intro to computer science quiz 5&6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

surge suppressor

a(n) __ is an inexpensive product that guards its appliances against large power spikes or surges that may infrequently occur , but does not provide protection against reduced or total loss of power

opt-out

a(n) __ option should be selected if you want a company not to share your information with anyone else or not to send you advertisements

B2B

a(n) __ transaction is one that takes place between companies; consumers are not involved

UPS

a(n) ___ functions as a battery backup and power conditioner for your computer

zombie

a(n) ___ is a compromised computer that is under external control , in many cases without the computers owners knowledge

trojan

a(n) ___ is a program that cannot self replicate and must rely on other methods for delivery. it usually disguised itself as something interesting useful or desirable in order to gain access to your system

worm

a(n) ___ is a program that self - replicates , but it is a fully contained program and it is not attached to a host file or service

vulnerability

a(n) ___ is a weakness anything that has not been protected and is open to harm

threat

a(n) ___ is anything that can cause harm in the context of computer security they can be as varied as a burglar, virus software , an earth quake or simple user error

self-employed person

a(n) ___ is responsible for determining how to asxo

packet

a(n) ____ is a transmitted network package

third party

a(n)__ cookie comes from a different web site than the one you are viewing , which commonly means they are provided by an advertiser in the site you are viewing

remote employee

a(n)___ has goals set by a manager and must conform to the company's performance requirements

virus

a(n)___ is software that is attached to a host such as a file or e-mail messages and has the ability to copy itself form one computer to another

hacker

a(n)___ is someone who uses a computer and network it internet connection to intrude into another computer or system to preform an illegal act

google

although there are several different major search engines, ____ has firmly established itself as a leader

web services

amazon __ provides a wide array of cloud computing services for small companies and large corporations and makes an especially compelling case for e- commerce and other types of business that are vulnerable to activity spikes tied to specific events or times

DDoS

an attempt to shut down or block access to a web site is known as a(n)___ attack

app

apples ___ store which hosts programs for the iphone i pod and i pad products reported more than 225,000 titles in its catalog as of mid 2010

hyperlink

as you read a web page on the browser screen you can click a word or a picture encoded as a(n) ___ and immediately jump to another location within the same document or to a different web page

accountability

business owners and managers may first balk at the idea of mobile office workers because there may appear to be a lack of __ when employees are not sitting at a desk in the office

1.8 billion

by the end of 2009, more than __ users were using the internet around the world

ring tones

cell and smart phones have a number of conditions where they are directed to okay a sound , and those sounds called ___ can be chosen by the user

backup

data ___ services focus simply on saving copies of files and allowing users to retrieve the data if needed

encryption

data___ is an ideal solution for keeping your information safe from all eyes but your own because it changes the data to make it completely undecipherable to anyone who does not have the exact key required to restore the data

auction

ebay is an example of a(n)__ site where buyers but on items posted by sellers

like

facebook users can click a(n) ___ button which is a facebook generated link that tags an item with a users approval

using the digital camera in a smart phone

how are the QR codes normally read

virtual office

if most of an organizations workforce is mobile it may set up a(n) ___. a work arrangement in which the company sets up minimal office services such as several cubicles, a conference room and a receptionist

identity theft

if someone impersonates you by using your name social security number or other personal information to obtain documents or credit in your name you are a victim of :

capture

in password ___ passwords are detected by a hacker as a user enters them

SPAM

junk e-mail is also known as :

copyright

many people and organizations are concerned about social media and ___ violations because people love to share information whether or not they own the legal rights to share it

open

mobile devices and networks alike have made it convenient to quickly connect, but you should be very cautious about joining ___ wireless networks

communication

mobile workers should ask about or experiment with the kinds of ___ that would be most welcome : phone calls , text messages , e-mail , teleconferencing

smart phones

much of the software related to mobile computing is for ___ and PDAs

banner

one of the common methods of advertising on web pages is the use of __ ads , thin rectangular advertising boxes commonly placed across the top of a web page

MMORPG

perhaps the most substantial use of the internet gaming is known by its abbreviation ___. creators of these games provide vast worlds to explore and conquer, allowing many and thousands of people to play the same game at the same time, interacting with each other or following their own path as they choose.

fluctuations

power __ may cause the strength of your electrical service to rise or fall

anti-malware

privacy attacks against smart phones are increasing in frequency and sophistication so you need __ software for your smart phone, just as you do for your PC

USA Patriot Act

the ___ extends the authority of law enforcement and intelligence agencies in monitoring private communications and access to your personal information

finical modernization act of 1999

the ___ requires companies to give consumers notice of their privacy and information- sharing practices

twitter

the ___ service allows people to transmit micro status messages up to 140 characters in length

WWW

the ___ was created as a method for incorporating footnotes, figures and cross references into online documents

spoofing

the category of hacking known as __ involves the attempt to deceive a computer user or system by providing false information in some way

awareness

the missing element in many problematic mobile computing scenarios is a sense of ___. being able to see ourselves from the outside and determine whether our behavior is appropriate for our surroundings

e-mail

the only internet service used more frequently than the web is __ which is a system for exchanging messages through a computer network

interentworking

the process of connecting separate networks is called

ISP

to connect to the internet most individual users set up an account with a(n)___, a company that provides local or regional access to the internet backbone

VPN

to increase the security of your network connection, even if you are accessing unsecured Web sites , you can use a private , secure connection called a(n)___

JPG

wallpaper files are commonly in the ___ format

hypertext

what sets web pages apart from other documents is that they contain a special king of text called ___. which is a document text that is able to respond to user input and link to other objects

domain

when you register a(n) ___ name you gain the exclusive ability to use the same name as a URL

cookies

when you visit e-commerce sites , many of them store snippets of information in small files on your system known as :

be wary of providing your phone number to potential advertisers

which of the following is NOT a guideline for courteous mobile computing:

heat damage

which of the following is NOT a threat to your mobile hardware and data

skype

which of the following is NOT and example of a web browser ?

proper work space

which of the following is NOT one of the considerations that need to be evaluated in order to make sure that an employee is prepared to work effectively off site

avoid devices with small removable storage such as microSD

which of the following is NOT one of the guidelines for protecting your security web you use mobile computing devices

steep learning curve in creating the page

which of the following is NOT one of the reasons why some people dislike creating a web page on a social media site

pressure

which of the following is NOT one of the three " major enemies " of a computer system

software for workplace connectivity

which of the following is NOT one of the three categories of software for smart phones and PDAs:

central

with the advent of mobile computing tools, and the flexibility these brought to communication the __ business office model was challenged to change

power plan

you should set a(n)__ for your system when it is on and off battery power

P2P

A transfer design called ____ uses a distributed network that does not require a central server to manage files

FTP

Internet users can copy files from one computer to another by using a internet service called :

backbones

Private telecommunications companies built their own central network structures called ___, in order to distribute business and commercial information

poach

To ____ a wireless signal means to access a WiFi device whose owner accidentally left it without pass word protection

HTML

__ files contain the information to display web pages , using markup tags that identify headers paragraphs images and links

IM

__ is a type of chat software that restricts participation to specific users

StrongVPN

__ is an example of a personal VPN service

word press

__ is popular blog development program. it is free to download and use and it provides convenient tools for creating customizing and administering your blog site

SEO

__ is the process of analyzing web site contents and search results and determining the ideal configuration for a web site that will raise its position in search results

dumpster diving

__ is when thieves go through garbage to obtain canceled checks , credit card and utility statements or bank account information that someone has carelessly thrown out

social bookmarking

__ sites provide a way for participates to tag articles and web pages that they find interesting. the site then reports the relative popularity of web pages based on the opinions of its community

IRC

__ was one of the early methods used to chat in real time

Linkedln

__, with around 100 million users , is established as a business networking site for people to connect with colleagues , write recommendations for coworkers , collaborate to share expertise , and search for new professional opportunities

podcasts

___ are radio broadcast suitable for downloading to a portable music player

tags

___ are simple labels that help identify the subject of a bookmark. you can search them in your own list or throughout the entire delicious service to find bookmarks that are related to that topic

cloud

___ computing is the concept of using computers owned by service providers on the internet to for storage and program execution services

youtube

___ encourages users to upload videos of everything from a funny accident caught on cell phone to serious professionally produced presentations

web 1.0

___ focuses on providing information to users. universities , research facilities , governments , companies , and individuals create web sites and fill them with documents so that web users could view what was provided

hands-free

___ hardware allows the cell phone user to place calls without typing numbers and holding the headset

social media

___ includes the service and sites on the internet that allow people to create and share their ideas,thoughts, and lives

skype

___ is a VoIP company that offers the ability to lease a telephone number in countries around the world

data mining

___ is a businesses - intelligence - gathering process that every large organization from banks to grocery stores , employs to sift through computerized data

HTTP

___ is a detailed standard electronic communication defining an exact way that data is formatted and transferred back and forth between web browser and server

cyberterriorism

___ is a new form of warfare attacking the critical infrastructure system of a nation through the technology it uses

creative commons

___ is an organization working to find common ground between the producers are social media community by creating license that are designed to be more flexible than the traditional copyright license

linkedln

___ is designed with a strictly business oriented focus. most profile data is related to education professional experience and other items one would typically find on a resume

pay per click

___ means that advertisers pay for their ads only when a web site visitor clicks on the ad to go to the advertisers site

keylogging

___ programs which save a users keystrokes can be used not just by companies and individuals that want to monitor the detailed activity of people using computers that they own

Web 2.0

___ sites primarily feature user - generated content; instead of the owner providing documents, the owner simply provides a place for others to share their own material with others

blogging

___ sites provide a way for participants to produce anything from brief thoughts to long essays , and then publish their work for others to read

social networking

___ sites thrive not only on the information it's path islands list by also in the connections that are made between participants

CRM

___ software is another type of program that has fit naturally in a cloud environment because of the need to centralize appointments and customer contact information, and to support mobile sales and deskbound support stage with the same set of data

VoIP

___ translates analog voice signals into digital data and uses the internet to transport the data

ARPANET

a predecessor of the modern internet was ___ which was a network connecting computers at different universities and defense contractors

shoulder surfing

a trick known as ___ is as simple as watching someone enter personal identification information for a private transaction , such as an ATM

WCMS

a(n) __ is a software service that provides storage , usually in a data base , of the information to be displayed on a website , and a set of predefined display templates for the user


Ensembles d'études connexes

Quiz 6: Learning and Conditioning

View Set

Psych/Mental Health: Psychobiology & Psychopharmacology

View Set

Estructuras de organización y organigramas

View Set

MGMT 310 - Chapter 6 Homework Questions

View Set

hw 13 lymphatic/immune 2 for exam 3

View Set

Adaptive Learning Assignment-Monopolistic Competition and Oligopoly

View Set

Nervous System 1 - Part 2 - Lecture 11

View Set

Unit 1: Civil Lit (pretrial) (okrent), Unit 2: Civil Litigation ( Trial and Appeal) (okrent), Unit 3 Criminal Law and Procedure, Unit 4 Constitutional Law (okrent), Unit 5 Administrative Law (okrent), Unit 6 Torts and Personal injury (okrent), Unit 7...

View Set