computer science final
Which operator is used to return search results that include two specific words?
AND
Wi-Fi networks used in homes and public hotspots use the ________.
IEEE 802.11
For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.
LAN
A router is a form of security because it ________.
acts like a firewall
You would install a(n) ________ if you wanted to enable new capabilities in your web browser.
add-on
When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
administrator
A moderated chat room ensures that _______.
all content is screened
Network speeds are measured in ______ per second.
bits
________ hackers hack into systems to steal or vandalize.
black-hat
A _____ is similar to an online journal, in which you can write about anything you want to share.
blog
To connect peripherals at short ranges, you would use the ________ wireless technology.
bluetooth
You can use a social ______ site to save and share your favorites online.
bookmarking
A ________ changes your home page and redirects you to other websites.
browser highjacker
A distorted series of letters and numbers, called a ______, is used to ensure that you are a human and not a computer.
captcha
_______ display the text of the audio in a video.
captions
A ______ network is one that has at least one computer that provides centralized management, resources, an security.
client-server
The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
computer fraud and abuse
______ is an example of asynchronous communication.
A data warehouse is used to discover relationships among data items.
false
A database controller (DBC) is a person who oversees database systems.
false
A decision support system is made up of a knowledge base and an inference engine.
false
A viral video is one that can infect your computer with malware.
false
A workgroup and a homegroup refer to the same network feature.
false
Adware does NOT affect your computer's performance.
false
Ethernet standards and equipment for your home LAN are different than those used in business
false
If the website is well designed, then the information on the site is probably credible.
false
Microsoft Excel is an example of a DBMS.
false
Network resources refer only to hardware and files.
false
Screen capture software requires a webcam to be able to capture a video of your screen.
false
Spyware is easy to remove from your computer.
false
The only program you need to fully protect your computer is a good antivirus program.
false
The top-level domain used by the government is .net.
false
Using a report to enter data into a database decreases the frequency of data entry errors.
false
When selecting a video camera, resolution is not an important feature to consider
false
A _______ can be set by an employer to prevent you from accessing eBay.
firewall
Portable media players use ________ to store music.
flash memory
________ make data entry easier because they can be set up to match the layout of a paper document.
forms
Camera shake can be reduced by using a camera that provides ________.
image stabilization
________ counteracts camera shake and allows you to take sharper images.
image stabilization
A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.
inference engine
A database is a collection of ________ that has been organized in a meaningful way.
information
Each computer is considered equal in a ______ network.
peer-to-peer
________ redirects you to a phony website by hijacking a domain name.
pharming
The ________ database is the most popular type used by businesses.
relational
To print data or display it in an easy-to-read format, a ________ can be used.
report
One disadvantage to e-ink technology is that it ________.
requires an external light for night reading
In a database, a ________ stores data in rows and columns.
table
________ photos allows you to locate them more easily in the future.
tagging
You would check ________ for images that are not copyrighted.
the commons
Which of the following is NOT used to transmit signals on an Ethernet network?
topology
A browser plug-in is a third-party program, such as Adobe Reader.
true
A captcha is a series of distress letters and numbers that difficult for automated software to read but relatively easy for humans to read.
true
A codec is a compression algorithm that reduces the size of a digital media file.
true
A company releasing a new product could use a Facebook Page to promote its release.
true
A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program
true
A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment.
true
A firewall can be implemented using hardware or software.
true
A firewall can be used to shield your computer from direct access to the internet.
true
A hotfix resolves individual software problems as they are discovered.
true
A hybrid network in which several LANs are connected together can be called a Campus Area Network.
true
A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.
true
A peer-to-peer network can connect a Linux computer and a Windows PC.
true
A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
true
An e-reader is a specialized form of a tablet.
true
Another name for a bot is a zombie.
true
Antispyware software prevents adware software from installing itself on your computer.
true
Asynchronous online communication technology lets you send a message that the receiver can access later.
true
Fiber networks use optical network terminals to connect to the internet.
true
Firewalls can be implemented by hardware and/or software.
true
In a network, a file can be an example of a resource.
true
Internet2 is much faster than the Internet because it has a fiber optic backbone.
true
MP3 players are ideal for high-impact activities because they do not contain any moving parts.
true
Mobile browsers are optimized to be viewed on small screens.
true
One advantage of using domain is that you only have to log in one time to obtain access to all servers within that domain.
true
One of the advantages of using a wire network connection rather than a wireless network connection is speed
true
One of the main e-readers is the Amazon Kindle.
true
One way to access email is to read it online through a webmail interface.
true
Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
true
Search engine optimization (SEO) is used to make a website easier to find.
true
Social networks have change TV watching from a passive experience to an active, social experience.
true
Stand-alone video cameras provide better quality video than the video mode on your cell phone.
true
Standards ensure that equipment made by different companies work together.
true
TLDs often represent the type of website that is being visited.
true
The 4G cellular network standard includes WiMAX Mobile Internet technology.
true
Two wireless devices that are directly connected to each other form an ad hoc network.
true
User-generated content refers to the fact that anyone can put content on the web.
true
When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle.
true
Windows Defender is antimalware software built-in to Microsoft operating systems.
true
Worms spread over network connections without any help from users.
true
You should be wary about entering your credit car number into website whose URL does not begin with https.
true
To secure your wireless network at home, you should ________.
uses wireless encryption with a difficult passphrase
When a company pays people to hack into its own system, it calls in ________ hackers.
white-hat
In a WLAN, devices are connect by _______.
wi-fi
_______ is the largest online video-hosting site in the world.
youtube
________ is the most popular video-sharing service on the Internet.
youtube
Which organization coordinates the Internet naming system?
ICANN
74.125.224.72 is an example of a(n) ________
IP address
________ mode enables you to take several pictures in quick succession by holding down the shutter button
burst
A(n) ________ improves over time by learning from its interactions.
cognitive computing system
An MP3 file is about one-half the size of a music file on a CD.
false
Asynchronous communication happens in real-time with two or more people online at the same time.
false
Data travels in both directions in a ring topology.
false
Once a file is compressed using lossy compression, it can be fully restored to its original raw format.
false
PAN stands for Public Area Network.
false
Pandora is the most popular web browser for people using Macs.
false
Podcasts can be either radio-like or TV-programs that are aired live on the in the internet
false
Point-and-shoot cameras do not have to worry about shutter lag.
false
Resolution refers to the distance at which a subject in front of the lens is in sharp focus.
false
Satellite broadband service speeds are comparable to those of cable
false
The United States government developed the naming system for the Internet.
false
The only authority responsible for investigating cybercrime in the United States is the FBI.
false
The original use of the Internet was to conduct business between corporations and its customers.
false
The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.
false
The unauthorized use of your neighbor's wireless network is called trolling.
false
In a database, title, author, publication date, and ISBN are examples of ________
fields
An Excel spreadsheet is an example of a(n) ________ database.
flat
Which of the following is NOT a video streaming service?
flickr
________ is the largest online image-sharing site in the world.
flickr
The distance at which subjects in front of the lens are in sharp focus is known as a camera's ________.
focal length
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
phishing
When you decide to use your neighbor's open wireless network without permission, you are _______.
piggybacking
A fixed-focus camera is good for objects within a specific distance.
true
A search engine is essentially a large database of indexed webpages.
true
A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
true
A smartphone is a multifunction device that blends phone, PDA, and portable media player features.
true
A telephoto lens is used to zoom in on an object.
true
AAC files produce higher quality music than MP3 files.
true
ARPANET is the name first given to the Internet.
true
All computers in a P2P network belong to a workgroup.
true
All the computers connected to the Internet are given a unique IP address.
true
An autofocus camera mechanically adjusts the focal length by moving the lens in or out.
true
Bluetooth technology connects peripherals wirelessly at short ranges.
true
By using tabbed browsing, you can have multiple home pages.
true
Compact system cameras are also known as mirrorless cameras.
true
Compact system cameras are also known as superzooms.
true
Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.
true
Cyber-harassment is defined as cyberbullying between adults.
true
Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
true
DSL is normally slower than cable Internet access.
true
Dial-up Internet access is the slowest type of Internet connection.
true
Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.
true
Emojis are small images that represent facial expressions, common objects, and people and animals.
true
Encryption converts plain text into ciphertext.
true
FTTH uses fiber-optic cables.
true
Google has a search tool called Google Scholar that you can use for research.
true
Having quick access to features in a browser is often done through a browser toolbar.
true
If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal.
true
In a bus topology, date travels along a single cable that is terminated at both ends.
true
In a virtual world, you can select an avatar as a virtual body.
true
It is recommended that you have more than one web browser installed on your computer.
true
Once a computer is infected, a virus can use an email program to send out copies of itself.
true
The HTTP protocol requests and delivers webpages.
true
The IEEE 802.11 standards are used in wi-fi networks found in homes and public hotspots.
true
The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.
true
The Integrated Automated Fingerprint Identification System is considered to be a biometric database.
true
The National Missing Person DNA database is part of the CODIS system.
true
The OR operator is used to return results that include either of two specific words.
true
The Subject line of an email message helps the recipient know what the message is going to be about.
true
The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
true
The geographic information system combines layers of geographically referenced information about Earth's surface.
true
The physical layout of an LAN is called its topology
true
The primary key field uniquely identifies a record in a table.
true
The resolution of a camera is calculated by multiplying the length by the width of the image in pixels.
true
Twitter is an example of a microblogging site.
true
Using the Boolean operator NOT means the results must include the first word but cannot include the second word.
true
VolP uses the internet to transmit calls instead of phone lines or cellular towers.
true
WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.
true
When designing a database, you should have separate fields for a person's first and last names.
true
When information is duplicated in multiple places, it is known as data redundancy.
true
You can use a wide-angle lens for shooting an image such as a landscape.
true
You can use geotagging to add location information to a digital photo.
true
When one business provides services for another, it is a type of e-commerce called _____
B2B
When you buy a textbook online from Amazon.com, you are participating in _______ e-commerce.
B2C
When sending one email to everyone in your address book, you should use the ______ field to keep their addresses private.
Bcc
________ e-commerce allows anyone to sell or trade items online.
C2C
By default, Windows computers are set to obtain an IP address automatically, using ______.
DHCP
The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72.
DNS
Which type of camera would be the best choice for a photographer who prefers to manually adjust the focus and exposure for each image?
DSLR
________ is the authoring language that defines the structure of a webpage.
HTML
The 4G network standard includes ________ technologies.
LTE
MP3 stands for ________.
MPEG-1 Audio Layer 3
Which of the following is NOT a SQL relational keyword?
QUIT
You can subscribe to ______ feeds to stay up-to-date on podcasts and news feeds.
RSS
_______ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.
SEO
When you set up your wireless router, you should change the ________, which is also called the wireless network name.
SSID
.com is an example of a(n) ________.
TLD
Employees who are traveling can connect securely to their office network through the internet when a _______ had been established.
VPN
A company with offices in Buffalo and Seattle would use dedicated _______ lines to connect the two offices.
WAN
What is the Internet backbone?
a high-speed connection between networks
One of the most important reasons for Ethernet standards is it __________.
assures equipment from different manufacturers is compatible
______ communication allows you to send a message that the receiver can access later.
asynchronous
The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.
atomicity
In a virtual community, you can communicate with other people by using a(n).
avatar
________ is the application of information technology to the field of biology.
bioinformatics
Wikis are designed for _________, which is allowing people to contribute more than just posting a response.
collaboration
An email claiming that you have won a lottery might be an example of ________.
computer fraud
_______ raises money from multiple small investors rather than a few large ones.
crowdfunding
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ______.
crowdsourcing
The cyberbullying of one adult by another adult, using a computer is known as ________.
cyber-harassment
Which cybercrime is considered to be a form of harassment?
cyber-stalking
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
cyber-terrorism
The Internet was originally created as a communication system for the ________.
department of defense
A GIS can be used by local municipalities to ________.
design emergency routes
The least expensive form of Internet connection is ________.
dial-up
A data ________ defines the fields in a database and the type of data that each field contains.
dictionary
All the information someone can find out about you by searching the web is called your ______.
digital footprint
A _______ is a network composed of a group of clients and servers under the control of one central security database.
domain
In the URL http://www.irs.gov, irs is the ________.
domain name
________ printers produce lab-quality prints of your photos.
dye-sublimation
_______ is one of the most popular C2C websites.
eBay
What CANNOT be done with most video editing software?
edit pictures created in the software
Today, the backbone of the Internet is composed of numerous Internet ________ Points around the world.
exchange
A DBMS will define a data type for you by evaluating the data currently entered into the fields.
false
A black-hat hacker attempts to find security holes in a system to prevent future hacking.
false
________ adds location information to digital photos.
geotagging
Hacking to make a political statement is called ________.
hacktivism
The # symbol used by Twitter is called a ______
hashtag
Which of the following is NOT a common LAN topology.
hierarchical
P2P networks are normally found in __________.
homes
Wireless access points that are available in public spaces are called ________.
hotspots
When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
https
What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?
human genome project
________ allows you to sync your photos between your iPhone and your Mac.
iCloud
Which is a type of data that can be stored in an object-oriented database?
images, audio, and video
Which is NOT an advantage of data normalization?
increases database development time
Which of the following is a method of synchronous online communication?
instant messaging
______ allows you to communicate with one person at a time.
instant messaging
The ________ was created to make it easier for victims to report cybercrimes.
internet crime complaint center
Which statement about a logic bomb is FALSE?
it can spread to other machines
A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.
layers
_____ is a social network that is designed for business connections
In an office acceptable use policy (AUP), which of the following might be prohibited?
logging in to eBay
To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.
lookup
An expert system is a computer programmed to ________.
make decisions in real-life situations
The collection of websites that enable users to create user-generated content, connect, network, and share is called social _______
media
Smartphones have the ability to download additional programs, called ________, to extend their capabilities, making them convergence devices.
mobile applications
Data in a ________ database are stored in data cubes.
multidimensional
The total zoom available on a camera is determined by digital zoom ________ optical zoom.
multiplied by
Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.
municipal
When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.
network
The science and telecommunications industries would most likely use the ________ database type.
object-oriented
Microsoft Office is an example of a(n) ________.
office support system (OSS)
In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.
one-to-many
________ allows the user to selectively extract data from different viewpoints.
online analytical processing (OLAP)
Which would be the strongest password?
p@55W0?d
A Facebook ______ is used to promote an organization, a product, or a service.
page
_____ recommends music to you based on your listening preferences.
pandora
Another name for the actual attack caused by a virus is a ________.
payload
A ________ network is a network in which all computers are considered equal.
peer-to-peer
A third-party program, such as Adobe Flash Player, is considered to be a(n) ________
plug-in
Basic ________ cameras are easy to use, but most do not have a viewfinder to help you frame an image.
point-and-shoot
In a one-to-one relationship, both tables use the same ________ to link two records.
primary key
In the URL http://www.irs.gov, http is the ________
protocol
The rules for communication between network devices are called _______.
protocols
A ________ could be used to retrieve all the phone numbers from a student database.
query
A ________ contains the information for a single entity in the database.
record
Which of the following is an example of a social news site?
A digital camera's image quality is determined by the camera's ________.
resolution
If your computer has a ________, someone else can gain access to it undetected.
rootkit
A _______ is a device that connects two or more networks together.
router
A ________ connects two or more networks together.
router
If you want to connect your home network to the internet you will need a __________ in addition to a modem.
router
Which device on a network performs network address translation?
router
Which broadband service are you likely to use if you live in a very remote area?
satellite
The s in https stands for ________.
secure
Podcasts allow time _______, so you can listen on your own schedule.
shifting
The time between a person pressing the button and the camera taking the picture is called ________.
shutter lag
Antivirus software uses ________ to search for known viruses.
signature checking
An email _____ is a block of text that is automatically put at the end of your messages.
signature line
Using social media sites to sell services is called ______.
social media marketing (SMM)
You should use a(n) ________ account for everyday computing on a computer running Windows.
standard
_______ technology is used for sending email messages.
store-and-foward
Which would make the best primary key in a table?
student ID
A _______ is a device that connected multiple devices on a LAN.
switch
Most home routers also include a built-in _______.
switch
What was the ARPANET?
the origins of the internet
Which of the following statements about P2P networks is FALSE?
the services and security are centralized
Which statement about smartphones is FALSE?
they are limited to the programs already installed during production
What is NOT true about pop-up blockers?
they are triggered by cookies
Which statement about cookies is FALSE?
they cannot collect information you do not want to share
Which of the following is an industry standard that enables a camera to connect directly to a printer?
thunderbolt
Adding a browser ________ gives you quick access to the features of the application that installed it.
toolbar
The FTP protocol is used to ________.
transfer files
A ________ appears to be a legitimate program, but is actually something malicious.
trojan horse
A social bookmarking site allows you to share your bookmarks with others online
true
A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.
true
One way to display the data in a table is by creating a report.
true
Phishing and pharming attempts are successful because they appear to be from legitimate websites.
true
Podcasts are prerecorded radio- and TV-like shows you can download and listen to or watch any time.
true
A data ________ rule would prevent a user from entering text in a date/time field.
validation
Which is NOT a CODIS index?
victims
The difference between a virus and a worm is a ________.
virus needs a host file, but a worm does not
Moving through a neighborhood trying to locate open wireless access points is called ___________.
wardriving
The tools that allow users to create content and have changes the way people communicate and collaborate on the web are known as:
web 2.0
Programs that interpret HTML to display webpages are called ________.
web browsers
________ provide the ability to carry on two-way visual communication with people in different locations
webcams
According to the text, which of the following is NOT typically one of the important features when selecting a digital camera?
weight