intro to computer science quiz 5&6
surge suppressor
a(n) __ is an inexpensive product that guards its appliances against large power spikes or surges that may infrequently occur , but does not provide protection against reduced or total loss of power
opt-out
a(n) __ option should be selected if you want a company not to share your information with anyone else or not to send you advertisements
B2B
a(n) __ transaction is one that takes place between companies; consumers are not involved
UPS
a(n) ___ functions as a battery backup and power conditioner for your computer
zombie
a(n) ___ is a compromised computer that is under external control , in many cases without the computers owners knowledge
trojan
a(n) ___ is a program that cannot self replicate and must rely on other methods for delivery. it usually disguised itself as something interesting useful or desirable in order to gain access to your system
worm
a(n) ___ is a program that self - replicates , but it is a fully contained program and it is not attached to a host file or service
vulnerability
a(n) ___ is a weakness anything that has not been protected and is open to harm
threat
a(n) ___ is anything that can cause harm in the context of computer security they can be as varied as a burglar, virus software , an earth quake or simple user error
self-employed person
a(n) ___ is responsible for determining how to asxo
packet
a(n) ____ is a transmitted network package
third party
a(n)__ cookie comes from a different web site than the one you are viewing , which commonly means they are provided by an advertiser in the site you are viewing
remote employee
a(n)___ has goals set by a manager and must conform to the company's performance requirements
virus
a(n)___ is software that is attached to a host such as a file or e-mail messages and has the ability to copy itself form one computer to another
hacker
a(n)___ is someone who uses a computer and network it internet connection to intrude into another computer or system to preform an illegal act
although there are several different major search engines, ____ has firmly established itself as a leader
web services
amazon __ provides a wide array of cloud computing services for small companies and large corporations and makes an especially compelling case for e- commerce and other types of business that are vulnerable to activity spikes tied to specific events or times
DDoS
an attempt to shut down or block access to a web site is known as a(n)___ attack
app
apples ___ store which hosts programs for the iphone i pod and i pad products reported more than 225,000 titles in its catalog as of mid 2010
hyperlink
as you read a web page on the browser screen you can click a word or a picture encoded as a(n) ___ and immediately jump to another location within the same document or to a different web page
accountability
business owners and managers may first balk at the idea of mobile office workers because there may appear to be a lack of __ when employees are not sitting at a desk in the office
1.8 billion
by the end of 2009, more than __ users were using the internet around the world
ring tones
cell and smart phones have a number of conditions where they are directed to okay a sound , and those sounds called ___ can be chosen by the user
backup
data ___ services focus simply on saving copies of files and allowing users to retrieve the data if needed
encryption
data___ is an ideal solution for keeping your information safe from all eyes but your own because it changes the data to make it completely undecipherable to anyone who does not have the exact key required to restore the data
auction
ebay is an example of a(n)__ site where buyers but on items posted by sellers
like
facebook users can click a(n) ___ button which is a facebook generated link that tags an item with a users approval
using the digital camera in a smart phone
how are the QR codes normally read
virtual office
if most of an organizations workforce is mobile it may set up a(n) ___. a work arrangement in which the company sets up minimal office services such as several cubicles, a conference room and a receptionist
identity theft
if someone impersonates you by using your name social security number or other personal information to obtain documents or credit in your name you are a victim of :
capture
in password ___ passwords are detected by a hacker as a user enters them
SPAM
junk e-mail is also known as :
copyright
many people and organizations are concerned about social media and ___ violations because people love to share information whether or not they own the legal rights to share it
open
mobile devices and networks alike have made it convenient to quickly connect, but you should be very cautious about joining ___ wireless networks
communication
mobile workers should ask about or experiment with the kinds of ___ that would be most welcome : phone calls , text messages , e-mail , teleconferencing
smart phones
much of the software related to mobile computing is for ___ and PDAs
banner
one of the common methods of advertising on web pages is the use of __ ads , thin rectangular advertising boxes commonly placed across the top of a web page
MMORPG
perhaps the most substantial use of the internet gaming is known by its abbreviation ___. creators of these games provide vast worlds to explore and conquer, allowing many and thousands of people to play the same game at the same time, interacting with each other or following their own path as they choose.
fluctuations
power __ may cause the strength of your electrical service to rise or fall
anti-malware
privacy attacks against smart phones are increasing in frequency and sophistication so you need __ software for your smart phone, just as you do for your PC
USA Patriot Act
the ___ extends the authority of law enforcement and intelligence agencies in monitoring private communications and access to your personal information
finical modernization act of 1999
the ___ requires companies to give consumers notice of their privacy and information- sharing practices
the ___ service allows people to transmit micro status messages up to 140 characters in length
WWW
the ___ was created as a method for incorporating footnotes, figures and cross references into online documents
spoofing
the category of hacking known as __ involves the attempt to deceive a computer user or system by providing false information in some way
awareness
the missing element in many problematic mobile computing scenarios is a sense of ___. being able to see ourselves from the outside and determine whether our behavior is appropriate for our surroundings
the only internet service used more frequently than the web is __ which is a system for exchanging messages through a computer network
interentworking
the process of connecting separate networks is called
ISP
to connect to the internet most individual users set up an account with a(n)___, a company that provides local or regional access to the internet backbone
VPN
to increase the security of your network connection, even if you are accessing unsecured Web sites , you can use a private , secure connection called a(n)___
JPG
wallpaper files are commonly in the ___ format
hypertext
what sets web pages apart from other documents is that they contain a special king of text called ___. which is a document text that is able to respond to user input and link to other objects
domain
when you register a(n) ___ name you gain the exclusive ability to use the same name as a URL
cookies
when you visit e-commerce sites , many of them store snippets of information in small files on your system known as :
be wary of providing your phone number to potential advertisers
which of the following is NOT a guideline for courteous mobile computing:
heat damage
which of the following is NOT a threat to your mobile hardware and data
skype
which of the following is NOT and example of a web browser ?
proper work space
which of the following is NOT one of the considerations that need to be evaluated in order to make sure that an employee is prepared to work effectively off site
avoid devices with small removable storage such as microSD
which of the following is NOT one of the guidelines for protecting your security web you use mobile computing devices
steep learning curve in creating the page
which of the following is NOT one of the reasons why some people dislike creating a web page on a social media site
pressure
which of the following is NOT one of the three " major enemies " of a computer system
software for workplace connectivity
which of the following is NOT one of the three categories of software for smart phones and PDAs:
central
with the advent of mobile computing tools, and the flexibility these brought to communication the __ business office model was challenged to change
power plan
you should set a(n)__ for your system when it is on and off battery power
P2P
A transfer design called ____ uses a distributed network that does not require a central server to manage files
FTP
Internet users can copy files from one computer to another by using a internet service called :
backbones
Private telecommunications companies built their own central network structures called ___, in order to distribute business and commercial information
poach
To ____ a wireless signal means to access a WiFi device whose owner accidentally left it without pass word protection
HTML
__ files contain the information to display web pages , using markup tags that identify headers paragraphs images and links
IM
__ is a type of chat software that restricts participation to specific users
StrongVPN
__ is an example of a personal VPN service
word press
__ is popular blog development program. it is free to download and use and it provides convenient tools for creating customizing and administering your blog site
SEO
__ is the process of analyzing web site contents and search results and determining the ideal configuration for a web site that will raise its position in search results
dumpster diving
__ is when thieves go through garbage to obtain canceled checks , credit card and utility statements or bank account information that someone has carelessly thrown out
social bookmarking
__ sites provide a way for participates to tag articles and web pages that they find interesting. the site then reports the relative popularity of web pages based on the opinions of its community
IRC
__ was one of the early methods used to chat in real time
Linkedln
__, with around 100 million users , is established as a business networking site for people to connect with colleagues , write recommendations for coworkers , collaborate to share expertise , and search for new professional opportunities
podcasts
___ are radio broadcast suitable for downloading to a portable music player
tags
___ are simple labels that help identify the subject of a bookmark. you can search them in your own list or throughout the entire delicious service to find bookmarks that are related to that topic
cloud
___ computing is the concept of using computers owned by service providers on the internet to for storage and program execution services
youtube
___ encourages users to upload videos of everything from a funny accident caught on cell phone to serious professionally produced presentations
web 1.0
___ focuses on providing information to users. universities , research facilities , governments , companies , and individuals create web sites and fill them with documents so that web users could view what was provided
hands-free
___ hardware allows the cell phone user to place calls without typing numbers and holding the headset
social media
___ includes the service and sites on the internet that allow people to create and share their ideas,thoughts, and lives
skype
___ is a VoIP company that offers the ability to lease a telephone number in countries around the world
data mining
___ is a businesses - intelligence - gathering process that every large organization from banks to grocery stores , employs to sift through computerized data
HTTP
___ is a detailed standard electronic communication defining an exact way that data is formatted and transferred back and forth between web browser and server
cyberterriorism
___ is a new form of warfare attacking the critical infrastructure system of a nation through the technology it uses
creative commons
___ is an organization working to find common ground between the producers are social media community by creating license that are designed to be more flexible than the traditional copyright license
linkedln
___ is designed with a strictly business oriented focus. most profile data is related to education professional experience and other items one would typically find on a resume
pay per click
___ means that advertisers pay for their ads only when a web site visitor clicks on the ad to go to the advertisers site
keylogging
___ programs which save a users keystrokes can be used not just by companies and individuals that want to monitor the detailed activity of people using computers that they own
Web 2.0
___ sites primarily feature user - generated content; instead of the owner providing documents, the owner simply provides a place for others to share their own material with others
blogging
___ sites provide a way for participants to produce anything from brief thoughts to long essays , and then publish their work for others to read
social networking
___ sites thrive not only on the information it's path islands list by also in the connections that are made between participants
CRM
___ software is another type of program that has fit naturally in a cloud environment because of the need to centralize appointments and customer contact information, and to support mobile sales and deskbound support stage with the same set of data
VoIP
___ translates analog voice signals into digital data and uses the internet to transport the data
ARPANET
a predecessor of the modern internet was ___ which was a network connecting computers at different universities and defense contractors
shoulder surfing
a trick known as ___ is as simple as watching someone enter personal identification information for a private transaction , such as an ATM
WCMS
a(n) __ is a software service that provides storage , usually in a data base , of the information to be displayed on a website , and a set of predefined display templates for the user