Computer Science

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

RAID

A(n) __________ is a storage system that links any number of disk drives so that they act as a single disk.

Expert System

A(n) __________ is a type of information system that performs analytical tasks traditionally done by a human.

DBA

A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.

Hub/Switch

A(n) __________ is the device that all nodes connect to in order to communicate wirelessly.

Creative Commons

A(n) __________ license allows authors to set conditions for the free use and distribution of their work.

MOOC

A(n) _______________ is a huge, noncredit, online course that is offered for free by a variety of universities

Fiber-optic

A(n)__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

False

A Kensington lock is an effective countermeasure against phishing threats.

Switch

A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes

True

A decision support system can include or access other types of data, such as stock market reports or data about competitors.

VPN

A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

Information-System

A(n) __________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.

1. Education use and commentary are more acceptable than a for-profit use 2. Copying news article is more acceptable than a popular song or major network TV show 3. Using only a few seconds of a song or video is more acceptable than copying the entire thing 4. If you are claiming fair use just to avoid paying for a book, song, or movie, then fair use will likely not apply

Briefly describe the four factors that must be considered for "fair use."

Email promotions that come up whenever you check your email, banner ads and pop-ups which can both pop up anytime you are surfing the web

Describe three types (or models) of advertising on the web

1. News you can choose 2. Share this (sharing is emerging as a way or distributing the news) 3. Like it (by clicking a "thumbs up" or "thumbs down" icon, can give politicians an instant read on opinions and positions posted on their web pages

Describe three ways in which social media have been used to help bring about political or social change.

First party cookie are issues read by actual websites you are on. Third-party cookies, typically are created by marketing and advertising companies that work with a website you are visiting

Contrast first-party cookies with third-party cookies. Which one of these raises privacy concerns for many individuals?

False

Copyright protection lasts for approximately 15 years after the author applies for it.

Packets

Data moves through networks in structures known as __________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

The discovery of new patterns or relationships between data. Amazon.com uses data mining to predict what costumers might like in order to feature it when the costumer logs in and begins to browser

Define data mining and provide one example of how a retail company might use it.

A logical collection of info gathers from many different operational databases it supports business analysis activities an decision-making tasks

Define data warehouse and provide on example of how it can be used.

The application of sociological principles to specific social problems. Ex. 1. Familiarity Exploit 2. Creating a hostile situation

Define social engineering and provide two examples or techniques it employs

1. Instead of buying something you're not going to use very often, borrow it from someone 2. Carpool with friends, walk, take bus, ride bike 3. Turn lights off that you are not using

Describe at least three ways in which you can recycle and reduce computing-related waste.

A WAN (wide area network) is not restricted to a geographical location, although it might be confined within a state or country. A WAN connects several LAN's and may be limited to an enterprise or accessible to the public. Ex. WiFi (LAN), Ex. WAN (for offices)

Describe the difference between a LAN and a WAN, and provide one example of each.

Have a good subject, a proper title, and 2-3 sentences using proper grammar or however long depending on the email

Describe three guidelines that should be followed for good email ettiquette.

True

For a computer, "sleep" mode uses less electricity than "hibernate" mode.

True

For mission-critical systems, technology companies construct computer hardware and software that can never fail.

False

HTTP and HTTPS are the heart of Internet communication, setting rules for the transport and addressing of packets.

Rogue hotpots

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

Social networks are for keeping up-to-date with events you care about, professional networks are strictly for business

How are social networking sites different from professional networking sites?

True

If a company hires an outside organization to handle its accounting, it is engaged in outsourcing.

Gate Way

In its simplest form, a(n) __________ is a node on a network that serves as an entrance to another network.

Piracy

In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.

Yes, it is right because someone could be doing his job incorrectly

Is it legal for a company to monitor employees while they work? Is it ethical? Defend your answers.

False

It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.

spam

Junk mail, or _________, is unsolicited email that is sent in bulk

Copyright

Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.

Back, forward, stop, refresh and home all on the front page of any web browser these buttons are used all the time in computer usage.

List and briefly define five navigation buttons found in most web browsers

1. Anti-malware - helps protect your computer from various types of malware 2. Firewall - examines and blocks internet traffic in order to protect your private network 3. Encryption - many types of software and devices use encryption to scramble your data or communication making it unreadable

List and describe three countermeasures (security utilities) against malware and hacking.

1. Outlawing the use of computing resources to commit crimes, such as hacking and piracy 2. Restricting particular serutes, such as file-sharing on their networks 3. Banning inappropriate and unethical behavior and guidelines for theory netiquette 4. Stressing the importance of security especially the creation of a strong password 5. Explaining the ownership and privacy of email, storage, and other resources

List five elements that are typically found in acceptable use policies.

Weather, jobs, monsters and indeed, Travel-Expedia, orbite, entertainment, sports, rotten tomatoes, ESPN

List four categories of reliable sites and provide an example or brief description of each.

1. The ability to hire or keep workers whose schedule or location would make it impossible for them to work at the company's office 2. Reduced costs for office space and utilities 3. Improved employee morale, which can boost productivity and loyalty

List three advantages of telecommuting

FAQ

Many websites have __________ areas that should be checked for common questions and their responses.

Wodo

Network media helps carry data from one __________, or connection point, to another.

protocals

Networks must follow rules, known as communication __________, to ensure that data is sent, received, and interpreted properly.

Copyright

One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work.

Privacy policy

Online companies typically have a(n) ___________ _____________ on their websites that clearly state what information is collected from users and what is done with that information.

False

The asterisk symbol is often used to mark keywords or topics in a social post or tweet

Cyberbulling

Repeated hostile behavior with intent to harm another individual is known as __________.

False

Scalability is the ability of each organization's information system to work with the other, sharing both data and services.

True

Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.

Intranet

Some organizations offer an internal version of the Internet, called a(n):

1. Purchase a digital copy of almost anything at various websites 2. Rent for 2 days 3. Ad supported streaming 4. Subscription services can view legally

Suppose that you wanted to watch a Hollywood movie or the entire season of a TV show. List four legal ways in which you could view this content.

Star

The __________ topology, where nodes connect to a hub, is the most common type used today.

HTML

The ______________ language, which was used in the first web page, is still being used today alongside other languages.

Digital divide

The __________refers to the technology gap that exists between different social and economic classes.

Ethernet

The network standard known as __________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Netiquette

The term __________ refers to the set of online behaviors that are considered polite and proper.

broadband

The term _____________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies

ISP

To access the Internet from home you must connect to ____________, which typically involves makes monthly payments to a telecommunications company

VoIP

Translates analog voice signals into digital data and used the Internet to transport the data.

B2C is business to consumer., C2C -IS consumer to consumer , B2B IS business to business

What are the differences between B2C, C2C, and B2B?

Bookmarks are for remembering pages for the future, history is a list of sites you've previously used, cache contains every singe page, image and videos for all web pages you've recently retained

What are the differences between browser bookmarks, history, and cache?

An individual who possesses advanced skills, often making a computer do something that is wasn't intended to do. Yes there are identity theft hackers which is the most dangerous form of hacking

What are the original and modern meanings of "hacker"? Are there different types of hackers? What is the most dangerous form of hacking?

What you know. This typically refers to passwords or PINS an individual must memorize What you have. Refers to a credit or debit card that allows people to access their money Who you are. Many systems are now authenticating individuals by scanning their unique finger print, iris, or face

What are the three general strategies used to authenticate individuals? Include one example of each

Zombies are under external control. Botnets can be used by the hacker to spread malware, send spam, and conduct carefully orchestrated net-work attacks computers infected and compromised in this way are known as zombies

What are zombies and botnets? What can hackers do with them?

Plug-in is a separate program that allows your web browser to play several types of multimedia content, browser extension is also a separate program with purpose adding a variety of useful features to the web browser

What is the difference between a browser plug-in and a browser extension? Provide one example of each.

Surge protectors provide protection by dissipating any excess power and preventing it from reaching your connected device. A UPS provides protection against surges as well, but includes a built-on battery wit varying capacity based on model

What is the difference between a surge protector and a UPS? In your response, be sure to indicate the types of threats they help minimize.

Monitor internet and mobile-devices of individuals

What sort of Internet surveillance does the U.S. government engage in? Name two laws that give government agencies broad surveillance powers.

BCC

When sending email to a large number of individuals, placing their addresses in the __________ field will prevent all those addresses from being seen by the recipients

AC

Which of the following Wi-Fi standards is the fastest?

Nanotechnology

Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?

DSL

Which of the following is NOT a high-speed Internet connection for homes?

ARPANET

Which of the following networks, which began with just four universities, is the earliest ancestor of the Internet?

Domain name

Which part of a URL identifies a site and a brand on the web?

TPS

Which type of information system handles the processing and tracking of transactions?

Worm

Which type of malware is a fully contained program that self-replicates and spreads through networks?

It updates so quickly about breaking news and up to date information, it always has recent political debates or even sports highlights uploaded to twitter right away by various users

Why has twitter become such an important service? List three reasons.

True

Wireless networks use radio signals that travel through the air in order to transmit data.

Threat generally can NOT be controlled, vulnerability can be treated weaknesses should be identifies and proactive measures taken to correct identified vulnerabilities

With respect to computer security, what is the difference between a threat and a vulnerability?

web portals

Yahoo and MSN are both examples of:

world-wide-web

_______________is a global system of linked, hypertext documents

Green Computing

__________concentrates on reducing the environmental impact of computers and their widespread use.

Help-Desk

You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.

Redundant

__________ computers are ones that have multiple hardware systems performing the same task at the same time.

AI

__________ involves the development of intelligent systems.

Private browsing

__________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser.

Empathy

__________ is the ability to recognize, understand, and share the feelings of others.

Whistleblowing

__________ is the act of alerting the public about harmful activities that are being hidden by an organization.

Bandwidth

__________ is the amount of data that can be transmitted over a given amount of time.

Ethics

__________ is the philosophical study of morality.

Automation

__________ occurs when computers or machines can perform the work that was once done by a human.

forumns

____________ is a discussion board where individuals can ask questions and reply to each other.forumns

Instant Messaging

_____________ is the act of having an online, text-based conversation with one or more individuals

Social Norms

________________ sites, such as Reddit, encourage users to share links to news and other interesting content they find on the web.

blog

a_____________ is a web page or small website that contains a series of chronological posts and commentsblog

peer-to-peer

file sharing uses a distributed network of individual users instead of a central server to transfer files

Trolling

is the act of being annoying and antagonistic in areas such as online forums.


Ensembles d'études connexes

The Great Gatsby Chapter 9 Questions

View Set

11; The British Invasion: The Beatles

View Set

NSSW NEXT: Service Work and Quality Check

View Set

Government Final - Chapter 12 Metropolitics

View Set

4 - E Commercial Package Policies

View Set

Herbivores, Carnivores, Omnivores

View Set