computer science chapter 4,5, &6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Wi-Fi radio signals operate on either the 2.4 GHz or ___ GHz bands.

5

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11x

The seeds of the Internet were planted in 1969 with _________, which connected computers at four universities in the western United States.

ARPANET

The piracy of music and movies is often evident on file-sharing services that use the _________ protocol.

BitTorrent

Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?

Can the exposure of this information put the organization's reputation at risk?

A _________ license allows an author to set conditions for the free use and distribution of their work.

Creative Commons

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDos

Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.

FISA

_________ computers are able to continue their operation even when problems are present.

Fault-tolerant

The _________ language, which was used in the first web page ever created, is still in use today.

HTML

The _________ protocol is used to deliver requested web pages to a computer.

HTTP

The _________ lock can make it difficult for thieves to steal a laptop

Kensington

Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.

NSA

_________ involves luring individuals into entering personal information into a website controlled by the hacker.

Phishing

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Scalability

The protocols that are at the heart of Internet communication are known as:

TCP/IP

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

The likelihood of user compliance

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

Which of the following is a popular test of a system's ability to think?

Turing test

_________, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.

VoIP

_________ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.

Watson

A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

acceptable use policy

Honda's _________ robot can perform a variety of activities that require a great deal of balance and range of motion.

asimo

The security principle known as _________ requires that individuals must confirm their identity.

authentication

Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.

backups

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

bandwidth

A _________ ad is a thin, rectangular advertisement that is commonly placed across the top or on the sides of a web page.

banner

Any email address placed in the _________ will be invisible to the recipients of your message.

bcc

A _________ is a device that connects two LANs or two segments of the same LAN.

bridge

Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.

business intelligence

_________ is the discovery of new patterns or relationships between data.

data mining

A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.

domain name

Many types of software and devices use _________ to scramble your data or communication.

encryption

Human _________ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.

enhancement

A browser _________ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.

extension

Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

fair-use

Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material. TRUE/FALSE

false

Individuals who blow the whistle are often declared heroes by the public, but they typically lose their jobs and endure financial hardships due to the lack of whistleblower protection laws in the U.S. TRUE/FALSE

false

The HTTPS protocol in a URL indicates that the web page has been completed, sent, or loaded. TRUE/FALSE

false

The ability for UPS's website to remember your country/language selection is the result of its use of third-party cookies. TRUE/FALSE

false

The two parts of a packet are the certificate and the key. TRUE/FALSE

false

Which of the following is NOT a type of network topology?

fiber

A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

fluctuations

A mobile _________ refers to a device that can connect to a mobile network and offer Internet access to multiple devices near it.

hotspot

You will often find _________ on a web document that, when clicked, act as connectors to another document on the World Wide Web.

hyperlinks

A type of spyware known as _________ can record the individual keystrokes of a user.

keyloggers

Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.

mission critical

A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.

modem

Search _________, such as quotes and the minus sign, can narrow down the results provided by search engines.

modifiers

________ involves the creation or manipulation of matter at the smallest possible scale.

nanotechnology

Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

In the model known as _________, advertisers pay for their ads only when a website visitor clicks on the ad.

pay-per-click

A web _________ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.

portal

Computers that communicate over a network must follow certain _________ to ensure that the transmission is sent properly and understood.

protocols

Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

protocols

A _________ computer can represent data in states beyond the two bits (0's and 1's) of today.

quantum

A _________ is used to prevent attenuation when packets are traveling long distances.

repeater

Hackers often set up _________ in areas such as airports where users are expecting to find a free, wireless access point.

rogue hotspots

Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active?

sleep

A _________ specializes in developing plans and recommendations that meet the software and system needs of an organization.

systems analyst

Ethics involves a rational analysis of the voluntary, moral choices that individuals make. TRUE/FALSE

true

Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site. TRUE/FALSE

true

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name. TRUE/FALSE

true

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time.

ups

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

A(n) _________ is a collaborative information site that relies on the Internet community to both create and edit content.

wiki

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

worm


Ensembles d'études connexes

Chemical reactions study guide chapter 12

View Set

Introduction to Nutrition Chapter 3

View Set

Chapter 11 - Section 3 - The Plantation South

View Set