computer concepts chapters 4 & 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is another name for public key encryption?

asymmetric key encryption

What is the term for a program that performs a repetitive task on a network?

bot

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

cyberterrorist

Ghosting is a severe problem with today's displays.

false

If a program or device has a default password, be sure to retain it.

false

Many businesses use spyware to limit employees' web access.

false

One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.

false

PINs are not the same as passwords.

false

Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.

false

Perpetrators of back doors trick their victims into interacting with phony websites.

false

How much do fingerprint readers typically cost?

less than $100

A(n) ____________________ agreement is the right to use software.

license

The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.

true

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

IP

An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user's inbox?

anti spam

____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.

digital-forensics

Video editing software allows professionals to modify a segment of a video, called a clip.

true

Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?

DTP

A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.

SSID (service set identifier)

To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.

acceptable use policy (AUP)

A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.

access

A(n) ____________________ is used to make users more productive and/or assist them with personal tasks.

application or app

Many desktop and mobile apps use a(n) ____________________ feature, where the changes to the apps can be configured to download and install automatically.

automatic updates

Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

back door

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

backup

A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

biometric

____________________ software is an application that helps you organize your calendar, keep track of contacts, and share this information with other devices or users.

calendar and contact management

Which of the following is an authorized person or company that issues and verifies digital certificates?

certificate authority

Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.

code of conduct

Many businesses use which of the following to limit employees' web access?

content filtering

Which type of individual may steal credit card numbers to make fraudulent purchases?

corrupt

____________________ software performs functions specific to a business or industry.

custom

The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.

cyber warfare

Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?

database

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

digital

A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

disaster recovery plan

Which of the following tools searches for and removes unnecessary files?

disk cleanup

To ____________________ a document means to make changes to its existing content.

edit

What kind of application teaches a particular skill?

educational

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.

encryption

Analog signatures help to prevent email forgery.

false

Biometric objects are entirely foolproof.

false

Buying a collection of programs in a software suite usually costs significantly more than purchasing them individually.

false

COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.

false

Distributing programs outside the terms of a license agreement is a violation of copyright law but is not a federal crime.

false

Document management software allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.

false

Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.

false

Software registration typically is required for the use of the application.

false

The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.

false

Which of the following kinds of file utilities shrink the size of a file(s)?

file compression

Which of the following (with examples such as the bold, italic, and underline shown in the accompanying figure) adds emphasis to a font?

font style

When computer users ____________________ a project, they change its appearance.

format

Which of the following performs calculations on the data in a worksheet like the one in the accompanying figure and displays the resulting value in a cell?

formula

A(n) ____________________ is a predefined formula that performs common calculations such as adding the values in a group of cells.

function

Application software often includes an image ____________________, which is a collection of clip art and photos.

gallery

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

information privacy

____________________ occurs when someone steals personal or confidential information.

information theft

A(n) ____________________ is a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device.

media player

Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?

network

Which of the following terms means in a location separate from the computer site?

off site

With a three-generation backup policy, the grandparent is which of the following?

oldest copy of file

A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.

online security service

____________________ software is provided for use, modification, and redistribution and usually can be downloaded from the web at no cost.

open source

Computer viruses like the kind in the accompanying figure—along with worms, and Trojan horses—deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.

payload

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

phishing

____________________ software is free software, but it has been donated for public use and has no copyright restrictions.

public domain

Which of the following is a request for specific data from a database?

query

A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.

rootkit

With which of the following do users choose which folders and files to include in a backup?

selective backup

____________________ is copyrighted software that is distributed at no cost for a trial period.

shareware

____________________ is the unauthorized and illegal duplication of copyrighted software.

software piracy

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

spoofing

In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?

they restore the files

A rootkit can be a back door.

true

As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.

true

Backup tools work with a restore tool.

true

Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.

true

FOIA enables public access to most government records.

true

If you are nervous, a signature might not match the one on file in a signature verification system.

true

Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.

true

Many users opt for electronic distribution of documents because it contributes to green computing.

true

Most television shows and movies are created and enhanced using video and audio editing software.

true

Professional DTP software is ideal for the production of high-quality color documents such as textbooks, corporate newsletters, marketing literature, product catalogs, and annual reports.

true

Software developers typically cannot incorporate freeware in applications they intend to sell.

true

Some shareware developers render their software useless if no payment is received after the trial period expires.

true

The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.

true

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.

true

To protect yourself from social engineering scams, shred all sensitive or confidential documents.

true

Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing.

true

When users press a key or move the mouse, a screen saver disappears and the screen returns to the previous state.

true

With web apps, you always access the latest version of the software.

true

Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?

value

What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?

website authoring

What is the term for a square-shaped coded graphic that corresponds to a web address or other information?

QR code

Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?

CAD

Which of the following is a federally funded Internet security research and development center?

CERT/CC

____________________ typically consists of self-directed, self-paced instruction on a topic.

CBT (computer based training)

Into which of the following kinds of ports do external fingerprint readers plug?

USB

Which of the following provides the mobile user with a secure connection to the company network server?

VPN


Ensembles d'études connexes

MGMT 203-Chapter 12:Human resource Management

View Set

NCLEX - Patients with Urinary Problems

View Set

Psicologia General II - 1er parcial

View Set

CHAPTER 21 THE MUSCULOSKELETAL SYSTEM

View Set

Identifying Different Types Of Mixtures

View Set

Ch. 10 Florida Statutes, Rules, and Regulations Common to all Lines

View Set

The Integumentary System (the skin)

View Set