computer science chapter 4,5, &6
Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands.
5
Which of the following is NOT one of the specifications of Wi-Fi technology?
802.11x
The seeds of the Internet were planted in 1969 with _________, which connected computers at four universities in the western United States.
ARPANET
The piracy of music and movies is often evident on file-sharing services that use the _________ protocol.
BitTorrent
Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
Can the exposure of this information put the organization's reputation at risk?
A _________ license allows an author to set conditions for the free use and distribution of their work.
Creative Commons
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDos
Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.
FISA
_________ computers are able to continue their operation even when problems are present.
Fault-tolerant
The _________ language, which was used in the first web page ever created, is still in use today.
HTML
The _________ protocol is used to deliver requested web pages to a computer.
HTTP
The _________ lock can make it difficult for thieves to steal a laptop
Kensington
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.
NSA
_________ involves luring individuals into entering personal information into a website controlled by the hacker.
Phishing
_________ computers are ones that have multiple hardware systems performing the same task at the same time.
Redundant
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.
Scalability
The protocols that are at the heart of Internet communication are known as:
TCP/IP
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?
The likelihood of user compliance
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Trojan horse
Which of the following is a popular test of a system's ability to think?
Turing test
_________, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.
VoIP
_________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
Watson
A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
Honda's _________ robot can perform a variety of activities that require a great deal of balance and range of motion.
asimo
The security principle known as _________ requires that individuals must confirm their identity.
authentication
Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.
backups
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
bandwidth
A _________ ad is a thin, rectangular advertisement that is commonly placed across the top or on the sides of a web page.
banner
Any email address placed in the _________ will be invisible to the recipients of your message.
bcc
A _________ is a device that connects two LANs or two segments of the same LAN.
bridge
Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.
business intelligence
_________ is the discovery of new patterns or relationships between data.
data mining
A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.
domain name
Many types of software and devices use _________ to scramble your data or communication.
encryption
Human _________ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
enhancement
A browser _________ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.
extension
Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair-use
Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material. TRUE/FALSE
false
Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S. TRUE/FALSE
false
The HTTPS protocol in a URL indicates that the web page has been completed, sent, or loaded. TRUE/FALSE
false
The ability for UPS's website to remember your country/language selection is the result of its use of third-party cookies. TRUE/FALSE
false
The two parts of a packet are the certificate and the key. TRUE/FALSE
false
Which of the following is NOT a type of network topology?
fiber
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
fiber-optic
While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.
fluctuations
A mobile _________ refers to a device that can connect to a mobile network and offer Internet access to multiple devices near it.
hotspot
You will often find _________ on a web document that, when clicked, act as connectors to another document on the World Wide Web.
hyperlinks
A type of spyware known as _________ can record the individual keystrokes of a user.
keyloggers
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.
mission critical
A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.
modem
Search _________, such as quotes and the minus sign, can narrow down the results provided by search engines.
modifiers
________ involves the creation or manipulation of matter at the smallest possible scale.
nanotechnology
Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
packets
In the model known as _________, advertisers pay for their ads only when a website visitor clicks on the ad.
pay-per-click
A web _________ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.
portal
Computers that communicate over a network must follow certain _________ to ensure that the transmission is sent properly and understood.
protocols
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
protocols
A _________ computer can represent data in states beyond the two bits (0's and 1's) of today.
quantum
A _________ is used to prevent attenuation when packets are traveling long distances.
repeater
Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.
rogue hotspots
Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active?
sleep
A _________ specializes in developing plans and recommendations that meet the software and system needs of an organization.
systems analyst
Ethics involves a rational analysis of the voluntary, moral choices that individuals make. TRUE/FALSE
true
Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site. TRUE/FALSE
true
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name. TRUE/FALSE
true
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.
ups
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
virus
A(n) _________ is a collaborative information site that relies on the Internet community to both create and edit content.
wiki
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.
worm