CIST1001 Computer Concepts Practice Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Most DoS attacks end within _____.

1 - 2 days

Early forms of email appeared in the _____ .

1960s

Information systems degree programs typically fall into the computer, business, or _____ category.

419 scam (or Nigerian scam)

Which of the following statements is true?

All of the above

Which of the following is NOT an example of cyberbullying?

An audience member heckles a stand-up comedian at a live show.

_____ is a program that looks for known viruses and strives to disable found viruses.

Antivirus software

Which of the following statements is true?

Apps may embed hidden data such as time and location data in a photo.

Which of the following social-media activities is most likely to POSITIVELY impact a hiring decision for a potential employee of a job for a college-graduate?

Background information supporting candidate's professional qualifications

Alice posts a public key that matches a private key only she knows. How does Bob encrypt a message that only Alice can read?

Bob encrypts the message using the public key provided by Alice.

In the U.S., the _____ law allows unsolicited marketing email but requires such email to have an unsubscribe mechanism.

CAN-SPAM

For what are wiki-based platforms typically used?

Collaborative development of content by multiple users

Which of the following statements is most true?

Craigslist is a type of C2C e-commerce company, which started as a way to place "classified" ads online.

Which of the following is NOT a good strategy to protect a user's personal identity?

Create multiple accounts so the user's information cannot be linked to a single individual.

Which is a general approach that uses a community of users via the Internet to perform a particular task, such as developing articles for an online encyclopedia?

Crowdsourcing

Which of the following is NOT a good strategy to contain personal information on the Internet?

Delete old posts that are no longer relevant to a user's changing interests.

Which effective email tip was followed by Bruce? "Bruce's order of laboratory supplies was delayed by three weeks. Once the shipment arrived, Bruce discovered several of the items were missing from the shipment. Bruce waited until the next day to politely email the customer support to indicate there was a problem with his shipment."

Don't email angry

Among the following, which is most likely to spread a computer virus?

Downloading music and videos from free file sharing sites.

_____ is primarily a service that allows a user to store files in cloud storage.

Dropbox

Which of the following statements is most true?

Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.

Which of the following is NOT a tip for effective email communication?

Email subjects should be omitted, unless absolutely necessary

_____ is the science of designing things for easy safe use by people.

Ergonomics

Which of the following statements is most true?

Every piece of information, public or not, may have value to somebody.

Which type of website is most likely to have the real purpose of spreading viruses?

Free games site

Which of the following is a web-based communication protocol involving encryption?

HTTPS

Which factors contribute to security problems?

Human behavior, responding to fraudulent requests, and outdated encryption all contribute.

When you request a web page from a server, your computer's _____ is sent to the server.

IP address

What happens to information once information is shared online?

Information can be manipulated or taken out of context

Amazon Web Services (AWS) is a popular example of a _____.

Infrastructure as a service (Iaas)

_____ is often tasked with investigating international cybercrime with the assistance of other countries' law enforcement agencies.

Interpol

Which effective email tip was NOT followed by the Kaylee? "Jayne sends Kaylee an email asking Kaylee to look over the next inventory shipment and verify that an adequate supply of parts is on hand. Kaylee replies indicating that a spare compression coil needs be ordered, and ends the email by asking Jayne if he knows to what time the staff meeting was moved."

Keep threads separate

_____ is an example of a popular online dating service.

Match

Which of the following information systems components does "enterprise resource planning" belong to?

Method

Which of the following is a browser mode that keeps a user fully anonymous on the Internet?

No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.

_____ is the business practice where company A uses company B to do work that company A's employees might otherwise do.

Outsourcing

_____ is a type of business model where users pay to access vendor's platforms or toolkits to develop and deploy new applications.

Platform as a service (Paas)

After a computer is infected with a virus, the user usually realizes within how long?

Possibly never

_____ uses one key to convert a message into an unreadable form, and then a second mathematically related key to convert the message back into readable form.

Public-key cryptography

Another name for a text messaging is _____.

SMS

_____ is a type of business model where users pay for a vendor's apps, which process and store data on the cloud.

Software as a service (Saas)

A keystroke logger may record all keys pressed by a user without the user's knowledge. A keystroke logger is an example of what type of malware?

Spyware

_____ is a type of malware that collects information from a computer without the user's knowledge.

Spyware

Which effective email tip was NOT followed by the Maggie? "Lisa sends everyone on the marketing team an email asking for volunteers to help set up for a work event. Maggie responds directly to Lisa indicating that she is available to help."

Think about recipients

A user decides against posting an embarrassing photo of a friend on their personal webpage. Which of the following strategies did the user employ to minimize negative consequences of online behavior?

Think before posting

The Yahoo! Logo falls under what form of intellectual property protection?

Trademark

Which of the following social-media activities is most likely to NEGATIVELY impact a hiring decision for a potential employee?

Unprofessional screen name

Which of the following is a protocol for encrypting data sent over WiFi networks?

WPA2

Which example is likely fair use?

Writing a book based on a factual newspaper article.

____ relies on crowdsourcing to provide reviews of restaurants, hotels, and more.

Yelp

A malicious security breach, such as accessing and posting sensitive data, is sometimes called _____.

a hack

Most video sharing sites earn revenues through _____.

advertisements

An encrypted message can be viewed by _____ .

an authorized user

Live streaming means to record and share a video of an event _____.

as the event happens

A _____ is a website organized into entries (called posts) that can be written by a single person, a small group of people, or a company.

blog

Many companies outsource work to areas where labor is _____.

cheaper

If a work has a _____ license, then any derivative work must use the same license.

copyleft

A DOS attack using multiple computers is known as a _____ DOS attack.

distributed

The dot-com bust occurred due the the failure of numerous _____ .

e-commerce companies

Ransomware is is a type of software typically used to commit _____.

extortion

A person's digital _____ consists of the information about him / her that can be found on the Internet.

footprint

The amount of information on the internet is _____ .

growing

#puppies is an example of a(n) _____.

hashtag

Some browsers allow you to open windows in _____ mode, which means the browser will not save your browsing history.

incognito

The objectives of a(n) _____ degree typically include how to implement and manage technology to develop, manage, and disseminate information.

information technology

Heads of households with lower educational attainment are _____ to have Internet access compared to heads of households with higher educational attainment.

less likely

On demand audio streaming allows users to _____.

listen to specific songs or albums specifically selected by the user

An Internet scam may trick a user into downloading an executable file, such as a supposed package delivery label, which then installs _____ .

malware

Households with a larger income are _____ to have Internet access compared to lower income household.

more likely

Cloud storage is the storage of files _____ .

on remotely-located servers

Flickr and Adobe Creative Cloud provide _____ services in the cloud.

photo editing, drawing, and storage

Unlawfully distributing copyrighted work is called _____.

piracy

A _____ license indicates a work is freely available.

public domain

A computer virus is most likely to _____ .

quietly use the computer for illicit tasks

A vacation message is a form of an email filter that automatically _____ .

replies to any incoming email with a user-specified message

The total number of telecommuters in the United States has _____ since 2005.

risen

A _____ is a weakness in a computer system that may lead to a security breach.

security hole

An email _____ is text automatically added to the end of every email you send.

signature

A _____ site connects people via the Internet with other users who share common interests and backgrounds. Users are able to add connections to other users, post information, share photos, and more.

social networking

A thread is a group of emails having the same _____ .

subject

What types of items can a search engine extract data from?

text, images, video, audio

Typically, a user's post on Facebook are published for _____ to view.

the user's friends/connections

Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel.

themes

Clicking on the _____ symbol on Pandora Internet Radio, the site will add similar songs and artists to the user's playlist.

thumbs up

YouTube is a widely-used _____ sharing website.

video


Ensembles d'études connexes

NURB 3030 Nursing as a Profession Exam 1

View Set

NUR 222 Multiple Choice Questions

View Set

Peds - Ch 21: Alteration in Urinary Elimination/Genitourinary Disorder

View Set

Chapter 55: Management of Patients With Urinary Disorders

View Set

Week 2 - Chap 12 Cognitive Interventions

View Set

ARTH103 Chapter 19 QUIZ: Africa before 1800

View Set