BCS concepts 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Products that respond to a variety of voice commands on mobile devices.

-Cortana -Siri

What are 4 cloud computing storage services that allow you to save and access files online?

-Dropbox -Microsoft OneDrive -Google Drive -Apple iCloud

Four websites that are generally a credible source of accurate information.

-Press release from well-known company -government sites -trusted news organizations -news from research university

Gigi just started looking for a job. What should she do to make sure that she has a good online presence when employers are searching for her?

-Use privacy settings -remove negative photos or posts -set up a LinkedIn account

Three shared items that multiple users can instantly access on a network

-data -software applications -hardware devices

While not illegal, many unethical behaviors such as ____ affect online users.

-flaming -trolling

Three ways you can connect to the internet

-mobile -dial-up -broadband

The internet has increased the piracy of intellectual property such as ____ and many other creative works.

-music -artwork -photos -software

Five ways to authenticate a users identity

-password or pin -employee badge -credit or debit card -fingerprint, iris or face scan -code sent via text message to your phone

Three types of media that carry data from one node to another

-twisted pair cable -fiber optic cable -coaxial cable

A _____ uses radio signals that travel through the air to transmit data. (three)

-wireless network -wireless LAN -Wi-Fi

When starting a new job or enrolling in a new school, you may sign a(n) ___, a document containing an organizations policies for the ethical, secure, and appropriate use of computing resources.

Acceptable Use Policy (AUP)

______ computing is the ability to communicate with a device without using your hands.

Hands-free

What is another name for the largest network in the world?

Internet

Whether its dial-up, broadband, or mobile, every type of internet service requires a connection to a(n) ____.

Internet Service Provider (ISP)

Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurants free Wi-Fi?

No

Gigi found a website where she downloads expensive applications and media for free. Which copyrighted items are okay to download?

None

_____ cookies are typically created by marketing and advertising companies to generate ads that better target your interests.

Third-party

_____ is a security utility that protects your computer from various types of malware.

anti-malware

The most fundamental unit of computing is the ____, which is represented as an on (1) or an off (0) value.

bit

If you visit a website or page that you would like to remember for the future, you can add it to your browser's_____ or favorites.

bookmarks

A ____ is a device that connects to LANS or two segments of the same LAN.

bridge

_____ allows you to store your files and use various applications in an online accounts.

cloud computing

A ____ is a node on a network that serves as an entrance to another network.

gateway

A ____ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks.

hacker

Whenever your operating system or browser issues a software update, you should apply it ____.

immediately

A(n) _____ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building.

intranet

A coworker told Connor that he saved the files he needed to the server on the network. What is an example of a network?

linked computers

The development of ____ allowed data to be represented by magnets, which can hold their position or pattern to represent 0's and 1's without electricity.

magnetic storage

A ____ computer system in a hospital must run without failure or with nearly instant recovery from failure.

mission critical

A _____ computer system in a hospital must run without failure or with nearly instant recovery from failure.

mission critical

A ____ allows users to communicate and share information between computers.

network

Also known as a _____, the network interface card (NIC) translates and transmits packets at each node.

network adapter card

Optical storage devices use lasers to read or write data to the reflective surface of a(n) _____.

optical disc

Data moves through networks in structures known as _____.

packets

Hackers commit ____ by using spyware or by attempting combinations such as "123456" or "password"

password theft

_____ is a feature that will delete your history, cache and cookies the moment you close private windows.

private browsing

RAID is a _____ that acts as a storage system linking disk drives so they act as a single disk.

redundant array of independent disks

_____ systems allow organizations to increase computing power, storage, and software without buying a new computer system.

scalable

Since _____ storage uses memory chips for storage, it has no moving parts like hard drives or optical drives.

solid state

The purpose of ____ is to hold programs and data permanently even when the computer is turned off

storage

A _____ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub.

switch

The entire purpose of computer security is to eliminate or protect against ____.

threats

The _____ of a network is the logical layout of the cables and devices that connect the nodes of the network.

topology

A ____ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

trojan horse

A _____ is a type of malware that self-replicates and spreads through computers and networks.

worm

Computers infected and compromised with malware are known as ____ because they are under external control of a hacker.

zombies


संबंधित स्टडी सेट्स

Chapter 65: Critical Care questions

View Set

Handoff Reporting and Incident Reporting Week 6

View Set