Quiz: 3e

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

___ allows you to store your files and use various applications in an online account.

cloud computing

A(n) ___ utility can scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

encryption

___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.

ethics

The scam referred to as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

social engineering

One or more computer programs that are packaged together for a unified purpose are known as:

software

Which type of software is used for entering, calculating, and analyzing sets of numbers?

spreadsheet

Which type of malware is designed to report activity on your computer to another party?

spyware

A designation of ___ means that a blank optical disc can be recorded to only once.

-R

All of the cloud applications below would allow you to share and collaborate on documents and lists EXCEPT:

Amazon Cloud

Which of the following is NOT an example of solid state storage?

BD-XL

Which of the following units is represented as an on (1) or off (0) value?

Bit

Which type of software aids architects, engineers, and many others who need to create a digital model of an object?

CAD

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

The ___ of a website or forum contains common questions and their responses.

FAQ

Which of the following units is the smallest?

Kilobyte

___ file sharing uses a distributed network of individual users instead of a central server to transfer files.

P2P

Which of the following "new social challenges" was NOT mentioned by the author?

Performing in-class research with a smartphone

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?

Trojan horse

The internet is decentralized.

True

___ translates analog voice signals into digital data and uses the Internet to transport the data.

VoIP

Which type of software provides tools for creating and editing all kinds of text-based documents?

Word processing

___ is a set of instructions that directs the computer to perform a variety of tasks.

a computer program

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

acceptable use policy

Which term refers to the large volumes of data that are constantly being generated by our devices and digital transactions?

big data

Adobe Photoshop excels in editing ___ graphics such as JPGs.

bitmap

___ utilities use a variety of techniques that can "squeeze" one or more files into a smaller file, such as a ZIP.

compression

The small data files known as ___ are used by websites to remember users and their preferences.

cookies

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

copyright

A ___ is any step you take to ward off a threat.

countermeasure

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

fair use

A(n) ___ is a short, unique sequence of characters located after the file's name that indicate the file type.

file extension

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?

virus

Copyright protection lasts for ___ years after the death of the author.

70

Making copies of important files to the cloud or to an external storage device is known as:

Backing up

With capacities starting at 25 GB, the ___ is the optical media with the most storage.

Blu-ray Disc

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

Botnets

The file management tool on a Mac is called:

Finder

Which software title allows users to create works that require complex layouts, such as magazines and newspapers?

InDesign

A(n) ___ is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton, Harvard, and MIT.

MOOC

Which software title would help a business manage all aspects of their company's finances?

NOT access (I got this question wrong)

Services such as ___ and Microsoft Teams include many real-time communication tools, along with a variety of apps and services, to make it easier for teams to wok on projects together.

Slack

Which of the following is NOT a cloud storage or synchronization service?

Solid State Drive

Many navigation and traffic apps rely on ___ to determine which roads have accidents/construction and which gas stations have the lowest prices.

crowdsourcing

The ___ command removes the selected object (or objects) from their current location and places them into the clipboard.

cut

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.

cyberbullying

In some operating systems, folders may be referred to as:

directories

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.

expert

Most desktop operating systems include a(n) ___ utility that is dedicated to examining and blocking Internet traffic.

firewall

Preparing a storage device for use by an operating system is known as:

formatting

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

Your browser's ___ keeps the name and URL of every site you have visited, and allows browsers to autocomplete the URL when you type the first few characters.

history

Unlike an email, which can be read by the recipient at any time, ___ engage individuals in a live conversation.

instant messengers

Data ___ is the discovery of new patterns or relationships between data.

mining

___ allow us to communicate and share information between computers.

networks

Which software title would an employee most likely use to send email, manage contacts, create appointments and set up meetings?

outlook

The processed results that a computer sends out to you are known as:

output

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

phishing

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:

piracy

A browser ___ is a separate program that allows your web browser to play several types of multimedia content.

plug-in

Which type of software enables users to create electronic slideshows that contain a combination of text, images, charts, videos, and other elements?

presentation

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

worm

To protect the data on your mobile devices, set a password, pin, or other security measure on your:

Lock Screen

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

Android Pay and Apple Pay rely on ___ to make the smartphone payments in stores.

NFC

FAT and NTFS are two popular types of:

file systems

___ is generally any part of the computer you can touch.

hardware

You should run a(n) ___ if you want to run one operating system on top of another operating system.

virtual machine


Ensembles d'études connexes

Chapter 6 Rock n Roll - Motwon Pop and Southern Soul

View Set

NCLEX Musculoskeletal/Cast/Fracture

View Set

Bible Elijah and the prophets of Baal

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

Medical Insurance & Billing Ch.8

View Set

CH 14- Small Business Finance: Using Equity, Debt, and Gifts

View Set

Patho Chapter 33: Diabetes mellitus & metabolic syndrome

View Set