CISY Ch 4,5,6,7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Files saved to a hard disk are stored in ________.

Clusters

Windows ________ helps to protect a computer from viruses and spyware.

Defender

Windows ________ is a program that protects against viruses and spyware.

Defender

Which operating system is specialized and can run on simple hardware?

Embeded

________ software blocks unauthorized access to your computer.

Firewall

The Android operating system is the embedded version of ________.

Linux

________ is the ability to do more than one task at a time.

Multitasking

When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.

PnP

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

All of the following are examples of malware, EXCEPT ________.

Spam

Chromebooks rely on an Internet connection, web apps, and cloud storage rather than traditional software.

True

Installing software updates requires an Internet connection.

True

PNP allows you to easily add new hardware to your computer.

True

The Windows Embedded OS can be found on many devices from set-top cable boxes to medical devices.

True

Your school network is most likely a client-server network.

True

Which is NOT a mobile embedded operating system?

UNIX apache

The macOS operating system is based on ________.

Unix

A(n) ________ creates a private network through the Internet.

VPN

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

VPN

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

WAN

Which of the following applications is NOT an example of presentation software?

acrobat

A router is a form of security because it ________.

acts like a firewall

When two wireless devices are directly connected to each other, they form a(n) ________ network.

ad hoc

________ hackers hack into systems to steal or vandalize.

black hat

A(n) ________ is a flaw in programming.

bug

Which of the following items below is NOT a cloud service offering?

business as a service

The intersection of a row and a column in a spreadsheet is called a ________.

cell

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

client server

An email claiming that you have won a lottery might be an example of ________.

computer fraud

Which cybercrime is considered to be a form of harassment?

cyber stalking

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

cyber terrorism

A ________ is a network composed of a group of clients and servers under the control of one central security database.

domain

________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.

donation ware

A workgroup and a homegroup refer to the same network feature.

false

Apache OpenOffice is offered for only a small fee based on the number of computers on which you want to install it.

false

If you want to create a peer-to-peer network, you must first install a specific software program.

false

Jane purchased some financial software at the local office store. She brought it home and installed it on her computer. She actually owns the software program now because she purchased it from a local merchant.

false

Microsoft Office Online web apps are full-featured versions of the Microsoft Office applications.

false

Spam CANNOT be sent as a text message.

false

Spyware is easy to remove from your computer.

false

The only authority responsible for investigating cybercrime in the United States is the FBI.

false

The only program you need to fully protect your computer is a good antivirus program.

false

The unauthorized use of your neighbor's wireless network is called trolling.

false

In a database, a person's email address is an example of a(n) ________.

field

A(n) ________ can prevent unauthorized access to a network.

firewall

Which of the following is an example of a personal Software-as-a-Service (SaaS)?

google drive

Which of the following is NOT a common LAN topology?

hierarchical

Instead of purchasing and maintaining their own cloud-based servers, a company could use a(n) ________-as-a-Service provider.

infrastructure

Which of the following is NOT a cloud service provider?

intel

The ________ was created in an effort to make it easier for victims to report cybercrimes.

internet crime complaint center

________ is a program that is harmful or malicious to your computer.

malware

Web apps which will run on any device with a supported browser and Internet access are called platform-________.`

neutral

________ software can be copied, modified, and redistributed without paying a fee.

open source

The ________ is the most important software on a PC.

operating system

Each computer is considered equal in a ________ network.

peer to peer

A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.

personal information manager

________ redirects you to a phony website by hijacking a domain name.

pharming

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

phishing

When you decide to use your neighbor's open wireless network without permission, you are ________.

piggybacking

A(n) ________ app is a program that can be carried and run from a flash drive.

portable

Rajiv purchased some great gaming software and wants to make copies for all of his friends. Rajiv is restricted from making copies of the software for his friends because it has a(n) ________ software license.

proprietary

A(n) ________ contains information about a single entry in a database.

record

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.

spreadsheets

In a(n) ________ topology, nodes can be easily added, removed, or moved, without disrupting the network.

star

A(n) ________ allows someone to use software for a monthly or yearly fee.

subscription

A ________ is a device that connects multiple devices on a LAN.

switch

A(n) ________ is a device that is used to connect multiple devices on a LAN.

switch

Most home routers also include a built-in ________.

switch

The ________ software makes the computer run.

system

When you purchase software in a box, reading the ________ is important to know if the software will function properly.

system requirements

The term "cloud" in cloud computing refers to ________.

the internet

Which of the following transmission media is NOT used to transmit signals on an Ethernet network?

topology

A ________ appears to be a legitimate program, but is actually something malicious.

trojan horse

A benefit to cloud service providers is that they can operate from remote places.

true

A bug is a flaw in programming of a software application.

true

A centralized server provides access to file and print services as well as email.

true

A firewall can be used to shield your computer from direct access to the Internet.

true

A hotfix resolves individual software problems as they are discovered.

true

A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

true

Antispyware software prevents adware software from installing itself on your computer.

true

Bluetooth technology connects peripherals wirelessly at short ranges.

true

Cruising a neighborhood in search of open wireless networks is called wardriving.

true

Encryption converts plain text into ciphertext.

true

Fiber networks use optical network terminals to connect to the Internet.

true

Firewalls can be implemented by hardware and/or software.

true

Freeware can be used at no cost for an unlimited period of time.

true

In a bus topology, data travels along a single cable that is terminated at both ends.

true

In a network, a file can be an example of a resource.

true

In a peer-to-peer network, all the computers are set up to share resources with every device on the network, but none provide centralized authority.

true

Queries allow you to pull out records from a table that meet specific criteria.

true

Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

true

Rootkits are very difficult to detect.

true

Shareware is also referred to as trialware.

true

The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

true

Two wireless devices that are directly connected to each other form an ad hoc network.

true

Worms spread over network connections without any help from users.

true

The difference between a virus and a worm is a ________.

virus needs a host file, but a worm does not

Moving through a neighborhood trying to locate open wireless access points is called ________.

wardriving

When a company pays people to hack into its own system, it calls in ________ hackers.

white hat


Ensembles d'études connexes

ASCL Possible Interview Questions

View Set

Essen Nutrition Ch 3-5 Questions Exam

View Set

Chapter 14: Somatosensory Function, Pain, Headache

View Set

Chapter 8: Confidence Interval Estimation

View Set