Computer Science test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Malicious software

Malware

_______ is software intended to do harm to a computer connected to the Internet

Malware

_______ is the choice of disapproving to use of information

Opt Out

______ is the choice of approving to a use of information

Opt in

______ refers to the relationship between computers that are communicating over the Internet where each of the computers--yours and someone else's--is a "file server" for the other

Peer-2-peer

A(n) _____ is a light-sensitive material used to make a chip.

Photoresist

Programming languages are most helpful to programmers because they are ____

Precise

The______ limits the government's ability to interfere with people's privacy.

Privacy Act of 1974

A(n) ________ is published by the receiver and used by the sender to encrypt messages.

Public key

The ______ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date.

Quality

The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms.

RSA129

Malware that directly manipulates operating system tables to hide is presence is known as______.

Rockit

_______ communication involves message exchange in which the content is encrypted to keep it private.

Secure

The ability to control when ______ do and don't conduct electricity is the main process used in computer construction.

Semi conductor.

What encryption algorithm requires the use of a secret key know to both the sender and the receiver?

Symmetric

________, the practice of a Web site automatically sending details about your visit to other content providers, is an emerging problem of concern to privacy experts.

Tracking

A(n) ______ is a connector between two wires that controls whether they are electrically connected.

Transistor

A ______ is a computer program that, unbeknownst to the user, contains code that performs malicious attacks

Trojan horse

A company can place a cookie on your computer even if you've never visited its Web site.

True

Americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purpose and Security.

True

Android, an open source OS, and Apples, iOS are examples of operating systems for mobile devices

True

Computer can only execute instructions; therefore, rerunning a program with the same data produces exactly the same result every time

True

Cookies can be used to track ad placement on Web sites.

True

Each byte in memory is limited in size

True

Emptying the trash is no guarantee that the data has been erased.

True

Every memory location in the computer is numbered, starting at 0.

True

Hyperlinks have two parts: the part you read and the part the computer reads--the actual place you will go to when you click the link.

True

Identity theft is the crime of posing as someone else for fraudulent purposes.

True

In contrast to the "omnibus" solution of adopting the OECD list, the United States uses an approach called "sectoral", meaning that it passes laws to deal with specific industries (business sectors) or practices.

True

In the United States, the protection of an individual's privacy is the responsibility of the government.

True

Information is generated when buying goods and services at a store.

True

Modern browsers let you control the cookie policy for your computer.

True

Non-EU countries that want information on EU citizens must show that they have privacy laws consistent with the OECD principles.

True

Partial backups should be made more often than full backups.

True

Starting a computer is calling booting.

True

The United States has not adopted the OECD principles

True

The United States provides limited enforcement of OECD privacy principles.

True

The fear of computers taking over the world has died down since the 1950's and 1960's.

True

The laws protecting the information of individuals place more limits on the government than on business.

True

The purpose of encryption is to allow private transmission and storage of sensitive information.

True

Viruses often distributed through email attachments.

True

The method by which malware gets into your computer is known as_____of attack.

Vactors

______ is a computer program that infects a host computer and then spreads

Virus

LOOP A

Will repeat the following instructions A times until ending, and exiting

A ______ can send copies of itself to other nodes on a computer network without having to be carried by an infected host file

Worm

In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ________.

Zombies

END

ends loop, and you can proceed or stop

Due to its simplistic design, Microsoft's Vista operating system reportedly contained fewer than 4,000 lines of program code when it was released in 2007.

false

a megabyte is exactly one million bytes

false

computer memory is divided into bytes of 9 bits

false

the ADD instruction adds the values, not the address numbers of the memory locations

false

The ability to create software by combining other software is known as______.

functional composition

Programs and their data must reside in the computer's ______ when programs run.

memory

A(n) _____ starts the computer, manages memory, and controls the peripherals

operating system

Data Fetch gets the values, called _____, from memory that the ALU needs to perform operations like ADD and MULTIPLY

opperands

_____ write the instructions for a computer

programmer

Computers have instructions for both transforming and ______ information

transferring

the ability to store different values in its memory locations makes the computer a flexible tool.

true

(operator operand 1 operand 2)

(+12 53) #add 12 to 53

_______ is simply an alternative form of machine language expressed using letters and normal numbers so people can understand it.

Assembly language

What algorithm has a key for encryption and decryption that are quite different but related?

Asymmetric

The common name for an integrated circuit is a computer ______

Chip

The rate of the Fetch/Execute Cycle is determined by the computer's _______.

Clock

A(n)_____ is information stored on a Web client computer by an HTTP server computer.

Cookie

What is the science of "secret writing"?

Cryptography

_____ is the process of recovering encrypted cipher text.

Decryption

_______ is the reversing encryption process

Decryption

Every peripheral communicates with the computer through a(n)_____.

Device driver

_____, considered by many to be the world's first electronic computer, was created by J. Presper Eckert and John Mauchly of the University of Pennsylvania.

ENIAC

______ is transforming representation so it is no longer understandable.

Encryption

"Opt-in" means the business can use it unless the person explicitly prohibits the new use.

False

A field effect transistor is a connector between two wires that can be controlled to allow a charge to flow between the wires (conduct) or not.

False

A passage is the path in a semiconductor where electricity travels.

False

A single device driver will generally work with serveral different peripheral devices.

False

A third-party cookie is initiated by a direct request by the user.

False

American privacy laws are much stricter than European laws

False

Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States.

False

Messages encrypted using a public key RSA129 cryptosystem code have not yet been cracked.

False

Miniaturization is the biggest achievement of microchip technology.

False

Personal computer can only be backed up to another hard disk.

False

The Do-Not-Call List was so successful that it has now been applied to email.

False

The difference between a worm and virus is the the worm program "rides along" with other software, while the virus can actually send itself to other devices on the internet.

False

The vast majority of business transactions are anonymous.

False

The _____ Cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.

Fetch/Execute

A(n)______ is a force one object can have on another without touching it.

Field effect

A(n) ______ is a barrier between two computers on a network, or between the Internet and a personal computer.

Firewall

+-*/

Four operator OAMPL supports

Recovery after a disaster involves installing the most recent ________ backup copy.

Full

______ and _____ entities are the two biggest threats to privacy

Government and Business

____ ______ takes password the user originally chooses, chops it up, and stirs it around according to a given formula

Hash function

C, C++ and Java are all examples of a(n) ______ programming language

High-level

______ is the crime of posing as some else for fraudulent purposes.

Identity theft

Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be "made more secure" simply by ________ the size of the key.

Increasing

The process of executing a program is called _______.

Instruction interpretation

IC is short for ____ _____

Integrated circuit

Most Americans wrongly assume that their privacy regarding business information is restricted to _______.

Internal use

ALU is short for _____

arithmetic/logic unit

Programs written in a high-level language are ______, i.e., translated, into assembly language programs, which are then assembled into binary.

compiled

A(n) ______ is an "instruction execution engine" , cycling through a series of operations, performing an instruction on each round.

computer

The ______ is the part of the computer that gets instructions from memory and carries them out.

control unit


Ensembles d'études connexes

Unit 2: Fiduciary Duties Unit Exam

View Set

ATI Adult Medsurg Ch. 72- Osteoporosis and Low-Back Pain

View Set

OB midterm chapters 1,2,3,10,11,12,19,20,21,13,14

View Set

NURS 202 Final Exam prep (Quiz ?'s & mainly..Modules 1-3, 6/7)

View Set

OCE1001 Chapters 1-4 Combined (3)

View Set

ATI Exit Exam #2 version of comprehensive retake test

View Set