INFO 160

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

subject directory

A ________ is a structured outline of Web sites organized by topics and subtopics.

botnet

A large group of software programs that run autonomously on zombie computers is called ________.

metasearch engine

A(n) ________ actually searches other search engines rather than individual Web sites.

spider

A(n) ________ is the part of the search engine responsible for collecting data on the Web.

port

A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.

indexer

A(n) ________ organizes the data in search engine programs into a large database.

custom

A(n) ________ software installation allows you to decide which features you want to install on the hard drive.

encryption

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

plug-ins

Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.

RAM

All of the following can be used for backing up data files EXCEPT: RAM. flash drives. external hard drives. DVDs.

quarantine

Antivirus software segregates infected files to prevent further spread in a process known as

false

Bluesnarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an Internet connection. (T/F)

numbers

Computers process data into information by working exclusively with ________.

peripheral devices

Devices such as monitors and printers that are connected to the computer are called ________.

B2B

E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.

false

Each time you connect to the Internet, your computer is assigned the same IP address. (T/F)

True

Even a properly installed surge protector may fail to protect a computer from all power surges. (T/F)

hypertext transfer protocol

HTTP is the abbreviation for ________.

white-hat hackers

Hacker who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) are called ________.

script kiddies

Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called

top-level domain

In the URL http://www.prenhall.com, the portion labeled .com is the ________.

protocol

In the URL http://www.prenhall.com, the portion labeled http is the ________.

nonimpact

Inkjet printers and laser printers are examples of ________ printers.

false

Photocopiers do not present any vulnerability for potential hackers. (T/F)

templates

Predesigned forms that provide the basic structure for a particular kind of document are known as ________.

temporary

RAM is considered volatile storage, which means it is ________.

a warm boot

Restarting a computer when it is already powered on is called ________.

a spider, an indexer, and search engine software

Search engines have which three parts?

prior to installing new hardware or software

Setting a system restore point should be done ________.

engineering

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

programs

Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.

shareware

Software that is freely distributed but comes with conditions is

true

Some mice include wireless USB receivers that contain flash memory to store your files. (T/F)

keystroke loggers

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

secure socket layer

The "s" in https stands for ________.

DVI

The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.

...

The ________ is the top level of a computer's hard drive filing structure.

binary

The ________ language consists of just two digits: 0 and 1.

The Cold-War crisis

The concept of the Internet developed from ________.

nonvolatile

The hard disk drive is a ________ storage device, meaning that it stores data permanently.

keywords

The individual words you search for when using a search engine are referred to as ________.

system requirements

The minimum set of recommended standards for a program is known as the

thrashing

The term that defines excessive swapping of files between RAM and virtual memory is:

URL

The text version of a Web site's Internet address is called the ________.

false

To remove a program you no longer want, it's better to delete it than uninstall it.

True

VCU offers students server space for personal websites at ramsites.net. (T/F)

a trend of new Web applications that combine the functionality of multiple applications

Web 2.0 describes ________.

are not updated automatically

Webcasts differ from podcasts in that webcasts ________.

network interface card

What enables your computer to connect with other computers?

web-based application

What is another name for Software as a Service (SaaS)?

sophos

What is the free antivirus software available to all VCU students?

use applications uninstall program

When available, the best way to remove an unwanted software application is to ________.

...

When hackers use zombie computers to launch an attack on another computer or Web site, the attack is known as a

trojan horses

Which are programs that pretend to be a useful program but do something malicious on your computer?

PDF

Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?

ROM

Which holds the instructions the computer needs to start up?

subject directory

Which is NOT part of a search engine?

...

Which is the correct order of the boot process?

Plug-ins can present security risks.

Which is true about plug-ins?

...

Which of the following could be detected by antivirus software?

...

Which of the following is true about open source software?

Cookies obtain your personal information by searching your hard drive.

Which of the following statements about cookies is NOT true?

S-video

Which of the following ways of connecting a device to your computer does NOT need a cable?

Printers do not require power surge protection.

Which of the statements about protecting against power surges is FALSE?

One port can connect different types of devices

Which statement about USB ports is TRUE?

path

You can determine the location of a file by its

embedded

________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.

A DDoS attack

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

ROM

________ is a form of permanent memory that holds all the instructions the computer needs to start up.

ergonomics

________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

expansion cards

________ plug into slots on the motherboard and provide additional functionality for your computer.

system

________ software is the set of programs that enables the computer's hardware devices and application software to work together.

computer virus

a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files

encryption virus

a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files

polymorphic virus

a virus that changes its own code to avoid detection

worm

attempts to travel between systems through network connections to spread an infection

macro

automated sequence of commands in productivity software

system restore

brings system back to a previously stable state

error-checking

checks the hard drive for damaged files

spider

collects data on the Web, following links in Web sites

freeware

commercial software available at no charge

shareware

commercial software available for use for a limited or trial period of time

tracks

concentric circles on the hard drive

task manager

displays performance measures for processes

dpi

measurement of printer resolution

ppm

measurement of printing speed

subject directory

organized by topics

indexer

organizes search engine information into a database

suite

package containing multiple commercial software products

sectors

pie-shaped wedges on the hard drive

beta

prerelease version of commercial software

Disk Defragmenter

regroups related pieces of files on the hard disk

disk clean-up

removes unnecessary files from the hard drive

platters

round, thin plates of metal that make up a hard drive

clusters

smallest segments within disk sectors

Boolean

special word or symbol used to refine a search

resolution

the clearness or sharpness of an image

pixel

tiny dot that creates an image on the computer monitor

hertz

unit of measure for processor speed

keyword

used by search engines to determine what to look for


Ensembles d'études connexes

Chapter 47--Intestinal and Rectal Disorders

View Set

Medical Billing, Coding, and Insurance Chapter 2

View Set

Social Cognition-Implicit & Explicit attitudes

View Set

Google Analytics Individual Qualification

View Set