marketing purposes. Select the two correct answers.

Backing up

______ your data is a countermeasure against the threat of data loss.

Voice over Internet Protocol (VoIP)

________ allows people to cancel their traditional phone service and make calls using their Internet connection.

Anonymity software

______________ such as Tor will mask your IP address from websites in order to protect your privacy when visiting a website that does not have a privacy policy.

True

(True/False) Wi-Fi signals generally reach 100 to 200 feet indoors, unless the signal is blocked by walls or floors.

wide area network (WAN)

A ______ is the connection of two or more central computers or LANS.

hub

A ______ provides multiple ports for connecting nodes and transmits packets to all connected nodes.

RAID 5 striping with parity

A __________ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers.

extension

A browser_______ is a separate program that adds a variety of useful features to the web browser, like Evernote or Google Hangouts.

warehouse

A large company like Amazon saves enormous amounts of data gathered from multiple databases in a data _____.

webcast

A radio station can broadcast their programs online via a _____________, allowing people from around the world to listen to their shows online.

Select the "Check with the Bank" hotspot. Select the "Ignore the Email" hotspot.

Cam has an account with Bank of America. He received an email to renew his account. What should he do?

Click the Twitter hotspot.

Click on the microblogging service that restricts your posts to 280 characters.

extranet

Contractors that have ongoing business with a company can log into its ______ by using a valid username and password.

Cheating Plagiarism

Copying large chunks of data from a web page and pasting them into your schoolwork without properly citing the source is known as ______. Select all that apply.

computer network

Employees use their company's ______ to access documents, programs, and hardware devices.

fiber-optic cables

Ethernets generally use ______ when communicating over long distances.

IP

Every computer or device that is on the Internet needs a(n) ______ address that uniquely identifies it.

mobile hot spot

If you are staying in an area that doesn't offer free wireless Internet, you can tether your computer to your smartphone and use it as a(n) ______.

delete

If you don't recognize the sender of an email or if the content of the message is suspicious, you should _________ the email immediately.

HTML

In 1990, the first web page was created in a language called _______ and placed on the first web server.

router

In a small business or home network, the gateway is usually the ______.

redundant

In order to be fault tolerant, ______ computers have multiple hardware systems that perform the same task at the same time.

No. It is not morally acceptable to download copyrighted music files that you didn't purchase.

Is it ethical to illegally download music because your friends are doing it?

Click on the Max, MaxPlus, and MaxTurbo hotspots.

Ken wants to watch high-definition movies and be able to download data at a speed of at least 12 Mbps. Click on three home packages that will fit his needs.

router

Many ISPs give users a wireless broadband ______ that serves all the networking and Internet functions a home user needs.

encrypts

Many companies make their communication more secure by using HTTPS, a protocol that ______ communication that contains financial or personal information.

copyrighted music copyrighted photographs copyrighted videos

Many musicians don't download ______ because they feel empathy for fellow musicians who don't financially benefit from their creations. Select the three correct answers.

peer-to-peer (P2P)

Many software companies use ______ technology to distribute software and updates to millions of users at a time.

Flipboard

Many users read today's news by using ______, a mobile app known as a news aggregator.

identity theft

One way to help prevent ____________ is to check your credit reports regularly.

Select the "8 characters" hotspot. Select the "SIMnet (both)" hotspot. Select the "9$7#21! (both)" hotspot.

Professor Smith wants to create a strong password for his bank account. Click on three strong guidelines.

What is the nature of the work? What is the nature of the use? How much of the work is being copied? How will the copy affect the market?

Select four questions you should ask yourself to determine whether fair use applies to your situation.

navigation buttons

Select the buttons that enable you to move back and forward between pages, stop a page if it's taking too long to load, refresh a page for the latest information, and take you to a home page that you designated.

Click the lock hotspot.

Select the item that allows you to protect your laptop from theft.

Click the spyware hotspot.

Select the malware that is designed to report activity on your computer to another party.

Click the Wikipedia hotspot.

Select the wiki website that is like an encyclopedia that anyone can update at any time.

Google Facebook Microsoft (Skype)

Select three companies that have popular instant messaging services.

star mesh

Select two types of network topologies.

CSNET

The National Science Foundation (NSF) created ______ in 1981 to bring together researchers in the field of computer science.

sharing economy

The ______ refer(s) to the way in which the Internet has enabled people to share (for a price) their time, goods or services.

feedback system

To help build trust between users of its service, online stores typically feature a ______ for rating buyers and sellers.

website

Web pages that are linked to each other make up a _____________.

virus

When a recipient opens an infected file, a ________ will activate itself and find more files to infect, often making your operating system unuseable.

common interface

When different types of computer systems are involved, a(n) ______ is needed so that those systems can effectively communicate.

No single person or group controls the internet.

Who owns the Internet?

70

Works go into the public domain when their copyright expires, usually _____ years after an author dies.

Massively Multiplayer Online Role-PLaying Games (MMORPG)

World of Warcraft and Fortnight are two examples of ______, or online video game sets in a virtual world where millions of people play with or against other players.

cache

You can see every single page, image, and video for all the web pages you have recently retrieved by looking at the browser ________.

Linkedln

______ is a social network designed with a strictly business-oriented focus.

TCP/IP

______ is the communication protocol that rules how packets of data are transmitted.

Twisted-pair cable

______ is the most common medium used in homes and businesses.


Ensembles d'études connexes

EKG: Chapter 2 Electrophysiology

View Set

Subject SAT - US History (Colonial America (1607-1754))

View Set

Florida Interactive Science Course 2 Chapter 10 Lesson 2 "Temperature, Thermal Energy, and Heat" (Vocab)

View Set

EIS 3315 all chapters study (T/F omitted)

View Set

ATI Maternal Newborn Medium 139 Questions

View Set

Bioequivalence and Therapeutic Equivalence Ratings

View Set

Chapter 21: Caring for Clients with Lower Respiratory Disorders

View Set

Bible Chapter 2 Sin and Redemption

View Set

The Prokaryotic Cell Pre-Class Assignment

View Set

Chapter 17 and 18 Mastering Biology

View Set

Chapter 3: The World of Variables and Operators

View Set

Chapter 32: Care of Patients with Cardiac Problems

View Set