cgs2060 midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Full HD resolution is expressed as

1920 x 1080

a group of comprised computers controlled by a hacker is called a

bottnet

which of the following represents the highest amount of storage

terabyte

used in a variety of ATM and POS systems, __________ allow for the input of data with the use of stylus or finger

touchscreens

persistent cookies store info about

user preferences

software that infects a computer and is created using computer code is called a

virus

non-malicious computer security experts that test the security measures of an organizations information systems are

white hat hackers

a destructive program that replicates itself throughout a single computer or across a network is called a

worm

a computer controlled by a hacker is called a

zombie

most new laptop computers come with how much storage

256GB-1 TB

when you buy a new laptop how much RAM should it come with

4-8 GB

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a

DDos

a small text file of info created by websites you visit that your web browser stores on your hard disk si called a

cookie

which of the following is a strength of the android platform

most widely used OS for smartphones and tablets

a gigabyte equals approximately _______ bytes

one billion

a kilobyte is equal to _______ bytes

one thousand

all of the following are common ports included with laptops except

MIDI ports

software that collects the users web browsing history and uses the data collected to crate unsolicited targeted pop up ads

adware

the fact that detain servers is nearly always backed up onto other servers gives ______ storage a major advantage over others

cloud

a digital device that accepts input, processes and stores the input, and provides output is a

computer

a site on the windows operating system where you can uninstall programs, adjust settings and manage tasks is the

control panel

the malicious use of computer code to modify the normal operations of a computer or network is called a

cyberattack

harming or harassing a person or group of people via IT and networks in a repeated/ malicious way

cyberbullying

a crime in which a computer is the object of a crime or is used to commit a crime or offense is called a

cybercrime

a person who use computers and the internet to launch attacks against computer systems for political or ideological reasons

cyberterrorist

one disadvantage of cloud storage is that

data is only available when you're online

which of the following is considered a cyber crime

data manipulation

how is the screen size of a laptop measured

diagonally from left corner to right corner

a DDoS attack is when computers that have been infected by a virus act as zombies and work together to send out illegitimate info stands for

distributed denial of service

a person who gains unauthorized access to networks and in order to step and corrupt information and data is called a

hacker

the act of hacking of breaking into a computer system for a politically of socially motivated purposed

hacktivism

adding software to a digital device or adding hardware to a digital device is called

installing

firewall software used to block a users access to specific internet content is called a _______ filter

internet

a form of spyware that records all actions typed on a keyboard is called a ______ logger

keystroke

which of the following represents the least amount of storage

kilobyte

a mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ______

laptop

which of the following is a strength of the Linux platform

less susceptible to viruses than Mac OS

what is the name of a virus written in a macro language and placed within a document pr spreadsheet

macro virus

windows OS is owned and manufactured by

microsoft

which if the following may be risky to uninstall from a windows PC laptop

microsoft works 6-9 converter

a megabyte equals one _____ bytes

million

a terabyte equals ______ bytes

one trillion

what manages hardware and software, supports the computers basic functions and runs programs

operating system

many manufacturers have made _______ optional equipment when purchasing a new laptop

optical drives

cookies store on a computers hard drive and is used to collect and store info about users preferences , password, are _______ cookies

persistent

a type of phishing that seeks to obtain personal info through malicious software that is inserted on a persons computer is called

pharming

blu-ray stores data using

pits and lands that are read by a blue spectrum laser beam

which type of touchscreen uses a single coated metallic panel and uses electricity to calculate touch points

progressive capacitive

in general the _____ the access time, the faster the hard drive

shorter

specialized hardware or software that captures packets transmitted over a network are called packet _____

sniffers

an unsolicited email message is called

spam

a computer that is highly mobile, has a smaller OS, and uses a touchscreen sd the primary input method is called a

tablet


संबंधित स्टडी सेट्स

FT2-3 Progression: Lesson 8 Exam

View Set

BEC B5 Practice notes +BAR B5 practice quiz

View Set

Module 5 Ch 15 "Abnormal Psychology"

View Set

Homework 2: Consumer and Producer Surplus

View Set

Life Insurance Practice Questions (chapter 3)

View Set

G Unit 4 1 Bill of Rights Amendment 1-10 Substantive, procedural, unenumberated rights

View Set