CIS105 FINAL
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Which of the following would not impact the digital divide? A. A decline in the price of internet access. B. Expansion of free wifi connectivity in major cities. C. Legislation allowing communications companies to charge per website for access. D. Less sharing of the work we produce.
Less sharing of the work we produce
The most common computer port is the ______ port.
USB
The process whereby users prove they have authorization to use a computer network is known as
authentication
Ergonomics is an important consideration
for all computing devices.
All of the following are current focuses of AI research EXCEPT... A. Natural language processing B. Cognitive surplus C. Knowledge representation D. Perception
Cognitive surplus
Which of the following actions would NOT help to identify your personal ethics? A. Describe yourself. B. Conduct a genealogic study of your extended family. C. Prepare a list of values that are most important to you. D. Identify the influences of your work environment.
Conduct a genealogic study of your extended family
Data and information are interchangeable terms.
FALSE
RAM is non-volatile storage.
FALSE
An authentication server is used to host websites on a client/server network.
False
Artificial intelligence systems think exactly like human beings do. A. True B. False
False
Catfishing is posting inflammatory remarks online to generate negative responses. (T or F)
False
Podcasts can only be created by professional organizations (T or F)
False
Routers are used to send data on a specific route through an internal network.
False
The move toward access instead of ownership is a sign of cognitive surplus. A. True B. False
False
Web-based databases cannot be used to help investigators solve criminal cases. A. True B. False
False
Which of the following is not one of the factors used in multi-factor authentication?
Identity
Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? a. B2B b. mobile commerce c. social commerce d. C2C
mobile commerce
The most common output device for hard output is a
printer
What web browser feature would be particularly useful when using public computers? a. pinned tabs b. privacy browsing c. session restore d. all of the above
privacy browsing
Which of the following functions of a computer is mostly responsible for turning data into information?
processing
if you use an internet cache, then the information displayed in your browser is automatically refreshed
false
instant messaging is secure because of the type of encryption used
false
the term dotted quad means you have four dots in a row in your Java source code
false
Sometimes groups of data packets are sent together in a package called a
frame
HTTPS is different than HTTP because a. of how it transforms or reformats the data b. it is a combination of HTTP and the secure sockets layer c. it extracts data from source databases d. it stores data in the data warehouse
it is. a combination of HTTP and the Secure Sockets Layer (SSL)
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability
Which of the following is not a component of a search engine? a. indexer program b. spider c. search assistant d. search engine software
search assistant
SMTP is the set of rules used to a. send e-mail along the internet to its destination b. shrink the amount of space it takes to store e-mail c. encrypt e-mail messages d. make shopping on the internet more available
send e-mail along the Internet to its destination
The information in a data packet includes a. that data and the destination b. the data and circuit identifier c. just the data d. different types of information depending on the type of message being sent
the data and the destination
A private key is important a. to reboot the system hardware b. to reset your public key if you lose a password c. to decode an encrypted message d. because it enables you to use MIME
to decode an encrypted message
MIME is the protocol that supports sending files as e-mail attachments
true
Your internet service provider has a default DNS server to translate a URL into an IP address
true
Which component of a computing device drains the battery the fastest?
display screen
Bike sharing programs like Citi Bike are an example of...
A subscription-style business model made possible by technology
Which server would a client/server network include to ensure only authorized users are logging onto the network?
Authentication
Which is not a key component of a typical client/server network?
Bastion host
Ensuring that website content is not slanted in its point of view is checking for: a. Authority b. Audience c. Bias d. Relevance
Bias
A touch pad is a pointing device usually found in tablets.
FALSE
The crisis-mapping tool Ushahidi...
Shows that a free software product can have great value
SSD drives are superior to conventional disk drives because they have no moving parts.
TRUE
You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? a. "Captain America: Civil War" b. *Civil War c. Captain America Civil War d. Captain America *
"Captain America: Civil War"
In the URL https://www.whitehouse.gov/blog, which part is considered the top-level domain name? a. http b. gov c. /blog d. www.whitehouse.gov
.gov
A(n) ______ is a laptop computer that can convert into a tablet-like device.
2-in-1 PC
Being computer literate includes being able to...
Avoid spam, adware, and spyware; use the web effectively; diagnose and fix hardware and software problems
The set of instructions that define how to display the HTML elements in your site is a. CSS b. XML c. AJAX d. PHP
CSS
Sophisticated modeling software is helping international researchers...
Increase the pace of research in finding and producing vaccines
______ printers work by spraying tiny drops of ink onto paper.
Inkjet
The collection of large national and international networks used to establish the Internet is called the a. T1 b. highway system c. oc d. internet backbone
Internet backbone
Intellectual property...
Is the result of someone's creative work and design; can be protected legally by the patent system; can include works of music, film, or engineering design
Which of the following describes an IP address? a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet. c. It identifies a website. d. all of the above
It is referred to as a dotted quad. It identifies any computer connecting to the Internet. It identifies a website (all of the above)
Crowdfunding sites include...
Kickstarter and GoFundMe
Which topology tends to provide the fairest allocation of network resources?
Ring
Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights? a. Custom Search b. Search Tools c. History d. Favorites
Search Tools
Which of the following is an advantage of installing a client/server network in a business?
Sharing of peripherals
The "brain" of the computer is the CPU.
TRUE
Which statement is not true about the web? a. The web is based on the WWW protocol. b. The web was based on a protocol developed by Tim Berners-Lee. c. Special links are used to navigate from page to page on the web. d. The web is a subset of the Internet.
The web is based on the WWW protocol.
Google Docs is an example of a wiki (T or F)
True
Hactivism is different from cyberterrorism. A. True B. False
True
Intellectual property can be legally protected even though it is not a physical object. A. True B. False
True
Most modern operating systems include some type of NOS functionality.
True
Network adapters perform specific tasks to enable nodes to communicate on a network.
True
Star topologies are the most widely used topology.
True
The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. (T or F)
True
Your location can be captured from your mobile device even if app location tracking is turned off. (T or F)
True
Which network cable type is most susceptible to signal interference?
UTP
Which of the following statements is FALSE? A. Individuals who have no sense of right or wrong exhibit amoral behavior. B. Life experience affects an individual's personal ethics. C. Unethical behavior is always illegal. D. Ethical decisions are usually influenced by personal ethics.
Unethical behavior is always illegal
Touch-screen devices usually feature ______ keyboards.
Virtual
An applet is a. a small application located on a server computer b. a program distributed by Apple Inc c. a hardware device that encrypts e-mail messages d. a program language used to help create dynamic web pages
a small application located on a server computer
Which of the following is a sensor found in certain smartphones?
accelerometer
IPv6 uses 128 bits to assign a: a. data packet to each transmission b. memory address to the CPU c. address to every device connect to the internet d. destination internet address to each e-mail
address to every device connected to the Internet
In a computer, each _____ can represent either a 0 or a 1.
bit
Encryption is used to a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the internet more available
code your e-mail so only one person can decipher it
Which of the following is a good precaution to take when making online purchases? a. use the same strong password for all online accounts b. pay by debit card c. use a private browser when purchasing items from a public computer d. make sure http: and an open padlock displays in the address bar
use a private browser when purchasing items from a public computer
The internet is primarily funded by a. voluntary contributions b. Google c. your state income taxes d. your federal income taxes
your federal income taxes