CIS 1 - SMC - Combined 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

1920 x 1080

"Full HD" resolution is expressed as:

A study conducted by the National University of Singapore, found that consumers worldwide spend ____ per year downloading pirated software.

$25 Billion

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

$50

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

$50.00

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

$500

*to open a specific table*

*double click the title of it*

*Know the symbol to switch the design view in Excel*

*its the one in the bottom right*

Examples of management information systems (MIS) include

- ESS - DSS -TPS

Safe Browsing Techniques

- Go incognito: the four most popular web browsers have this mode - be cautious when using social media: open Facebook, click Settings, download a copy of your Facebook data - a Virtual Private Network (VPN) can protect you online identity - HTTPS: check for "https" at the beginning of the URL if you are entering any personal information

Select the usual task of database administrators (DBAs)

- Monitors the database's performance - develops and maintains the database itself - establishes user privileges for the database to help protect the data

Identify Factors that Damage Computer Hardware

- Power surge: lightning or other large electrical input can fry electronics - Protecting a digital device from overheating: heat can severely damage a digital device - Protecting a device from humidity: humidity can negatively impact the performance of a device - Protecting a digital device from magnetic fields: Magnetic fields can influence the flow of electricity in a digital device and impact a computer's hard drive

Select the characteristics of RFID.

- RFID stands for Radio Frequency Identification - RFID can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip - High-frequency RFID can transmit signals further than 1500 feet.

Managing Cookies in Safari

- Safari accepts cookies and website data only from websites you visit. This helps prevent certain advertisers from storing data on your device - You can change options in Safari preferences so that Safari always accepts or always blocks cookies and other website data - Important: Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard

Protecting a Digital Device from Power Surges and Voltage Differenecs

- Surge Protector: use a surge protector when charging a digital device - Uninterruptible Power Supply (UPS): Provides surge suppression and a battery power backup in the event of a power failure - Voltage differences when traveling: US uses 110 volts, many other countries use 220 volts

Select the qualities that make a trait useful for biometic recognition.

- The trait must not change over time. The trait must not change over time. - Everyone must have the trait. Everyone must have the trait. - The trait must be measurably different with each person.

Starting Windows in Safe Mode

- To start a device using Windows OS in safe mode, first click the Windows button - Click the Settings button - If necessary scroll down to view all options - Select Update and Security - Select Recovery - Select Restart now - After rebooting the system, you will enter Windows RE (Recovery environment) - Select Troubleshoot - Select Advanced options - Select Startup Settings - Select Restart - Use number keys or function keys to Enable Safe Mode

Zombie

- a computer controlled by a hacker - groups of compromised computers that are controlled by a hacker are called botnets or zombie armies Hackers use zombies to: - send spam from multiple IP addresses - launch a DoS attack

Cybercrime

- a crime in which a computer is the object of the crime or is used to commit a criminal or offense - Single event: victims endure a single event cybercrime such as unknowingly downloading a Trojan Horse virus - On-going series of events: more serious than single event cybercrimes

select the advantages of using a database instead of a traditional filing system

- a database can provide improved data integrity - a database can hold larger amounts of data

Cyberattack

- a deliberate misuse of computers and networks via the internet - cyberattacks use malicious code to modify the normal operations of a computer or network Cyberattacks include the following: - pharming and phishing - spamming and spoofing - spyware - trojans and viruses - identity and information theft - Dos and DDoS attacks

Worm

- a destructive program that replicates itself throughout a single computer or across a network - automatically reproduces itself - designed to attack both wired and wireless networks - replication exhausts network bandwidth or available storage

Firewall Options

- a firewall is an application that executes different tasks than those executed by antivirus or anti-malware apps - firewalls help prevent against worms and hackers, antivirus apps help protect against viruses, and anti malware apps help protect against malware - you need all three applications in order to be fully protected - you only need one firewall app on your PC - both Windows OS and Mac OS X come with firewall software

Keystroke Logger

- a form of spyware that records all actions typed on a keyboard - can be hardware devices and software applications - software based keystroke loggers are often a Trojan that is installed without the user's knowlege - keystroke loggers can record passwords and confidential information

What's true about database fields

- a group of related characters in a database table - represents a characteristic of someone or something

Hacker

- a person who attempts to gain unauthorized access to networks - commonly attempts to steal and corrupt information and data - the term hacker and cracker are synonymous

Trojan

- a program that appears legitimate but executes an unwanted activity when activated - often used to find passwords, destroy data, or to bypass firewalls - similar to viruses, but do not replicate themselves - often found attached to free downloads and apps

Password

- a secret code used to help prevent unauthorized access to data and user accounts - used to secure computers, networks, software, personal accounts, and digital devices - only identify the authenticity of the password, not the use - the terms passcode and key code are synonymous for password

Email Virus

- a virus that is attached in a file in and sent via email message - when that infected file is opened, the virus infects the computer 3 common types: - Phishing: tricks users into revealing their usernames and passwords by appearing legitimate - Ransomware: when activated, encrypts files on user hard drive and then sells a decryption program - Keystroke logging Trojan: when activated, saves all keystrokes for subsequent transmission to virus creator

Macro Virus

- a virus written in a macro language and placed within a document or spreadsheet - when file is opened the macro virus executed - commands in the macro language set off the destructive events - can be avoided by not downloading or opening the attachment

database

- allows greater data sharing - allows unlimited storage

Select the statements that refer to color depth.

- also known as "bit depth" also known as "bit depth" - a measure of the accuracy of the color of each pixel a measure of the accuracy of the color of each pixel - specifically, the number of bits of data describing each pixel in a display specifically, the number of bits of data describing each pixel in a display - the number of pixels in a display

Script Kiddie

- amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written - do not have the skill or experience to write their own programs

Spam

- an unsolicited email message - spam messages are sometimes called UBE (unsolicited bulk email) and are used for a variety of marketing purposes including selling products and services - messages may contain a variety of malicious programs

Antivirus Software

- antivirus software is a computer program that is used to scan files to identify and remove computer viruses and other malicious programs - antivirus programs use a variety of techniques to identify and remove viruses and malware - two of the most common techniques are using signature-based detection and heuristic-based detection - other techniques include behavioral detection and cloud-based detection

When reporting a computer ethics violation of a co-worker to your employer, it's important to:

- be brief and direct - state only what you witnessed

How to manage cookies in Google Chrome?

- blocking/allowing cookies by default - deleting cookies - make exceptions for cookies from specific websites or domains

Black Hat Hacker

- break into computer systems with the intent of causing damage or stealing data - also known as hackers or crackers - Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair

Password Security

- change your passwords frequently - use generic passwords - keep your passwords private - use a combination of letters, symbols, and numbers - check your accounts

Spyware

- collects information about your internet surfing habits and behaviors - includes the collection of keystrokes, passwords, and confidential information - often installed via free downloads or by visiting certain illegitimate websites

Spam Filter

- computer software that is designed to prevent spam messages from entering into a user's email inbox - also known as spam blockers or anti-spam utilities - searches for spam by monitoring suspicious work patterns and frequencies

The usual tasks of data analysts

- creates reports for senior management - interprets information provided by the database - collects data

possible consequences of not setting a computer ethics policy

- decreased network speeds - increased likelihood security breaches - decreased employee performance - increased likelihood of data loss

Managing Cookies

- determine what cookie settings are preferred - cookie settings must be adjusted in each browser you use Cookie settings in web browsers: - delete cookies - block/customize cookies - allow cookies

Network Address Translation (NAT)

- developed by Cisco, is used by firewalls, routers, and computers that are part of a network and are connected to the Internet - used in firewalls to provide protection from outside network intrusions by hiding internal IP addresses - Can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS

The usual tasks of information systems (IS) program managers

- developing training plans and polices for IS - Supervising IS technicians - Working with developers and senior management to procure and implement IS processes

Which of these should business owners do to help protect their data

- ensure antivirus software is installed and up-to-date - establish strong firewall protection for their business's network - create strong password protections and protocols

Which are true regarding a screen's resolution?

- equals the number of pixels in a display equals the number of pixels in a display - measures image quality

Managers and network administrator should

- establish ethic standards - enforce standards by creating firewalls, setting filters, and establishing monitoring protocols - periodically reviewing computer ethics policies - instruct employees on standard

How to Diagnose if your System has been Hacked

- fake antivirus messages: if you notice these messages power down your computer, and reboot your computer in safe mode. Then run your antivirus program - unwanted browser toolbars - frequent random popups - fake emails or social media messages from your account

How do Firewalls Work

- filter all information coming through the Internet to your network or computer system There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including: - Packet Filters: a packet filter inspects each packet leaving or entering a network - Proxy Server: intercept all messages between client and server

Internet Filter

- firewall software used to block a user's access to specific Internet content The software can reside on a: - router or user's computer - a stand-alone filter attached to a server - Network

Hacktivist

- hacking for a politically or socially motivated purposes - uses same techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause

Cyberbullying

- harassing using digital devices and networks in a repeated and deliberate manner - includes (among others) emails, blogs, texts, web pages, and blogs with the intention of harming another person - Cyberstalking is a form of cyberbullying

Firewall

- hardware or software used to keep a computer secure from outside threats such as hackers and viruses - allow or block Internet traffic in and out of a network or computer - the most ideal firewall configuration consists of both hardware and software - personal software firewalls are typically included with the operating system - hardware based firewalls can be purchased as a stand-alone product

professional

- if possible, states when a return call can be expected - concise - states the number or office gat has been reached

Where to download antivirus software?

- if you know the name of the software vendor you can download the software directly from their website - a popular option for free antivirus software is: www.download.cnet.com (part of the Cnet family) - When downloading software from any site it is important to think before you click. Many software download sites have links to other areas and sites

Phishing

- illegitimate use of an email message that appears to be from an established organization - often contain the company's logo and identifying informatoin - use legitimate looking email messages to con a user into giving up private information

How to Avoid Viruses

- install the latest antivirus software and update frequently - surf the web and download content safely - only visit trusted sites - remove any USB drives, and DVDs before booting your computer - purchase a new router every other year to ensure you have the latest firewall protections - adjust your web browser's security settings to allow browsing only on trusted sites - never bypass your browser's built in security features

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following

- instructing employees on standards - periodically reviewing computer-use polices - enforcing standards by creating firewalls, monitoring protocols, and filters

If you own a small business, what can you do to ensure your computers and data is kept secure?

- keep software updated, particularly antivirus software - backup your data regularly - physically secure computers to minimize risk of theft

Unprofessional

- let's caller know the call is important - repetitive - long

Which statements refer to a display's contrast ratio?

- luminance of white pixels compared to the luminance of black pixels - describes the number of pixels in a display

Select appropriate business email etiquette practices

- maintain high levels of formality, especially with initial contacts - consider if email is the appropriate means of communication

Ransomware

- makes a computer's data inaccessible until a ransom payment is made - encrypts data, forcing victim to buy an decryption code - payment is made using Bitcoin or prepaid cards Attacks usually come via: - Trojan: a legitimate looking email - Worm: in a computer network - an alternative version of a ransomware threatens to make the victim's confidential files public

White Hat Hacker

- non-malicious computer security experts - test the security measures of an organization's information systems to ensure they are protected against malicious intrusions

Fee based vs Free antivirus software

- one of the main differences is the number of features - many free antivirus programs come with advertising - most of the free antivirus programs performed almost as effectively as their fee based counterparts

How does Antivirus Software work?

- one popular technique used by antivirus programs is to look for a virus signature - a virus signature is the software code of a particular computer virus - the antivirus program compares its database of known virus signatures with the files on a digital device and on removable media - once the virus is identified the antivirus software attempts to remove the virus from the file

Online Nuisances

- online nuisances are annoying software programs that can slow down the operations a computer, clog email inboxes, and lead to the theft of information and money Online Nuisances include: - spam - spyware - phishing and pharming - trolling and spoofing

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating business's social media

How a Virus Infects a Computer

- opening an infected email attachment - downloading an infected file from the internet - sharing infected files - visiting a contaminated website - disguised as images, audio, or video files

How to Diagnose a computer that is impacted by online nuisances

- receiving spam email and bounced back email - frequent pop ups - pop ups start appearing after visiting unfamiliar sites

The appropriate business email etiquette practices

- remember that potentially negative news is best given face-to-face - keep attachments small

Cookie

- small text file of information created by websites you visit that your web browser stores on your hard disk First-party Cookie - created by visited websites to optimize browsing Third-party Cookie - created by a website other than the one you are currently visiting and are used to track our surfing habits

Persistent Cookie

- small text files stored on hard drive Collects information regarding: - user preferences - Password and username information - IP address - Data on web surfing behavior

Computer Virus

- software than infects computers - created using computer code - typically must be "run" to attack and do damage - can destroy programs or alter the operations of a computer or network

Adware

- software that collected the user's web browsing history - data is collected to create unsolicited targeted pop up advertisements - adware often accompanies downloaded programs

Packet Sniffer

- specialized hardware or software that capture packets transmitted over a network - legitimate sniffers are used for routine examination and problem detection - unauthorized sniffers are used to steal information - packet sniffers can be very difficult to detect

Session Cookie

- stored in temporary memory and is lost when the browser is closed - determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used

your college has a datable with a student table. which of the following could be primary key in the table?

- student number - social security number *must be unique field*

when you're creating a voice mail greeting on your business phone, you should tell the caller

- the voice mail that they've reached - when they can expect a return call - if possible, why you can't take the call

Rootkit

- type of malware that hides in the operating system and is triggered each time you boot your computer A rootkit allows a remote user to: - install rogue files - use and take control of the computer by creating a "backdoor" that bypasses security - delete files

Password Management

- use a strong password and to never use the same password twice - experts suggests using password management software to keep your passwords safe

A digital identity is comprised of a variety of digital attributes including

- usernames and passwords. - online search activities. - personal data such as your social security number and birthdate. - the spreadsheet software you're using.

Cyberterrorist

- uses computers and the internet to launch attacks against computer systems for political or ideological reasons - attacks include the disruption of e-commerce and government sites - the power grid and public utilities have also been targeted

What are the privacy risks associated with cookies?

- websites can collect your information and sell it to third-parties - websites can track your surfing behavior and create a user profile - corporate and government entities can monitor your Web behavior

Put the following elements in the proper order in which they appear in an email:

-#1: salutation -#2: body -#3: complimentary close -#4: signature line

Match the e-commerce transaction type

-A consumer makes a purchase from overstock.com : B2C -A consumer makes arrangements to buy used snowboard equipment with another consumer on craigslist: C2C -Albertson's grocery store places an automated order for more Mountain Dew from PepsiCo via the internet: B2B

Select the advantages of using a database instead of a traditional filing system.

-A database can hold larger amounts of data. -A database can provide better data integrity. -A database can never be hacked

What is true about AUP

-AUP covers a broad spectrum of computer recourses -An AUP often accompanies most software applications -a well-written AUP should clearly state what a user is not allowed to do with these resources as well as general etiquette to follow when using shared resources

You should evaluate websites based on which of the following criteria?

-Authenticity -Objectivity -Bias

According to the FTC, a few US internet privacy laws/rules of importance are

-COPPA -the Red Flags Rule

The TPP was negotiated by 12 countries including

-Canada -The US -Brunei

Select the Characteristics of a router

-Connects networks -Provides hardware firewall protection -Usually incorporates a switch

The 3 phases that should be accomplished in the investigation step of the SDLC include:

-Defining the problem. -Examining alternatives. -Reporting.

Select what's true about session cookies

-Determine the start and end of a session -Analyze and measure traffic on a web page -Determine the web browser being used.

Identify common symptoms of a computer virus.

-Documents won't save -Computer runs extremely slowly -Programs launch on their own

Match the number to the statement about debit card fraud

-If you tell your bank within 2 days of learning about fraudulent charges you are responsible for a maximum of: $50 -Wait more than 2 days but less than 60 days to inform your bank of fraudulent charges you are responsible for a maximum of: $500 -After you tell your financial institution about the fraud charges it has ___ business days to investigate: 10 days. -If the investigation determines the transaction was indeed fraudulent, your financial institution must replace the funds within ____ business days: 1

Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. The highly structured process may be completed using which languages?

-Java -Javascript -C++

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

-Keystrokes -Passwords -Confidential information

Select what's true about packet sniffers.

-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information.

Select what is true about BitTorrent

-Movie steaming and Torrent sites account for more than half of all internet traffic -BitTorrent uses a peer-to-peer structure where each device connected to a network has equal access to the shared files

Select what's true about Trojan malware

-Often found attached to free downloads and apps. -Often used to find passwords, destroy data, or to bypass firewalls.

Select the examples of uploading files

-Posting a photo on social media -Placing an ad on Craigslist -Posting a YouTube video

Select the characteristics of RFID: -RFID stands for Radio Frequency Identification -RFID can be used to identify a variety of objects including animals and people implanted with an active RFID chip -high frequency RFID can transmit signals further than 1500 feet -RFID doesn't require line of sight scanning

-RFID stands for Radio Frequency Identification -RFID can be used to identify a variety of objects including animals and people implanted with an active RFID chip -RFID doesn't require line of sight scanning

Which of the following are common email viruses

-Ransomware -Keystroke logging Trojan

You should evaluate websites using which of the following criteria?

-Reliability -Relevance -Validity

If you're reading an article and are concerned that it may be biased in one way or another, what can you do to judge the author's objectivity?

-Remember that bias is introduced into everything, even though it may be unintentional -When viewing a website, investigate the background and other writings of the author and the site -Try to be aware of all sides of any issue

An Internet search engine can perform which three basic tasks:

-Search the Internet for information based on the search criteria entered by the user -Indexing of keywords that are found -Display the location of the information stored in the indexes

The titles in the DMCA that directly impact digital copyright issues are:

-Title 2- online copyright infringement liability limitation -Title 3- computer maintenance competition assurance -Title 1- WIPO copyright and phonograms treaties and implementation act

Select what's true about using the Boolean operators "OR" and "NOT".

-Use "OR" when you are searching for documents including one or another of your search words) -You can use /^ to execute an OR search -Use "NOT" if you want to exclude certain results from your search

Select the characteristics of a modem

-Usually provided by the ISP -Converts analog signals into digital signals -Converts digital signals into analog signals

Which of the following are true statements regarding LinkedIn?

-You can use LinkedIn to apply for jobs. -LinkedIn includes a resume tool to assist you in creating a professional resume.

What is true about RFID

-can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -RFID does not require line-of-sight scanning

An acceptable use policy (AUP) is a written document that provides a framework of rules to be followed by users of:

-computers -networks -websites

Which of the statements are true about ergonomics?

-derived from the Greek words ergon (work) and nomoi (natural laws) -a very important element of an effective workplace safety plan -the study of human interaction with the objects they use

Marketing

-online advertising and using social media - search engine optimization

What is true about best practices for the use of an employee-monitoring program.

-preventing employee access to time-wasting or inappropriate sites can help stop trouble before it begins -be honest with the people in your organization about the presence of monitoring software and the processes and procedures that surround it

select the activities that would considered software theft: -taking a registration code from the internet and using it to register a program that you didn't purchase -illegally copying a program -stealing software programs -erasing a program that you purchased and then sold to a friend

-taking a registration code from the internet and using it to register a program that you didn't purchase -illegally copying a program -stealing software programs

Internet privacy is a wide ranging term that refers to a variety of considerations including...

-tech used to protect sensitive and private data, communications and preferences -who has access to date and information -how data and information is used

Which are considered Intellectual property?

-trade secrets -trademarks -patents

A digital identity is composed of a variety of digital attributes including:

-usernames and passwords -personal data such as your social security number and birth dates -online search activities

Which of the following are examples of EFT transactions?

-using your debit card to purchase gas -ATM withdrawal of cash to use to buy concert tickets -direct deposit of your paycheck

Which of the following file extensions is commonly used for term papers and other word processing tasks?

.docx

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

.exe

A smartphone emits approximately ___ watts of microwaves.

0-1

The text contained in about 4 books uses approximately ___ times more data than a short email.

1,000

Three items to install a home WiFi network

1. A router 2. A Modem 3. An internet signal

1. Ways to avoid a computer virus 2. Ways to catch a computer virus

1. Adjust your web browser's security settings to allow browsing only on trusted sites Surf the web and download content safely Purchase a new router every other year to ensure you have the latest firewall protection 2. Downloading files from the internet Opening suspicious or infected email messages Visiting questionable websites

1. Twisted pair 2. Ethernet 3. Microwaves

1. Cable sticking out or folded 2. Has a clit 3. Satellite

Match the business information activity with the appropriate management level: 1. First level managers (supervisors, floor managers) 2. Middle managers 3. Top level management (business executives and presidents)

1. First level managers - Use information systems for recording line employee performance. 2. Middle managers - Use information systems for communicating policies and performance reports up and down the corporate ladder. 3. Top level management - Use information systems to foresee corporate opportunities and threats.

1. Online nuiscance 2.Virus

1. Frequent pop-ups while searching the web Receiving a lot of spam emails and bounced back email Pop-ups start appearing after visiting unfamiliar sites 2. You cannot boot your computer Your computer is running slower than usual

Place the following steps in order to attach a document from your documents folder to an email in outlook

1. Go to outlook 2. Click attach 3. Select computer 4. Select documents 5. Double click

Match the following: 1. Input 2. Output 3. Storage

1. Input: Entering text in a word document. 2. Output: Playing a song from Spotify. 3. Storage: Putting a photo onto a USB drive (thumbdrive).

Match the conversion methods with the correct description in the system implementation step of the SDLC: 1. Pilot 2. Direct 3. Phased 4. Parallel

1. Pilot - starts in one area of the organization and then is deployed to the rest of the organization 2. Direct - shuts down the old system and starts the new system 3. Phased - implements new areas of the system in a predetermined period of time 4. Parallel - old and new systems run side-by-side for a while

Following internet service options

1. Satellite 2. Fiber Optic 3. Cable

The internet is a global network of interconnected networks that uses

1. Transmission media such as fiber optic cable and satellite(microwave) signals 2. Software, specifically the TCP/IP suite of internet protocols 3. Hardware such as servers and routers

1. Virus 2.Cyber attack

1. Trojan Horse, Worm, and Macro 2. Rootkiit, Packet Analyzer, and DOS attack

1. Online nuisance 2. Other computer terms

1. Trolling Phishing Spoofing Spyware 2.Hardware Theft Software theft First Party cookies

1. Hacker 2. Online nuisances

1. White hat Black hat Cyber terrorist Script Kiddie 2.Spam Spyware Adware

1. Pro 2. Unpro

1. states the number or office that has been reached If possible, states when a return call can be expected Concise 2. Let's caller know the call is important Long Repetitive

How do I setup an Internet Filter for Mac OS X

1.) Choose Apple menu - System Preferences, Parental Controls. When you open Parental Controls preferences, if you see the message There are no user accounts to manage, see Add a managed user 2.) Click the lock icon to unlock it, then enter an administrator name and password 3.) Select a user, click Enable Parental Controls. If the user isn't in the list, click Add, then create a new user

Set Restrictions in Mac OS X

1.) Choose Apple menu - System Preferences, then click Parental Controls 2.) Click the lock icon to unlock it, then enter an administrator name and password 3.) Select a user, then click one of the tabs along the top: - Apps - Web - People - Time Limites

Removing Stored Data and Cookies in Safari

1.) Click Remove All Website Data, or click Details 2.) Select one or more websites, then click Remove - If you remove information stored by a website, the website may not be able to provide services it has provided in the past

How do I delete cookies in Google Chrome?

1.) Click the Chrome menu on the browser toolbar (right upper corner of the screen) 2.) Select Settings 3.) Click Show advanced settings 4.) In the Privacy section, click the Content Settings button 5.) In the Cookies section, change the following cookies settings: 6.) Click All cookies and site data to open the Cookies and site data dialog 7.) To delete all cookies, click Remove all at the bottom of the dialog. To delete a specific cookie, hover with your mouse, then click the X

How to access Windows Firewall

1.) Clicking the Start button 2.) Click Control Panel 3.) Click System and Security, then click Windows Firewall 4.) Adjust Windows firewall settings

How do I block cookies in Mozilla Firefox?

1.) Go to the website you wish to block from setting cookies in Firefox 2.) Right-click within the page and select View Page Info. In the Page Info window, select the Permissions panel 3.) Underneath Set Cookies, remove the check mark from Use default 4.) Change the setting to block and close the Page Info window and remove any cookies that the website has already set in Firefox

How do I setup an Internet filter in Microsoft Windows?

1.) Navigate to the Control Panel, and then, under User Accounts and Family Safety, clicking Set up parental controls for any user 2.) Click the standard user account that you want to set Parental Controls for. If the standard user account isn't set up, then click Create a new user account 3.) Under Parental Controls, click On, enforce current settings 4.) With Parental Controls for your standard user account, you can adjust time limits and access to specific programs and web sites

Deleting cookies in Internet Explorer

1.) On the Start screen, click Internet Explorer 2.) Swipe in from the right edge of the screen, and tap Settings (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings) 3.) Click options, and then under History, click Select 4.) Select the Cookies check box, and then click delete

Adjusting Cookie Settings in Windows Edge

1.) Open Microsoft Edge 2.) Press the three-dot More actions button on the top right 3.) Select Settings from the menu that shows up then tap or click View Advanced Settings 4.) Press the drop down arrow then select Block All Cookies or Block Only Third Party Cookies

How do I allow cookies in Internet Explorer?

1.) Open the Desktop and then tap or click the Internet Explorer Icon on the taskbar 2.) Tap or click the Tools button and then tap or click Internet Options 3.) Tap or click the Privacy tab, and under Settings, move the slider to the bottom to allow cookies, and then tap or click OK - blocking cookies might prevent some pages from displaying correctly, or you might get a message from a site letting you know that you need to allow cookies to view that site

How do I customize cookie settings in Internet Explorer?

1.) Open the desktop and then click the Internet Explorer icon on the taskbar 2.) Click the Tools button and then tap or click Internet options 3.) On the privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, click Sites. To import privacy preferences file, tap or click import. To override your privacy settings for certain types of cookies, click Advanced. To reset privacy settings to their original level, click Default 4.) When you're done, click OK

How do I block cookies in Internet Explorer?

1.) Open the desktop and then click the Internet Explorer icon on the taskbar 2.) Click the Tools button, and then click Internet options 3.) Click the Privacy tab, and under Settings, move the slider to the top to block all cookies, and then click OK

How do Computer Viruses Work?

1.) Virus arrives via email attachment, file download, or by "clicking" in an infected website 2.) An action triggers the virus 3.) The virus spreads to other computer/devices or network 4.) The activated virus starts its destructive actions

1.Virus symptoms 2.Ways to catch a computer virs

1.Critical files may get deleted The operating system may not launch properly If a system or networks is infected severely, it may even black out or not even launch 2.Borrowing a friends USB storage device to save a file Downloading files from the internet Visiting questionable internet sites

1. 4 not tilted 2. circle 3. 4 tilted 4. Rectangle

1.Decision point 2.Start point or finish point 3.Input or output points 4.Process or procedure

According to Microsoft, the most efficient way to block cookies is:

1.Desktop 2.Tap or click Tool button 3. Tap or click privacy

Select the statements for Internet Protocol(IP) addresses

1.ISPs usually have blocks of IP addresses that they assign as demanded 2. Assigned to your home network by your ISP 3. Means by which your network is identified by other servers and computers on the internet

According to Microsoft, the most efficient order of steps to customize cookie settings is

1.Open desktop 2.Tap or click 3.BIG PARAGRAPH 4. When you are done

Put the following steps in order for creating a new email message in Microsoft outlook

1.Open outlook 2. Click new 3. enter 4. Type subject 5. your message 6. send

What is the correct order for the major steps of the software development proccess

1.Planning 2.Programming 3.Debugging 4.Beta Review

1. Online nuisance 2. Virus

1.Receiving a lot of spam emails and bounced back email Pop - up start appearing after visiting unfamiliar sites Frequent pop ups while searchings the web or working in programs 2.Your computer is running slower than usual You cannot boot your computer

Put the remaining steps required to set parental controls in Mac OS X in the correct order

1.Select system perferences then click parntal controls 2.Click the lock icon to unlock it 3.Select a user, then enable parental controls 4.If the user is not in the list, click Add, then fill in name

1.Illegal computer activity 2.Legal, but often violate business computer use policies

1.Software piracy Copyright Infringement Computer scams Child pornography Bomb threats 2.Visiting personal social mmedia sites Sending/opening personal email Online shopping Playing online games

Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.

10

Snaps on Snapchat can be viewed for up to ____ seconds (depending on what the user chooses) and then disappear.

10

Twitter recommends using no more than ___ hashtags per Tweet.

2

Twitter recommends using no more than _____ hashtags per Tweet.

2

twitter recommends using no more than _______ per tweet.

2

Which area of the control panel screen in windows 7 allows you to adjust parental control

3 user accounts

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

3D

If you just need a phone for calling and texting, a ___ phone can save you money.

3G

Two major categories of cell phones are available. Smartphones with LTE or 4G capability and ___ phones.

3G

This is a Mozilla Firefox screen. Where on the screen would you click to delete cookies

4 line one

Where in the image above would you click to download a copy of your facebook data

4 triangle

When you buy a new laptop, how much RAM should it come with?

4-8 GB

The TPP covers just ___ percent of global GDP.

40

Broadband internet service is only available in areas of ____________ cellular availability

4G

Most new cell phones today come with approximately ___ of RAM.

500 MB - 2 GB

BSA- The Software alliance is headquarters in Washington DC, and operates in more than _____ countries

60

A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.

7

The TPP also stipulates the length of copyright terms. In the US, perpetual copyrights and patents are prohibited, but extensions to copyrights are allowed. Under the TPP copyrighted works will pass into the public domain ____ years after the death of the creator, extending the term for some countries such as New Zealand by a further 20 years.

70

CDs provide approximately ___ of data storage space.

700 MB

Software theft occurs when someone engages in all of the following except _______: A. Erasing a program you purchased then sold to a friend B. Illegally registering a program C. Stealing software programs D. Illegally copying a program

A

The coding step of the PDLC might use which of the following languages? A. C++ B. English C. Russian D. Spanish

A

Which of these is found on iPhones and iPads? A. iOS B. OSX C. Blackberry D. Android

A

Which of these programs make data more readable to programmers by parsing XML files? A. JSON B. C# C. Dreamweaver D. JavaScript

A

domain

A ___ name identifies a server site on the Internet.

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

wire-wire

A form of email fraud where criminals change the account where money is being transferred is called a ______ scam

botnet

A group of compromised computers controlled by a hacker is called a _____.

Select what's true about database fields

A group of related characters in a database Represents a characteristic of someone or something Primary key is a field designation

relationship

A link between tables in a relational database that defines how the data is related is called a _____.

megabyte

A million bytes of data equals approximately one ___

hacker

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

single core processor

A processor comprised of one control unit and one ALU is called a ____ .

PaaS

A programming environment used to develop, test, and disseminate web apps via the Internet.

paas

A programming environment used to develop, test, and disseminate web apps via the Internet.

File Transfer Protocol

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

ping

A request for an electronic "echo" or response from another computer or server is called a ____.

firewall

A security system separating 2 networks or even computers on the same network is called a ___ .

ping

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .

control panel

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

0-1

A smartphone emits approximately ___ watts of microwaves.

optical drive

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

IP

A switch distinguishes between various devices within a network by their __ addresses.

IR

A television remote usually uses ___ waves.

Select the 3 parts that must be in loop

A test condition An initial value A process

500 gb- 1 tb

A typical laptop has a storage capacity of approximately ____ .

Select the advantages of using a database instead of a traditional filing system: A. A database can hold larger amounts of data B. A database can provide better data integrity C. A database can never be hacked D. Using a relational database, such as MS Access, is so easy that it requires no instruction

A, B

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data? A. What field name will the data fall under B. What data type will be included C. What database manufacturer is used D. When was the database created

A, B

Select what's true about database fields: A. A group of related characters in a database B. Represents a characteristic of someone or something. C. Primary key is a field designation D. A field is a row in a table

A, B, C

A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .

AJAX

Before using your empolyer's network, you'll probably have to read and agree to abide by the networks

AUPs

Business owners, copyright holders, and network administrators publish

AUPs

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

AUPs

before using your employer's network, you'll probably have to read and agree to abide by the network ___

AUPs

300 hours

According to youtube approximately how much video is uploaded to its site every minute

storage

Adding a microSD card (when possible) increases your phone's ___ capacity.

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.

Adware

settings

After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.

Select the set of programs that allow data to be exchanged on a website without changing the website's display

Ajax

Written in natural language and in the form of a flowchart, a programmer uses a(n) ___ to describe the problem the program will solve.

Algorithm

G2b

All of the following are considered e-commerce transactions except

g2b

All of the following are considered e-commerce transactions except

open edu resources

All of the following are protected against unauthorized use or distribution by intellectual property laws except

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

Alpha

Internet

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

Identify what is true about script kiddies

Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that other have written

script kiddies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

HDX

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon fire

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

Select the statements that are true regarding a Wi-Fi's SSID.

An SSID is the Wi-Fi's name. Most routers transmit the SSID every few seconds so roaming devices can find the signal. In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary.

ddos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

right click

An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.

memristor

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

peripheral

An input, output or storage device connected to a computer is known as a(an) _____

dictionary

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

Iaas

An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.

laas

An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ____ step.

Analysis

Which of the following HTML objects will find web pages with hyperlinks?

Anchor

Which of the following are examples of HTML objects?

Anchor, Image, Link

Which of these operating systems is based on Linux and used on smartphones

Android

Each task has _____, or an amount of time required to finish the task.

Answer: Duration

The project _____ is achieved when a series of tasks are completed. Every project must have a start and an end date.

Answer: Goal

One othe leading software tools in Project Management is ______.

Answer: MS Project

The _____ is the central person who runs the project and ensures the timely execution of the project plan.

Answer: Project Manager

______ are the people, equipment, or facilities (such as contractors, trucks, paint, etc.) that need to be assigned to a task in order to complete it. Anything that costs money to apply to a task is a resource.

Answer: Resources

A _____ is a person or entity that my indirectly be affected by a project or holds a positive or negative interest in a project.

Answer: Stakeholder

A _____ is a specific action that needs to be completed in order to achieve the project goal. For example, if your goal is to remodel a kitchen (Project End Goal) one task might be "buy new appliances".

Answer: Task

With its iPhone, ___ dominates the U.S. smartphone market.

Apple

On a mac home screen, where do you click to access to adjust parental control settings?

Apple Settings

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

Application

AJAX stands for ___ JavaScript and XML.

Asynchronous

All of the following are part of an RFID system except _____: A. Transceiver B. Network C. Antenna D. Transponder

B

All of the following are true about RFID except: A. RFID stands for Radio Frequency Identification. B. High-frequency RFID can transmit signals further than 1500 feet. C. RFID doesn't require line of sight scanning. D. It can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip.

B

The 3rd generation programming language that most students learned when most computers used MS DOS was

BASIC

A leading advocate against software piracy for the global software industry is _____ -The Software Alliance.

BSA

The volume of data that can be carried on an Internet transmission media in an amount of time is called ______.

Bandwidth

The capacity of a particular transmission medium is called its ____.

Bandwith

longer

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

Mobile switching station (MMS)

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

large

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

Safari

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

data

Before you can start tethering, verify that it's included in your cell phone's ___ plan

data

Being able to surf the web, watch videos, and listen to streaming audio is why call service with a _____ plan is extremely popular in the US

You should evaluate websites based on which of the following criteria?

Bias, Objectivity, Authenticity

If it can be answered as either yes or no, or true or false, the question is called ___ .

Binary

peer to peer

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

Select the cell phone manufacturers.

Blackberry Xiaomi Huawei

pits and lands that are read by a blue spectrum laser beam

Blu-ray stores data using ___ .

A group of compromised computers controlled by a hacker is called a

Botnet

A group of compromised computers controlled by a hacker is called a ____.

Botnet

A group of compromised computers controlled by a hacker.

Botnet

Mbps

Broadband is measured in _____ .

mbps

Broadband is measured in _____ .

Software applications that allow users to access and surf the World Wide Web are called

Browsers

AUPs

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

All of the following are best practices when using LinkedIn except: A. You can use LinkedIn to apply for jobs. B. LinkedIn includes a resume tool, so you will have to create one and upload it to the site. C. Post vacation photos to show your friends where you've travelled. D. Use up-to-date information and images on LinkedIn.

C

All of the following are considered e-commerce transactions except: A. B2C B. C2C C. G2B D. B2B

C

All of the following should be considered when using Twitter except: A. Most of the communication taking place on Twitter is viewable by everyone. B. Twitter accounts contain personal information. C. If a Twitter user has been blocked, you can file a formal complaint through Twitter. D. You can protect Tweets so that manual approval is required to view them.

C

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links: A. Proximity B. Links C. Separation D. Closeness

C

The titles in the DMCA that directly impact digital copyright issues include all of the following except: A. Title 2 - Online Copyright Infringement Liability Limitation B. Title 1 - WIPO Copyright and Phonograms Treaties and Implementation Act C. Title 5 - Copyright Protection Act D. Title 3 - Computer Maintenance Competition Assurance

C

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except: A. When sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. B. Files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses. C. Your anti-virus software will ensure your files are safe. D. The source of the content. It is important to consider if the content came from a legitimate source.

C

Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies

C

Because it is a Microsfot product

C#

If you plan to write software for PC games you should probably learn C or

C++

If you plan to write software for PC games you should probably learn C or ___ .

C++

One the algorithm or plan has been created, the next step in the PDLC is to write the codiing for the program

C++ Java Javascript

Programming language Natural language

C++ Java Javascript C# Spanish Russian Italian English

700 MB

CDs provide approximately _______ of data storage space

If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.

CTRL

Which might be a choice for Internet service in your area?

Cable Internet

Select the true statements regarding dual band routers Can transmit WIFI signals in the 5.0 GHz frequency range. Can minimize the WIFI signal's interference from microwave ovens and car alarms Usually less expensive than single band routers Can transmit WIFI signals in the 2.4 GHz frequency range

Can transmit WIFI signals in the 5.0 GHz frequency range. Can minimize the WIFI signal's interference from microwave ovens and car alarms Can transmit WIFI signals in the 2.4 GHz frequency range

Which of the following are the steps involved in programming?

Categorizing which parts of a task a digital device can perform Describing the task in a precise manner. Describing the task in a precise manner. Translating the task into the language the computer's CPU can use

microwaves

Cell phones send and receive extremely weak ___ signals to and from cell towers.

base transceiver stations

Cell towers are connected to ___ .

This is the System and Security area that is accessed by clicking Control Panel System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?

Change notification settings Update your firewall settings Turn windows firewall on or off

Put the steps to change safari cookie

Choose safari Click Preferences Click privacy Change cookie settings

After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data

Click - Remove All Website Data

You need to adjust cookie and data permission settings in google Chrome. Put the steps for adjusting cookie and site data permission settings in Goggle Chrome in the correct order.

Click the Chrome menu Click show advanced settings In the "cookie"

How do I delete cookies in Mozilla Firefox?

Click the menu button, choose History, and then Clear Recent History... 1.) Set Time range to clear to Everything 2.) Click on the arrow next to details to expand the list of history items 3.) Select Cookies and make sure that other items you want to keep are not selected 4.) Click Clear Now to clear the cookies and close the Clear Recent History window

Sage was developed during the ____ war.

Cold

Sage was developed during the _____ war.

Cold

Sage was developed during the _____ war. -Vietnam -Korean -Cold -Revolutionary

Cold

SAGE was developed during the

Cold War

Select what is true about persistent cookies

Collect information about user preferences Collect formation about the IP Address Collect password and username information

Match the Macintosh keyboard shortcut with the appropriate result: Command+V Command+C Command+Z Command+I

Command+V - Paste Command+C - Copy Command+Z - Undo Command+I - Italicize

Select what's true about macro viruses

Commands in the macro language set off the destructive event When file is opened the macro virus execute Initiated by downloading and opening on infected attachment

OS doesn't launch properly files get deleted or encrypted strange error messages or pop-up ads.

Common symptoms of a computer virus infection include

A program that takes an entire program, check the source code for errors, and converts it into a machine language is a ________.

Compiler

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

Compiler

Virus Symptoms

Computers infected with a virus exhibit many symptoms including: - OS doesn't launch properly - files get deleted or encrypted - strange error messages or pop up ads - documents won't save - computer runs notably slower - programs launch on their own

slower

Contact your ISP if your actual Internet speed is _____ than advertised.

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Cookie

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a/an _____.

Cookie

Managing Cookies in Firefox

Cookies can store a wide range of information including: - personally identifiable information (name, address, email, phone number) - this information can only be stored if you provide it

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

What was the major question that ARPAnet wanted to solve? -Could documents be sent over a network? -Could a network be built that would continue to work even if multiple parts collapsed? -Could pictures be sent over a network? -Could confidential information, such as credit card numbers, be sent securely over a network?

Could a network be built that would continue to work even if multiple parts collapsed?

What was the major question ARPAnet wanted to solve

Could a network be built that would continue to work even if multiple parts of it collapsed

Select the usual tasks of information systems (IS) program managers.

Creates and implements an organization's IS security measures Responsible for keeping an organization's Wi-Fi network secure

Select the usual tasks of a data analyst.

Creates report for senior management Collects data Interprets information provided by the database

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

Creative

The first commercially available computer with a graphical user interface was NeXT's ___ computer. -ThinkPad -Apple -Cube -Commodore

Cube

The first commercially available computer with a graphical user interface was NeXT's ____ computer.

Cube

The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.

Cyberattack

A deliberate misuse of computers and networks, ______ use malicious code to modify the normal operations of a computer or network

Cyberattacks

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

Cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.

Cybercrime

___ is a crime in which a computer is the object of the crime or is used to commit a crime or offense.

Cybercrime

Which of the following statements about Facebook is true?

Cyberstalking and online predators are a real problem on Facebook.

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

Cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.

Cyberterrorist

A business brand is derived from all of the following except: A. What their competition perceived them to be B. Who people perceive them to be C. Who they are D. What goals they want to accomplish

D

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ : A. Web presence B. Interpersonal skills C. Social media D. Writing private journal entries

D

Which of these operating systems is based on Linux and used on smartphones? A. iOS 9 B. Windows 10 C. OSX D. Android

D

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

A ____________ will automatically assign IP addresses to a host who leases the IP addresses from the service provider.

DHCP

Often IP addresses are structures and assigned by a service called a ___________ or by a network administrator DHCP DCHP SPI ISP

DHCP

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.

DNA

The Internet service that tends to provide the most consistent speeds is

DSL

The Internet service that tends to provide the most consistent speeds is _____.

DSL

The Internet service that tends to provide the most consistent speeds is _____. -DSL -cable Internet -cellular Internet -dial-up Internet

DSL

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production

DSS

which category of management information systems (MIS) focuses on providing forecasting capabilities for sale and production?

DSS

3-5

DVD

Which of the following are considered storage media?

DVDs Blu-ray discs

Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.

Data

Many individuals find it less expensive to add to their cellular ____ plan and only access internet through phone

Data

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.

Data Administration

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

The system analysis step of the SDLC involves 3 phases. Select these three phases.

Data collection Analyze data Prepare the system specifications.

buses

Data flows between different parts of the computer via _____ .

Which of the following would be considered a cybercrime?

Data manipulation

What element of a database field specifies the data in a field such as text, numeric, or data/time?

Data type

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .

Database

Most search engines use similar technology to execute an Internet search. The search engine uses a _____ of Internet URLs, each record in the database contains information including the site URL, description and title, and keywords included in the site.

Database

To view any relationships between the Drivers table and the ticket table below, where would you click first? AKA how do you see relationships between two different tables?

Database tools

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .

Databases

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

Debugging

SAGE was developed by the US Department of

Defense

SAGE was developed by the US Department of ___ .

Defense

SAGE was developed by the US Department of ___ . -Agriculture -Energy -Defense -Education

Defense

You can change your Firefox setting to allow you to

Delete cookie Approve cookie Deny cookie

There are a variety of cookie settings that can adjusted in Google Chrome including

Deleting cookies Blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains

In the settings area of each browser you should consider

Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings

Which of the following are the steps involved in programming?

Describing the task in a precise manner Categorizing which parts of a task a digital device can perform Translating the task into the language the computers CPU can use

Malware

Designed to: - steal information - destroy data - incapacitate a computer or network - frustrate the user Common types of malware: - viruses - worms - trojan horses

From and/or Subject lines

Determines if the email will be opened

Writing software follows a 5-step process called the PDLC. PDLC stands for the Program ___ Life Cycle.

Development

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

Dictionary

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

Digital-analog converters

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

Distributed

A DDos attack is when a computers that have been infected by a virus act as "zombie" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for

Distributed Denial of Service

What does DDoS stand for?

Distributed Denial of Service

DoS and DDoS Attacks

DoS Attack: - interrupt network traffic by flooding servers with too many requests DDoS Attack: - most common DoS attack - Botnet sends out illegitimate messages creating huge volumes of network traffic - high volume traffic causes a network crash

A _____ name identifies a server site on the internet.

Domain

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a

Dos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called

Dos attack

Which of the following are ways to safely download antivirus software

Download the software from a known anti virus software vendor Download the software from a trusted site like www.cnet.com

Transferring a file from the Internet to your digital device is called _____.

Downloading

What does DHCP stand for?

Dynamic Host Configuration Protocol

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

electronic date interchange

EDI stands for ___ .

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

Business management software that encompasses nearly all business activities in a corporation is called ___ software

ERP

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

Business management software that encompasses nearly all business activities in a corporation is called

ERP software

EDI stands for ___ .

Electronic Data Interchange

EDI stands for _____.

Electronic Data Interchange

cloud

Emailing a file to yourself is an example of using ___ storage.

______ software converts readable data into an unreadable form before transmitted on a network

Encryption

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

English

executive rely on ___ software because it provides tools to run an entire corporation

Enterprise Resource Planning

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

Which pf these should business owners do to help protect their data

Establish strong firewall protection for their business's network Create strong password protections and protocols Ensure antivirus software is installed and up to date

Which of these should business owners do to help protect their data.

Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.

Which of these should business owners do to help protect their data.

Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.

The final step in the system development life cycle is maintaining the system.

Evaluation phase System audit

The 3 phases that should be accomplished in the investigation step of the SDLC include:

Examining alternatives Reporting Defining the problem

Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.

Extensible Markup Language

Installing the printer is the third step in setting up a Wifi network at home T/F

F

More

Fiber optic cable is _____ expensive than coaxial cable to install.

more

Fiber optic cable is ________ expensive than coaxial cable to install

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

Field

In a database a _________ is a group of related characters in a database table that represents a characteristic of someone or something.

Field

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

File Transfer

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP). -Film Tactics -File Transfer -File Tethering -Fixed Tempo

File Transfer

A protocol commonly used to transfer large files from one server to another on the Internet is the

File Transfer Protocol

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transfer Protocol

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ . -Transfer Control Protocol -File Transfer Protocol -Hypertext Transfer Protocol -Simple Mail Transfer Protocol

File Transfer Protocol

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

Firewall

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.

Firewall

These updates can cause network issues and can cause a network outage. If you experience trouble may need to reboot the hardware device.

Firmware updates

Defining the problem is the ___ step in the Program Development Life Cycle.

First

A graphic representation of a process is called a ___ .

Flowchart

individual users

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

When you need to link 2 tables in a database that don't have a field in common, one solution is to create a _____ in one table that links to the primary key in the other table.

Foreign key

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

Forms

All of the following are considered e-commerce transactions except

G2B

All of the following are considered e-commerce transactions except

G2B.

Which of these devices are manufactured by Samsung?

Galaxy Note

The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .

Game apps

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

Generation

Select the email services.

Gmail Outlook iCloud

Put the steps to have Firefox block cookies from one website in the correct order

Go to the website you wish to block from setting cookies in Firefox Right-click In the page Underneath

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

Graphical

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular. -Command -Wiki -Graphical -Wigi

Graphical

Letting computer users drag images and documents across their computers' monitors made the ____ User Interface very popular.

Graphical

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .

HDX

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.

Hacker

The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.

Hacktivism

Hacking computer systems for a politically or socially motivated purposes is called

Hacktivist

the act of hacking, or breaking into a computer system for a politically or socially motivated purpose.

Hactivism

Cyberbullying

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

Elly wants to find social media postings regarding base jumping over the snake river. she should use a ____ search

Hashtag

Firewalls Anit virus programs Anit malwarre apps

Help protect against worms and hackers Help protect against viruses Help protect against malware

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

Heuristic-based detection Signature-based detection

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

Hierarchy

When determining how much cell phone data you need it is important to consider

How much data you currently use

The World Wib Web refers to the billions of _______ files accessed through the internet

Hypertext

Your home WiFi gets its dynamic IP address from your ________.

ISP

internet service provider

ISP stands for

Internet service provider

ISP stands for:

Computer hardware and software that an organization uses to increase its performance is referred to as its

IT system

When you're creating a voice mail greeting on your business phone, you should tell the caller:

If possible, why you can't take the call When they can expect a return call The voice mail they they've reached

restore

If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .

video

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.

Which of the following statements about Instagram are true?

If you don't want to be tracked turn off geo-tagging in the settings under Location Services. If you don't want to be tracked turn off geo-tagging in the settings under Location Services. It is important to adjust your privacy settings so you can determine who follows you.

drag

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

3G

If you just need a phone for calling and texting, a ___ phone can save you money.

prepaid

If you just need a phone for emergencies, you might consider a ___ phone.

Keep software updated, particularly antivirus software. Physically secure computers to minimize risk of theft. Backup your data regularly

If you own a small business, what can you do to ensure your computers and data is kept secure?

excel

If you see the extension .xlsx, you know that you are looking at a(n) ___ file.

roaming

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___

According to US-CERT if you receive a phishing message you should contact them using which of the following method

In Outlook Contact the via the phone number

field

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

cache

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

analog

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

folders

In order to keep your files organized, it's a good idea to create ___ and place your files in them.

itunes

In order to sync your iPhone to your MacBook you must first open the ___ app.

optical

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

weaker

In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.

For ____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

Individual users

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an orgasnization's IS typically falls to the

Information systems (information technology) security manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___

Information systems (information technology) technician

below

Inkjet printers are often sold ____ their production cost.

All of the following are true about Instagram except

Instagram charges a fee to download the app

All of the following are true about Instagram except

Instagram charges a fee to download the app.

Select the true statements regarding Instagram.

Instagram is a photo sharing app that is available for download to a variety of digital devices. If you specify a location with your photo, you can opt to have Instagram check you in on Foursquare.

All of the following statements about Instagram are true except

Instagram is difficult to integrate with apps like Facebook and Foursquare.

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .

Integrity

The largest chip designing and manufacturing company in the world is ____ .

Intel

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

Intellectual

Although it sounds ironic, searching the ____ in your area is an efficient way to search for an ISP.

Internet

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP. -Craigslist -newspaper -Internet -Yellow Pages

Internet

Although it sounds ironic, searching the ________ in your area is an efficient way to search for an ISP.

Internet

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Which of these browsers was developed by Microsoft?

Internet Explorer

Which of these browsers was developed by Microsoft? -Safari -Internet Explorer -Firefox -Chrome

Internet Explorer

ISP stand for

Internet Service Provider

ISP stands for:

Internet Service Provider

ISP stands for: -Interweb Structured Protocol -Internet Speed Provider -Internet support provider -Internet Service Provider

Internet Service Provider

Katie

Internet connection

Firewall software used to block a user's access to specific internet content is called a

Internet filter

A program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C# ___ .

Interpreter

1. 2. 3. 4. 5. 6.

Investigation Analysis Design Development Implementation Investigation

When you request information from a website such as Wikipedia, the way its server knows which router to send the requested information to is because your router is identified by its ________ address

Ip

An object oriented programming language that is popular for writing apps for Android phone and tablets is

Java

An object oriented programming language that is popular for writing apps for android phones and tablets is

Java

An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .

Java

An object-oriented programming language that is popular for writing apps for android phones and tablets is _______.

Java

Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?

Java Javascript C++

A program that makes creating websites and webpages much faster is

JavaScript

A program that makes creating websites and webpages much faster is ___ .

JavaScript

Select the program that uses small programs called scripts to speed the programming process while creating dynamic Web pages.

JavaScript

JSON stands for

JavaScript Object Notation

Select appropriate business email etiquette practices

Keep attachments small Remember that potentially negative news is best given face-to-face

If you own a small business, what can you do to ensure your computers and data is kept secure?

Keep software updated Physically secure computers to minimize risk of theft Backup your data regularly

When creating your voice mail greeting for you business phone, it's important to:

Keep the message short and professional

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Keystroke

Select what is true regarding keystroke loggers

Keystroke loggers can record passwords and confidential information Can be hardware devices and software applications Software based keystroke logges are often a Torjan that is installed without the user's knowledge

Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of

Keystrokes Passwords Account numbers

The ___ cache is located directly on the processor itself.

L1

Another term for a programming code is a programming ___ .

Language

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.

Language

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

Large

Select what is true about packet sniffers

Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information

Graphical

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

graphical

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

Logical

The DBMS engine provides an interface for the end user of the database. This interface is called the _____ view.

Logical

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a _______.

Loop

A switch distinguishes between various devices within a network by their __ addresses. -BUS -IP -MAC -MCA

MAC

A switch distinguishes between various devices within a network by their ____ addresses.

MAC

All of the following are common ports that are included with laptop computers except

MIDI ports

The 2 most common audio file formats are WAV and ___ .

MP4

.accdb

MS Access database

1GL 2GL 3GL 4GL 5GL

Machine language, represented by a series of 1s and 0s Assembly language. An assembler cconerts 2GL into machine language High level programming language, uses a compiler to convert into machine language Specifically designed for created database management programs Extremely advanced. Uses statements rather than algorithms

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

Macro virus

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

Macro virus

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .

Macros

The final step in the SDLC has two phases, a system audit and an evaluation phase. The final step is referred to as ______ the system.

Maintaining

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Management

Because Microsoft access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a database ___ system

Management (DBMS)

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

Manipulation

wi-fi hotspot

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

unicode

Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.

optical drives

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

Broadband is measured in

Mbps

Broadband is measured in _____ .

Mbps

Broadband is measured in _____ . -Mbps -Kbps -Tbps -Gbps

Mbps

What does MAC stand for

Media Access Control

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

Mobile Switching Station (MSS)

Modem stands for

Modulated demondulator

Select the usual tasks of database administrators (DBAs).

Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data

magnetic hard drives

Most desktop computers use ___ to store data.

Select what's true about fee based and free antivirus software

Most fee base software comes with technical support One with positives of free anti virus software is their malware detection performance

256gb- 1 tb

Most new laptop computers come with how much storage?

virtual

Most smartphones and tablets produced today use a _____ keyboard

ssd

Most tablets and phones use _____ as their main storage device.

capacitance

Most touchpads use _____ to sense when a finger has moved across the pad.

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

Multidimensional

A complex database that organizes and stores information in a cube format and has measure attributes and features is called a _____ database.

Multidimensional

The technology that provides a type of firewall protecting by hiding internal IP addresses is called

NAT

Boolean operators are the words "AND", "OR" and _____. The use of Boolean operators can make a search more precise and return better results.

NOT

use the boolean operator ____ if you want to exclude certain results from your search

NOT

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

Netiquette

A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers

Network

Virtual private _________ (VPN) creates a secure connection between 2 computers.

Network

This is the privacy tab in internet Explorer. IS the slider in the image set to the right level to allow all cookies?

No, to save all cookies you need to move the slider all the way to the bottom

white hat hackers

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

Use _____ when you are searching for documents including one or another of your search words.

OR

JSON stands for JavaScript _____ Notation

Object

When inputs can easily be placed into different categories or classes, a(n) ___ -oriented analysis works well.

Object

Sometimes called Objected Oriented Programming(OOP),

Object Oriented Analysis

Select what's true about Trojan malware

Often uses to find passwords, destroy data, or to bypass firewalls Similar to viruses, but do not replicate themselves Often found attached to free downloads and apps

There are several ways to rename a folder in Windows. Which of these would work?

On the command bar, click Organize and then click Rename. Click the folder icon and press F2 to activate the edit mode. Right-click a folder and click Rename.

Find the incorrect statement about fee based antivirus and free antivirus software

One of the posties of free anti virus is their spam detection performance

CTRL + V

One way to copy a file to a new location is to click on the file and press CTRL + C, then move your cursor to the new site and press ___ .

Even though it is legal, which of the following would likely be prohibited by a typical business computer-use-policy

Online personal shopping

Safari accepts cookies and websites data from which of the following

Only from websites you visit

All of the following are protected against unauthorized use or distribution by intellectual property laws except

Open educational resources

Search engine _____ (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

Optimization

You own a pet care center. what fields might you enter when you create a table for dogs that you care for?

Owner's last name Pet's name Owner's address

There are a variety of techniques tha tare used to minimize the risk of harmful intrusions into a computer or network including

Packet filters Proxy

Specialized hardware or software that capture packets transmitted over a network.

Packet sniffers

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.

Parallel conversion Pilot conversion Direct conversion

packet

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

Peer-to-peer

BitTorrent utilizes no central server, instead opting to utilize a ________ structure where each device connected to a network has equal access to the shared files.

Peer-to-peer

Managers and network administrators should: Possible consequences of not setting a computer ethics policy

Periodically revieing computer ethics policies Establish ethics standards Enforce standards Instruct employees on standards

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

Persistent

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.

Persistent

2 to 4 gigahertz

Personal computer CPU clock speeds range between _______ .

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

Pharming

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as

Pharming

Which of the following describes phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving up private information

When you personally share an image on Pinterest it is known as a _____.

Pin

A request from one computer to another computer to respond with an electronic signal is called a

Ping

helium > traditional hard drives

Platters spin faster,Platters stay cooler,More platters can be placed in the same amount of space

Software that can be added to a browser to increase its functionality are called _______.

Plug-ins

Which of the flowing are symptoms of an online nuisance attack?

Pop up start appearing after you visit unfamiliar sites Frequent pop ups awhile searching the web or working in programs Receiving a lot of spam message or bounced back email messages

If you just need a phone for emergencies, you might consider a ___ phone.

Prepaid

The system analysis step of the SDLC involves 3 phases. Select these three phases

Prepare the system specification Analyze data - determine the system requirements Data collection - gathering info about needs and existing hardware and software

This is the options tab in Firefox. where would you click to adjust cookie settings

Privacy

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.

Profile

writing software follows a 5 step process called the PDLC.

Program development life cycle

Converting a task into commands that a computer can use to perform the task is called ___ .

Programming

Converting a task into commands that a computer can use to perform the task is called_____.

Programming

Which of the following are factors to consider to help protect the hardware of your digital device

Protecting a digital device from overheating magnetic fields humidity

Select the phase included in the system development step of the SDLC process

Purchasing necessary software Setting up, installing and testing the system Purchasing needed hardware

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file if will sent the file to an isolated area on the hard disk called

Quarantine

To search a database for information, create a ___ .

Query

To search a database for information, create a ___.

Query

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.

RAID

radio frequency ID

RFID stands for which of the following

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .

ROM

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called

Ransomeware

One version of this malware encrypts the victims data until a payment is made.

Ransomware

In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .

Record

The type of database that uses common fields to create links between tables is called a ___ database.

Relational

The type of database that uses common fields to create links between tables is called a database.

Relational

A link between tables in a relational database that defines how the data is related is called a _____.

Relationship

Checking how current the information is on a website helps to ensure ______. Out of date information can be an indicator that the site may not be the best resource.

Relevance

To display or distribute information from a database, programmers or database administrators create ___ .

Reports

To display or distribute information from a database, programmers or database administrators create_______.

Reports

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

Roaming

Software programs that hide the operating system and allows for the installation of hidden files are called

Rootkits

An internet filter is firewall software used to block a user's access to specific internet content. An internet filter can be installed on which of the following

Router Computer Server

Dual Band

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

dual band

Routers that can send internet signals over 2 distinct frequencies are called _______ routers

defense

SAGE was developed by the US Department of ___ .

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

prepare, analyze, data

SDLC 3 phases

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ . SSID ping handshake bluetooth

SSID

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ . -SSID -handshake -ping -echo

SSID

A signal transmitted every few seconds by a wireless router so that users' computers can find the WiFi hotspot is called

SSID

Every Wi-Fi signal is recognized by its ______________

SSID

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is

Safari

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ . -Internet Explorer -Mozilla Firefox -Google -Safari

Safari

Cold

Sage was developed during the _____ war.

cold

Sage was developed during the _____ war.

1 2 3 4

Scripted language High level programming Assembly language Machine language

To look for a file or folder in Windows 10, just type the file name in the __ box.

Search

Two main factors concerning your digital identity are privacy and ___.

Security

Two main factors concerning your digital identity are privacy and _____.

Security

business contacts professional peers

Select appropriate LinkedIn contacts.

maintain high levels of formality, especially with initial contacts consider if email is the appropriate means of communication

Select appropriate business email etiquette practices.

Fire HD Fire HDX Nexus Pro

Select the Amazon tablets.

lcd, led

Select the acronyms that describe a type of computer monitor.

A database can hold larger amounts of data A database can provide better data integrity

Select the advantages of using a database instead of a traditional filing system.

uses flash technology, uses the same technology that is found in USB drives has no mechanically moving parts

Select the characteristics of SSD storage.

holds approximately 4.5 GB of data uses pits and lands to store data

Select the characteristics of a DVD.

developed by Apple for Apple products used on iPhones and iPads comes with Siri, iTunes, iBooks, etc.

Select the characteristics of the IOS.

.mov, .avi

Select the common video file formats.

mheducation.com

Select the domain name.

Parents often use search engine filters to restrict offensive images from being displayed on computer monitors Filter settings are often acessed through a brower's preferences

Select the following statements that are true regarding filters

reduce the bandwidth needed to transmit a file reduce storage space requirements

Select the reasons for compressing a file.

Speedtest.net TestMy.net

Select the sites that offer Internet speed test services.

uses cell phone radio waves to transmit and receive Internet signals Many providers offer data packages that may place limits on uploading and downloading. Many smartphones can send and receive WiFi signal, allowing them to become hotspots.

Select the statements that are true regarding Cellular Internet service.

3D mapping, feature charting, skin texture analysis

Select the technologies used by facial recognition software.

monitors the databases performance develops and maintains the database itself establishes user privileges for the database to help protect the data

Select the usual tasks of database administrators (DBAs).

Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS

Select the usual tasks of information systems (IS) program managers.

Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database

Select what's true about object-oriented databases

Websites using cookies can collect your information and sell it to third parties Websites can track your surfing behavior and create a profile

Select what's true about the privacy risks with cookies

can transmit Wi-Fi signals in the 2.4 GHz frequency range can transmit Wi-Fi signals in the 5.0 GHz frequency range

Select what's true regarding dual band routers.

What does SSID stand for?

Service Set Identifier

After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.

Settings

Direct Parallel Pilot Phased

Shuts down the old system and starts a new system Old and new systems run side by side for a while Starts in one area of the organization and then is deployed to the rest of the organization Implements new areas of the system in a predetermined period of time

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

Signal

The signals needed to run a network travel on a variety of transmission media including Ethernet, phone, and cable TV (coax) lines. Check to make sure cables are not damaged and that all cables are plugged in properly.

Signal quality

If your actual internet speed is ______ than advertised then contact them

Slower

Web cookie First party cookie Third party cookie

Small test file of information created by websites you visit that your web browser stores on your hard disk Small test file of information created by a website you visit that keep track of your personal preference and the current web browsing session Small test file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

Pictures or videos taken and shared on Snapchat are called _____.

Snaps

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

Sniffers

separation

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.

browsers

Software applications that allow users to access and surf the World Wide Web are called ___ .

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.

Software piracy

plug ins

Software that can be added to a browser to increase its functionality are called ___ .

plug-ins

Software that can be added to a browser to increase its functionality are called ___ .

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

remote desktop

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

filters

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

erasing a program you purchased then sold to a friend

Software theft occurs when someone engages in all of the following except _______.

video

Some apps that use a surprising amount of data are those that include embedded ___ .

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

An unsolicited email message is called ____.

Spam

UBE

Spam messages are sometimes referred to as ___.

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processor

Spectre Meltdown

voice pitch, voice frequency, speech rhythms

Speech recognition software uses which of the following characteristics?

Select the sites that offer Internet speed test services. -Speedtest.net -TestMy.net -Wikipedia.com -Reddit.com

Speedtest.net TestMy.net

Select the sites that offer Internet speed test services.

Speedtest.net, TestMy.net

Which of the following are online nuisance

Spyare Spam Spoofing

This is the Windows Firewall area where you can adjust various firewall settings. Put the steps that allowed yo uto get to the screen correct order

Start button Control panel System and Security Windows Firewall

When reporting a computer ethics violation of co-worker to your employer, it's important to:

State only what you witnessed Be brief and direct

data theft

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

Adding a microSD card (when possible) increases your phone's ___ capacity.

Storage

Select what's true about object-oriented databases.

Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database

Select the usual tasks of information system program managers

Supervising IS technicians Developing training plans and policies for IS Working with developers and senior management to procure and implement IS processes

Select the usual tasks of information systems (IS) program managers.

Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS.

Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.

Surface Pro 4

Iphone Other phone

Swift Java

Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .

Syncing

All the devices sharing your router and WiFi signal share the same IP address. T/F

T

Disabling your router's SSID transmission makes it harder for piggybackers to use your bandwidth. T/F

T

Most home routers come with built in switches that identify the different computers, printers, game consoles and other devices that are connected to the router. T/F

T

The internet is based on a client server relationship T/F

T

Examples of management information systems (MIS) include _____ .

TPS DSS ESS

The mobile switching station can connect calls to mobile switching stations belonging to other cellular networks.

TRUE

A collection of related records in a database is referred to as a ___

Table

A collection of related records in a database is referred to as a _____.

Table

A collection of related records in a database is referred to as a ________.

Table

Visiting pornography

Tell your boss that you've witnessed the co-worker visiting porn Be brief and direct

Visting pornography sites while using and/or network violates your company's computer-use policy. you've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting prom sites at work and determine that you should report this activity. other co-workers also noticed this violation. you should

Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network

Sharing an Internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the Internet, is referred to as ___ .

Tethering

Ironically, the expenses for calling and ___ are among the smallest charges found on a cell phone bill.

Texting

peer-to-peer

The BitTorrent protocol is often called ___ file sharing.

logical

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

cable Internet

The Internet service that tends to provide the most consistent speeds is _____.

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

What group determines the standards for the World Wide Web? -The World Wide Web Consortium (W3C) -The Internet Corporation for Assigned Names and Numbers (ICANN) -Internet Organization for Standardization (ISO) -Internet Electronics and Electrical Engineers (IEEE)

The World Wide Web Consortium (W3C)

Tim Berners-Lee

The World Wide Web was created through a collaboration led by

Tim Berners-Lee

The World Wide Web was created through a collaboration led by ___ .

GPU

The ___ is a computer within your computer that creates images.

sampling

The accuracy of a digital recording is determined by the device's ___ rate.

native

The actual number of pixels in a monitor is called ___ resolution

True

The amount of RAM a computer comes with or the ability to expand its RAM is an important consideration when buying a new device

True

The android OS is owned and maintained by google

ergonomics

The art and science of creating output that provides information in the most useful manner is called ___ .

Bandwidth

The capacity of a particular transmission medium is called its _____.

bandwidth

The capacity of a particular transmission medium is called its _____.

Router

The device that connects 2 networks is a _____.

dot pitch

The distance between two adjacent sub-pixels on a display is referred to as ___ .

SaaS

The distribution of computer applications over the Internet. Commonly referred to as web apps.

saas

The distribution of computer applications over the Internet. Commonly referred to as web apps.

Cube

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

cube

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

cube

The first commercially available computer with a graphical user interface was NeXT's _______ computer

top level domain

The highest level in the domain name hierarchy is known as the

Top Level Domain

The highest level in the domain name hierarchy is known as the ___ .

top level domain

The highest level in the domain name hierarchy is known as the ___ .

trade

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

cyberattack

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

right click

The most common method of renaming files and folders is to simply __ on the item and select Rename.

apple

The mouse was developed by which company?

resolution

The number of pixels in a display is called the display's ___ .

resolution

The number of pixels in an image is called the image's ____ .

WEP

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

file transfer

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

data

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

signal

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

WPA2

The standard for wireless network privacy and protection is known as ___ .

The third steps of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed.

The step is called system design

Along with the From line, what is the most important factor in ensuring your message is read?

The subject line

title 5

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

aspect ratio

The width of a screen compared to the height of a screen is referred to as ___ .

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

Modulator-demodulator

The word modem stands for ____.

your antivirus software will ensure that your files are safe

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

Right-click a folder in the folders list. Click New and then click Folder. On the command bar, click New folder. Right-click any blank area in the Contents pane. Click New and then click Folder.

There are several ways to create a new folder in Windows. Which of these would work?

On the command bar, click Organize and then click Rename. Right-click a folder and click Rename. Click the folder icon and press F2 to activate the edit mode.

There are several ways to rename a folder in Windows. Which of these would work?

windows phone

Though not yet commercially successful, the ___ was developed by one of the worlds largest software manufacturers

The World Wide Web was created through a collaboration led by

Tim Berners-Lee

The World Wide Web was created through a collaboration led by ___ .

Tim Berners-Lee

The World Wide Web was created through a collaboration led by ___ . -Bill Gates -Senator Al Gore -Tim Berners-Lee -Steve Jobs

Tim Berners-Lee

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Title 5 - Copyright Protection Proviso.

the titles in the DMCA that directly impact digital copyright issues include all of the following except _________

Title 5- copyright protection proviso

view

To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .

forms

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

toner

To create an image with a laser printer ___ is(are) drawn to the drum.

players

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

search

To look for a file or folder in Windows 10, just type the file name in the __ box.

intellectual

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

ctl + x

To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.

Query

To search a database for information, create a ___ .

The highest level in the domain name hierarchy is known as the

Top Level Domain

The highest level in the domain name hierarchy is known as the ___ . -Top Level Domain -Threshold Layer Domain -Primary Domain -Eminent Archon Domain

Top Level Domain

The highest level in the domain name hierarchy is known as the _______.

Top Level Domain

Match the business information activity

Top level: Uses information systems for foresee corporate opportunities and threats. monitor Middle managers: Uses information systems for communication policies and performance reports up and down the corporate ladder. reporting purpose Uses information systems for recording line employee performance. scheduling daily and weekly

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

Trade

The TTP stands for

Trans-Pacific Partnership

Phishing Ransomware Keystroke-logging Tojan

Tricks user into revealing usernames and passwords by appearing legitimate When activated encrypts files on user hard drive and then sells a decryption programs When activated, saves all keystrokes for subsequent transmission to virus creator

Often accompanying download music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a

Trojan

A program that appears legitimate, but executes an unwanted activity when activated is called a

Trojan horse virus

Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars

True

True or false? iCloud is a form of mail?

True

true or false: The amount of RAM a computer comes with or the ability to expand it's RAM is an important consideration when buying a new device.

True

2

Twitter recommends using no more than ___ hashtags per Tweet.

ongoing

Two common categories of cybercrimes include single events and _____ series of events.

gigabytes

Typical SSD capacities for tablet computers or smartphones are measured in

Spam messages are sometimes called _ and are used for a variety of marketing purposes including selling products and services

UBE

Uniform

URL stands for ___ Resource Locator.

uniform

URL stands for _____ resource locator

Click on the organization below that you should contest if you receive a phishing message

US-CERT

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

URL stands for ___ Resource Locator. -Uniform -Ultimate -Ultron -Universal

Uniform

URL stands for ____ Resource Locator.

Uniform

What are symptoms that your system has been hacked

Unwanted browser toolbars Redirected internet searches Fake emails or social media messages from your account

Top level management (business executive and presidents)

Use information systems to monitor overall business performance

Which of the following are widely used tactics that can help keep you safe on the Web

Use your browser's private browsing mode Consider using a VPN Make sure the sites you visit use HTTPS

Persistent cookies store information about

User preferences

Persistent cookies store information about _____.

User preferences

Persistent cookies store information about.

User preferences.

optical

Using reflective material to store data that can be read using a laser is called ___ media storage.

holographic

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

Sprint and T-Mobile, AT&T and _______ are the major national cell phone providers in the US

Verizon

Some apps that use a surprising amount of data are those that include embedded ___ .

Video

On the ribbon, where do you click to change from data sheet view to design view?

View button which under the Home tab

This is the data sheet view of a table in a database. Where would you click to switch to the design view?

View button which under the Home tab

Software that infects a computer and is created using computer code is called a computer _____.

Virus

Select the audio file compression formats.

WAV MP4

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

WEP

The original wireless network privacy and protection standard for Wi-Fi was known as ___ . -handshake -WEP -WPA2 -echo

WEP

The original wireless network privacy and protection standard for WiFi was known as

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ . -WPA -echo -ping -WPA2

WPA

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected. -WEP -ping -modem -WPA2

WPA2

In addition to activating ____ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

The standard for wireless network privacy and protection is known as

WPA2

The standard for wireless network privacy and protection is known as ___ .

WPA2

The standard for wireless network privacy and protection is known as ___ . -WPA2 -WPA -WEP -WEP2

WPA2

The standard for wireless network privacy and protection is known as ________ WEP WEP2 WPA WPA2

WPA2

Internet signal, modem, router

What 3 items are needed to install a home WiFi network?

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

What field name will the data fall under What data type will be included

The World Wide Web Consortium (W3C)

What group determines the standards for the World Wide Web?

W3C

What group determines the standards for the World Wide Web?

operating system

What manages hardware and software, supports the computer's basic functions, and runs programs?

usb port

What type of port do most digital devices use to attach peripherals?

could network be built that would continue to work even if multiple parts collapsed?

What was the major question that ARPAnet wanted to solve

Could a network be built that would continue to work even if multiple parts collapsed?

What was the major question that ARPAnet wanted to solve?

network size/coverage. service/speed. pricing

When choosing a cell phone provider, factors to consider include

how much data you currently use.

When determining how much cell phone data you need it is important to consider

active pixel sensor

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

double click

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double-click

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

application

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

satellite, cable

Which are of the following are Internet service options?

SCMS

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently

DSS

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

shorter, more data

Which is true regarding the length of a USB cord?

cable internet

Which might be a choice for Internet service in your area?

cable internet

Which might be a choice for internet service in your area

gif

Which of the following file extensions is commonly used for drawings?

.docx

Which of the following file extensions is commonly used for term papers and other word processing tasks?

will users be streaming data ?

Which of the following should be considered when choosing an ISP?

internet explorer

Which of these browsers was developed by Microsoft?

.exe

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

fiber optic

Which transmission media has the largest bandwidth?

projective capacitive

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

a transistor, a hole in a punch card

Which would be used to store a single bit of data?

Besides the Database Tools tab, where else could you click to view any relationships between the Drivers table and the Tickets table (below) while in design view?

While viewing a table in design view, you can see relationships using either the database tools tab or the design tab

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.

White Hat Hackers

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

White hat hackers

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service. -IP Address -LAN -GPS -Wi-Fi hotspot

Wi-Fi hotspot

Many cellular ISPs offer modem/router combination devices that can create a ____ wherever there's adequate cell service.

WiFi hotspot

Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.

Windows Phone

Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.

Windows phone

remains the same

With optical zoom, resolution ____ when focusing on distant objects.

WWW stands for

World Wide Web

WWW stands for ___ ___ ___ . -Wrestling With Wombats -World Wide Wikipedia -Western Wi-Fi Wisdom -World Wide Web

World Wide Web

A destructive program that replicates itself throughout a single computer or across a network is called a

Worm

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

Common types of malware include

Worm Tojans Viruses

Select the statements that describe a computer programmer's algorithm

Written in the form of a flowchart Written in a natural language, such as English

While not technically a programming language, ___ refers to the protocols that allow content to displayed on the web.

XML

Which of the following are true statements regarding LinkedIn?

You can use LinkedIn to apply for jobs. LinkedIn includes a resume tool to assist you in creating a professional resume.

file explorer

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

Select the reasons why you might want to add a microSD card to your smartphone.

You want to save more music files. You want to save more image files (photos).

save as

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

Router

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

Your anti-virus software will ensure your files are safe.

zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a _____computer

A computer controlled by a hacker is called a ____.

Zombie

A computer controlled by a hacker is called a _____.

Zombie

A computer controlled by a hacker.

Zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a

Zombie

webcam

a camera that takes photos or streams video into a computer or over the internet is called a

Individual database

a combined set of data files. intended for use by one person

true

a computer platform is commonly referred to as an operating system or OS

worm

a destructive program that replicates itself throughout a single computer or across a network is called a

wire-wire

a form of email fraud where criminal change the account where money is being transferred is called a _______ scam

flowchart

a graphic representation of a process is called a

zip

a lossless compression format

cyberterrorist

a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

top-down

a programming design that breaks down a problem into a series of tasks is called ___ programming

DVDs store data using ___ .

a reflective coating that has pits and lands

Memory Cache

a relatively small area of memory (measured in kilobytes or megabytes) quickly accessible by a processor

cookie

a small text file or information created by websites you visit that your web browser stores on your hard disk is called a

MAC

a switch distinguishes between various devices within a network by their ________ addresses

Which would be used to store a single bit of data?

a transistor a hole in a punch card

pharming

a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called

All hosts on the same network share the same established network address but are assigned what?

a unique host number for example: 262.168.147.240 and 262.168.242

The three constraints are: a. Factors that pull the project manager in opposing directions. b. Negative Stakeholders c. Budget restrictions that must be met d. Dealines that involve penalties in case they are violated.

a. Factors that pull the project manager in opposing directions.

Which of the following criterion is key to recognizing that a set of tasks is a project? a. The setting of a start and end date b. The number of tasks must be high c. The complexity of the tasks must be high d. None of the above

a. The setting of a start and end date.

Select the characteristics of cellular service a. many smartphones can convert cellular signals into Wi-Fi signals b. provides broadband internet service in all areas c. allows mobile devices to access the internet d. fastest-growing ISP

a. many smartphones can convert cellular signals into Wi-Fi signals c. allows mobile devices to access the internet d. fastest-growing ISP

Selec the statements that are true regarding a Wi-Fi's SSID a. most routers transmit the SSID every few seconds so raoming devices can find the signal b. Once an SSID has been established it cannot be changed. c. In home networks, after all letgitimate devices have connected to SSID once, transmitting the SSID is unnecessary d. An SSID is the Wi-Fi's name

a. most routers transmit the SSID every few seconds so raoming devices can find the signal c. In home networks, after all letgitimate devices have connected to SSID once, transmitting the SSID is unnecessary d. An SSID is the Wi-Fi's name

Select what's true about packet switching a. the internet uses packet switching to transfer data and information between hosts b. packet switched networks rely on single fixed lines between hosts c. all packets are routed through a network based on the associated address information d. addressing information and data are included in each packet

a. the internet uses packet switching to transfer data and information between hosts c. all packets are routed through a network based on the associated address information d. addressing information and data are included in each packet

Select the statements that are true regarding switches a. usually integrated in the routers of home networks b. primary function is to connect two networks c. ensure correct data is transferred to and from the correct computers in networks d. connect computers and other devices within a network

a. usually integrated in the routers of home networks c. ensure correct data is transferred to and from the correct computers in networks d. connect computers and other devices within a network

A written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners is called an ____ use policy.

acceptable

before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___ user policy

acceptable

Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's

acceptable user policy

In Outlook express, you can create a new message and drag and drop the phishing email into the new message. address the message to [email protected] and send it In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected].

according to US-CERT if you receive a phishing message you should contact them using which of the following methods

storage

adding a microSD (when possible) increases your phone's capacity

developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network _ Translation provides a type of firewall protection by hiding internal IP addresses

address

monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ___

administrator

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

flowchart

after the problem has been clearly defined, the next step in the PDLC is the create or plan an algorithm. this plan is usually written as a ____ and is written in an ordinary language, such as english.

english

after the program has been clearly defined, the next step in the PDLC is to create the plan or algorithm. this plan is usually written as a flowchart, and is in written in an ordinary language such as ___

In the planning step of the PDLC another word for "plan" is

algorithm

Written in natural language and in the form of a flowchart, a programmer uses a

algorithm

post vacation photos to show your friends where you travelled

all of the following are best practices when using linkedin except

high frequency RFID can transmit signals further than 1500 feet

all of the following are true about RFID except

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

alpha

internet

although it sounds ironic, searching the _______ in your area is an efficient way to search for an ISP

script kiddies

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs that others have written are called

What 3 items are needed to install a home WiFi network?

an Internet signal a modem a router

What 3 items are needed to install a home WiFi network? -an Internet signal -a modem -a Bluetooth device -a router

an Internet signal a modem a router

What 3 items are needed to install a home WiFi network?

an Internet signal, a modem, a router

DDos

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack

What is required to send an instant message from a mobile device?

an internet connection

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.

analysis

Collecting data, interpreting information gleaned from a data and preparing reports for senior management are tasks that are typically assigned to a data

analyst

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data ___

analyst

Select the functions of a Digital Signal Processor

analyzes signals received from the analog-digital converter to enhance audio quality reduces unwanted noise moderates call volume

mcafee, norton, avg, google

anti-virus software options

Select the popular video teleconferencing applications.

apple facetime google hangout microsoft skype

.mpeg4

audio file

WAV, mp4

audio file compression formats

Select what's true about how IP addresses are determined a. a home WiFi network will typically have the same IP address assigned to it every time someone logs on b. An IP address is determined by the network on which it is hosted c. Often IP addresses are structured and assigned by a service called a Dynamic Host Configuration Protocol (DHCP) d. all hosts on the same network share the same established network address, but are assigned a unique host number

b. An IP address is determined by the network on which it is hosted c. Often IP addresses are structured and assigned by a service called a Dynamic Host Configuration Protocol (DHCP) d. all hosts on the same network share the same established network address, but are assigned a unique host numbe

A project to expand an airport in a city may have which of the following as a stakeholder with a negative interest: a. The administration of an airline company b. The local residents of the city c. The local restaurant owners near the site d. All of the above

b. The local residents of the city

The formal study Project Management involves the study of: a. The particular field in which the project is concerned with b. The nine knowledge areas c. International trade laws d. All of the above

b. The nine knowledge areas

Project Management is about balancing _____, _____, and _____ while achieving a final goal: a. Budget, employees and money b. Time, budget and quality c. Money, customers and employees d. Time, sources and employees

b. Time, budget and quality

A 4G LTE cell phone signals often provide internet download speeds that _______ the download speeds of DSL providers a. are slower than b. meet or exceed

b. meet or exceed

Choose the reasons for purchasing broadband internet service a. you want to save money over a dial-up connection b. you need relatively high-speed internet service c. you have several devices online at the same time d. you want to stream music or video

b. you need relatively high-speed internet service c. you have several devices online at the same time d. you want to stream music or video

The amount of data that a transmission media can carry in a given amount of time is called the media's ______ bandwidth broadband width

bandwidth

The capacity of a particular transmission medium is called its

bandwidth

The capacity of a particular transmission medium is called its _____. -bandstrength -bandwidth -latency -throughput

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____. -bandwidth -broadband -baseband -latency

bandwidth

Cell towers are connected to ___ .

base transceiver stations

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

be brief and direct state only what you witnessed

swift

because objective c was difficult to write in, apple developed ___, a programming language for writing software for the Mac OS and the IOS

The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.

beta

The final steps in the PDLC process including testing and documenting the software. When testing is conducted bu potential customers of the software, it's referred to as

beta test

If a problem can be reduced to a true or false question. it can easily be written in a computer program. A true/false question is called

binary

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

The smallest unit of data storage is a ___ .

bit

A _ hat hacker breaks into computer system with the intent of causing damage or stealing data

black

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.

block

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker

block

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

bluetooth

keywords

both social and non-social media search results

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal. -multiple carrier -bandwidth -broadband -latency

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ____ signal.

broadband

Mbps

broadband is measured in

Software applications that allow users to access and surf the World Wide Web are called

browsers

Software applications that allow users to access and surf the World Wide Web are called ___ . -search engines -Internet Protocols (IPs) -browsers -Standard Operating Procedures (SOPs)

browsers

Select appropriate LinkedIn contacts.

business contacts professional peers

AUPs

business owners, copyright holders, and network administrators publish ____ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

One character of information, for example, a letter or a number consists of one ___ of storage

byte

Most PC games have been written in either ___ or ___ .

c c++

Which of the following can be considered a project? a. Volunteering at the local community center b. Eating healthy c. Losing 10 lbs by June 1st d. Getting better at my current job

c. Losing 10lbs by June 1st

In recent years, educators in the project management field have added Quality as a forth constraint. This means that the final product: a. Does not meet expectations b. Went over budget c. Meets expectations d. Is a failure

c. Meets expectations

One fo the leading software tools in PM is MS Project. The most common view there is: a. The flowchart view b. The spreadsheet view c. The Gantt chart view d. The print view

c. The Gantt chart view

Which of the following many consider to be the first project in which modern project management tools were applied? a. The building of the pyramids b. The Great Wall of China c. The Manhattan Project d. All of the above

c. The Manhattan Project

Which of the following is an authority in the formal study and profession of Project Management? a. The Project Institute b. The TSI Institute c. The PMI Institute d. The PMJ Institute

c. The PMI Institute

Put the steps for how circuit switching works when placing a land line based phone call in the correct order a. when the call is received a circuit is established and will remain open for the entire length of your call b. dial a number, then the switch connects to other switches along the PSTN. This forms a physical path between your phone and the person you are calling. c. Pick up the receiver which creates an open a connection to the local telephone switch d. once you hang up the phone the circuit is disconnected and the switches and wire pathways that had been dedicated to your phone call are now free again.

c. b. a. d.

Which might be a choice for Internet service in your area?

cable Internet

Which might be a choice for Internet service in your area? -cable Internet -UV Internet -infared Internet -Morse Internet

cable Internet

Most touchpads use _____ to sense when a finger has moved across the pad.

capacitance

base transceiver station

cell towers are connected to

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

checks

you have several devices online at the same time you need relatively high-speed internet service you want wi-fi in your home

choose the reasons for purchasing broadband internet service

When you visit a web page, your computer and web browser act as a _____ because the computer is requesting Internet access from your ISP and the web browser is requesting the web pages from the web server that hosts the web site laptop mainframe server client

client

________ computer that requests resources such as a web page, spreadsheet, image file, or services from another computer or network

client

Emailing a file to yourself is an example of using ___ storage.

cloud

List examples of internet transmission media

coaxial TV cable Wifi radio waves telephone wire

Select the common Internet transmission media.

coaxial cable telephone wire cell phone radio waves

lage database, often called data banks, that cover particular subjects are referred to as ___ databases

commercial

viruses, worms, trojan horses

common types of malware include

thermal printer

commonly used for receipts

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

compiler

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

computer

IT system

computer hardware and software that an organization uses to increase its performance is referred to as its ____

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling

conference

A common feature of a business landline (hardwire) telephone services is the ability to have multiple users on the same call. This feature is _____

conference calling

In the work environment, it is often necessary have multiple users on the same call. This feature is

conference calling

Select the characteristics of a Base Transceiver Station

connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)

Select the characteristics of a router.

connects networks provides hardware firewall protection usually incorporates a switch

programming

converting a task into a commands that a computer can use to perform the task is called ___

Small test files created websites you visit that your web browser stores on your hard disk is called

cookies

persistent

cookies stored on a computers hard drive and used to collect and store information about user preferences, password and username information, IP address, and or data on web surfing behavior are called _______ cookies

A form of projection provided by the laws of the US for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural and audiovisual creations is called a _____.

copyright

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

Because a data breach can hurt a business's reputation as well as being extremely ___ most business owners take data security very seriously

costly

rootkits

create backdoor programs, delete files, install rogue files

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is ____ Commons

creative

A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called

cyber crime

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

cyberattack

identity theft, DDos attacks

cyberattacks include

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a

cyberbully

A Stakeholder is: a. A person or entity that holds a positive interest in a project b. A person or entity that may indirectly be affected by a project. c. A person or entity that holds a negative interest in a project. d. All of the above

d. All of the above

A project may require or involve _________. a. Risk or uncertainty b. A Budget c. Resources d. All of the above

d. All of the above

The triple constraints involve: a. Cost, Time, and Communication within a project b. Cost, Human Interaction and Human Resources in a project c. Time, Quality and Due Dates of a project d. Time, Quality and Cost of a project

d. Time, Quality and Cost of a project

The technology that allows or the electronic communication of business-oriented transactions and information between people and organizations is called electronic _____ interchange.

data

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___

data analyst

One disadvantage of cloud storage is that

data is only available when you're online.

distributed database

data is stored in different physical locations - accessed through a client/server network

Disgruntled

data theft

Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___

data theft

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___. most often, this crime is committed by employees inside the company rather than outside hackers

data theft

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___

database

Because it can store virtually unlimited amounts of data that can be shared across networks, and because the data can be kept far more accurately, a ___ has many advantages over a traditional filing system

database

The national gallery of art in Washington, D.C. has nearly 100,000 pieces in its collection. To organize its collection it uses a relational ___ so that curators can locate specific pieces

database

To organize the different table of data, you should probably use a relational ____

database

To organize the different tables of data, the local police force probably uses a relational ____

database

you need to purchase concert tickets for your friends. you go to stubhb.com to find them. in stubhub.com you can search between hundreds of seats in thousands of venues and thousands of events. to organize this information in a searchable manner, stub hub uses a complex

database

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___

database administrator (DBA)

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

because he wanted to be able to sort gifts according to continent and time zones, in 1984 Santa switched from using long lists to using ___.

databases

After the code has been written there are nearly always mistakes the 4th step in the PDLC involves finding and correcting these errors in a process called

debugging

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

debugging

When referring to management information systems, DSS stands for ___ support systems

decision

operations

decision making software such as MIS

diamond

decision point

When referring to management information systems, DSS stand

decision support systems

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

decreased employee performance decreased network speed decreased network speed increased likelihood of security breaches

displays refresh rate

describes how fast each pixel in a display is updated, The higher the refresh rate, the smoother the video, describes the number of times per second a frame is advanced in a video, Videos play best with refresh rates at even multiples of the frame rate.

extensible markup language

designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in tags for web display

Devices with a separate system unit and a relatively large footprint are called _____ computers

desktop

IDS, which stands for intruder

detection system

From and/or subject lines

determines if the email will be opened

Purchasing the necessary software for the system is part of the system ___ step in the SDLC process.

development

Screen size is measured by the ___.

diagonal distance between the upper right and lower left corners of the screen

A digital presence created online by an individual, organization using a digital device is called a _____ identity.

digital

Signed into law by President Clinton in 1998, the _____ Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.

digital

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

digital - analog converters

A database that stores data in different physical locations and that users access through client/server networks is called a ___ database

distributed

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

distributed denial of service

A ___ name identifies a server site on the Internet.

domain

A ___ name identifies a server site on the Internet. -secondary -primary -domain -IP address

domain

A ____ name identifies a server site on the Internet.

domain

Before clicking send, be sure to ___ your email's attachment

double check

To avoid embarrassment, always ___ your attachment before clicking send

double check

Transferring a file from the Internet to your digital device is called _____.

downloading

Transferring a file from the internet to your digital devices is called ____.

downloading

it is important to think before click when _ software from the web

downloading

Routers that can send Internet signals over 2 distinct frequencies are called ____ routers.

dual band

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers. -2-wave -multi-ply -multi-band -dual band

dual band

Select the optical drives

dvd drive blu-ray player

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

dynamic

screen resolution

equals the number of pixels in a display, measures image quality

Software theft occurs when someone engages in all of the following except _______.

erasing a program you purchased then sold to a friend

When referring to management information systems, ESS stands for ___ support systems

executive

When referring to management information systems, ESS stands

executive support systems

Select the storage devices.

external hard drives USB drives

register

extremely small amount of memory (measured in bits) located throughout the processor

register

extremely small piece of memory (size is measured in bits) located throughout the processor

International laws on internet police are very similar.

false

Which transmission media has the largest bandwidth?

fiber optic

Which transmission media has the largest bandwidth? -telephone -coaxial -Wi-Fi -fiber optic

fiber optic

A URL identifies a particular __ address on the World Wide Web. -printer -Gettysburg -computer -file

file

A URL identifies a particular ____ address on the World Wide Web.

file

Software that limits the material that a browser fetches or that a search engine displays are called

filters

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

filters

Software that limits the material that a browser fetches or that a search engine displays are called ___ . -browsers -plug-ins -controllers -filters

filters

A security system separating 2 networks or even computers on the same network is called a ___ . -firewall -switch -modem -ping

firewall

The red arrow in the image is pointing at what component of a network designed to prevent unauthorized internet intrusions

firewall

Defining the problem is the ___ step in the Program Development Life Cycle.

first

A graphic representation of a process is called a

flowchart

A graphic representation of a process is called a ___ .

flowchart

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.

flowchart

Not tilted 4

flowchart

In a relational database, a common field that links two tables in a relationship but not a primary key is called a ___ key

foreign

Reports provide a means of artfully extracting information from a database; ___ provide a means of accurately entering data into a database

forms

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity

forms

The technology that uses electromagnetic electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to identify a variety of objects including objects, animals and people is called radio _____ identification.

frequencies

The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .

game apps

The degree from which it is separated from machine language itself, is called the

generation of the programming language

Storage capacity for laptop hard drives is typically described in terabytes or ___ .

gigabytes

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called

hacker

Juan attempts to gain unauthorized access to networks. Juan would be considered a

hacker

a person who gains unauthorized access to networks in order to steal and corrupt information and data.

hacker

The order in which data is organized in a database (characters, fields, records, tables, files, databases) is referred to the database ___

hierarchy

when programmers design a database, they start by determining what data or characters will be entered. Next, they decide what fields would best organized this data. With this, records and tables can be created, eventually building an entire database. This organization is called the database ___.

hierarchy

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet.

Select the characteristics of a Blu-ray disc.

holds approximately 25 GB of data uses pits and lands to store data

Select the characteristics of a CD.

holds approximately 700 MB of data uses pits and lands to store data

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

holographic

Network Intruder Detection Systems(IDS) often have areas known as "padded cells" or

honeypots

Network intruder Detection systems (IDS) often have areas known as "padded cells" or ____ are easy to hack into and are used to catch hackers

honeypots

An IP address is determined by the network on which it is ______________

hosted

When determining how much cell phone data you need it is important to consider

how much data you currently use

When determining how much cell phone data you need it is important to consider -how much data you currently use -are you using your smartphone to create Microsoft Word documents? -how many phone calls do you make -how often do you send a text message

how much data you currently use

Match the operating system with it's characteristic: iOS 9 series Marshmallow Lollipop

iOS 9 series- Used on iPhones Marshmallow- Android OS released in 2015 Lollipop- Android OS released in 2014

Apple's mobile device with the largest display is the ___ .

iPad Pro

While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.

iPhones

In order to sync your iPhone to your MacBook you must first open the ___ app.

iTunes

All of the following should be considered when using Twitter except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

compress

if you wish to email a file to a friend, but find that it's too big for your email server, you can always ______ the file

.png

image

JPEG, PNG

image compression formats

WPA2

in addition to activating______ protection, its a good idea to disable your routers SSID transmission once all your devices are connected

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service. -small businesses -large households -individual users -large corporations

individual users

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___

information systems (information technology) security manager

below

inkjet printers are often sold _____ their production cost

These facilitate getting data and information into your computer.

input devices

all of the following are true about instagram except:

instagram charges a fee to download the app

All of the following statements about instagram are true except:

instagram is difficult to integrate with apps like Facbeook and Foursquare

Facebook messenger, viber, kik messenger, snapchat, and WhatsApp are examples of ____ messaging sites

instant

language

instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ____ or code

Adam was in the fifth grade when he was adopted by the smith's. because his school uses a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how centralized database can help improve data ___

integrity

Forms structure data input ensure data ___, meaning the information entered is accurate, timely, and useful

integrity

Kate was a senior in college when she married her high school sweetheart. she changed her last name, and because the college used a centralized database, each of her instructors had her new name in their grade books. This is an example of how centralization can improve data ___

integrity

The reliability and the accuracy of the information in a database is referred to as data

integrity

Human knowledge and ideas that laws protect against unauthorized use by others is considered _____ property

intellectual

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

Katie loves istant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app a(n) ____ connection

internet

What three items are required in order to set up a home Wi-Fi network? internet signal, modem, router modem, router, bluetooth internet signal, router, bluetooth internet signal, modem, bluetooth

internet signal, modem, router

A compiler checks for errors and converts an entire program from the source code to machine language while a

interpreter allows programmers to convert the source code line by line

a form of spyware that records all actions typed on a keyboard is called a ___ logger.

keystroke

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

julia types specific terms into a search engine when she wants to find an article on the world wide web. this is called a _____ search

keyword

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming _________ or code.

language

Instructions that allow a computer to be used are written using specific symbols, letters and numbers known as a programming

language or code

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ____ computer.

laptop

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

large

RAM

largest memory in a computer, connected to the processor via the front side bus

RAM

largest memory of a computer, connected to the processor via the front side bus

It's always a good idea to check the _____ before clicking "replay

list of addressees

A decision point in a flowchart that asks a question and has 3 parts is called a

loop

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .

macros

Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called

macros

Select the characteristics of fiber optic lines.

made of 1 or thousands of fibers high-speed transmission

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

maintaining

Before opening an Email, make sure you know and trust the send. Email may contain

malware

Before opening an Email, make sure you know and trust the sender. Email may contain

malware

When referring to management information systems, SCMS stands for supply chain ___ software

management

When referring to business information technology, MIS stands for

management information systems

Experts suggest using password _ software to keep your passwords safe

management software

When referring to management information systems, SCMS stands for supply chain

management software

When referring to business information technology, MIS stands for ___ information systems

manger

True

many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos

L1 cache

memory located directly on the processor itself

L1 cache

memory located on the processor itself

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

microSD storage

Cell phones send and receive extremely weak ___ signals to and from cell towers.

microwave

Radio waves that transmit internet signals to and from satellites in space are called ____________ infrared waves microwaves gamma rays visible waves

microwaves

Megahertz is equal to one _____ cycles (or instructions) per second.

million

The word modem stands for

modulator-demodulator

The word modem stands for ____.

modulator-demodulator

The word modem stands for ____. -modulator demonstrator -monitor device -mode emulator -modulator-demodulator

modulator-demodulator

Employee-____ software is designed to track and record the use of network and hardware resources in the workplace by employees

monitoring

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse

monitoring

While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse

monitoring

While you sometimes find this used in smaller business network employee

monitoring software

Sometimes used in smaller business networks, employee

monitoring software is impractical for large networks because of the number of users and potential for misuse

Select the usual tasks of database administrators (DBAs).

monitors the database's performance develops and maintains the database itself establishes user privileges for the database to help protect the data

Fiber optic cable is ____ expensive than coaxial cable to install.

more

Fiber optic cable is _____ expensive than coaxial cable to install.

more

Fiber optic cable is _____ expensive than coaxial cable to install. -the same -more -significantly less -less

more

magnetic hard drives

most desktop computers use ______ to store data

SSD

most tablets and phones use________ as their main storage device

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers server network partnership client

network

All of the following are part of an RFID system except _____.

network

all of the following are part of an RFID system except:

network

white hat hackers

non malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called

IP addresses are assigned by the Internet Corporation for Assigned Names and ___________ (ICANN)

numbers

When inputs can easily be placed into different categories or classes, a

object oriented analysis works well

trojan horse

often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a

commercial database

often referred to as a data bank

javascript, C++, english, java

once an algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?

data is only available when you're online

one disadvantage of cloud storage is that

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources

all of the following are protected against unauthorized use or distribution by intellectual property laws except:

open educational resources

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

opitcal drives

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

optical drive

blu ray and dvd player

optical drives?

Paul Baran developed a technology called ____ switching that made the Internet possible and reliable.

packet

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable. -transistor -packet -circuit -capacitor

packet

thermal printing

paper turns black when heated, commonly used for printing receipts

A secret code used to help prevent unauthorized access to data and user accounts is called a

password

The BitTorrent protocol is often called ___ file sharing.

peer-to-peer

The BitTorrent protocol is often called ___ file sharing. -Internet Protocol -plug-in -client-server -peer-to-peer

peer-to-peer

The BitTorrent protocol is often called ____ file sharing.

peer-to-peer

user preferences

persistent cookies store information about

Rank the storage capacities from highest to lowest. Start with the highest capacity first.

petabyte terabyte gigabyte megabyte kilobyte

Server banks have capacities measured in ___ .

petabytes

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

A type of phishing that seeks to obtian information through malicious software that is inserted on victims' computers and directs them to fake webpage is called

pharming

The illegitimate use of an email message that is sent to collect personal information and appears to be from an establish organization such as a bank company is called

phishing

When you personally share an image on Pinterest it is known as a _____.

pin

A request for an electronic "echo" or response from another computer or server is called a

ping

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

A request for an electronic "echo" or response from another computer or server is called a ____. -bug -switch -ping -handshake

ping

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, software ____ has occurred

piracy

Select the advantages of helium hard drives over traditional hard drives.

platters spin faster Platters stay cooler. More platters can be placed in the same amount of space.

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

Software that can be added to a browser to increase its functionality are called

plug-ins

Software that can be added to a browser to increase its functionality are called ___ .

plug-ins

Software that can be added to a browser to increase its functionality are called ___ . -search engines -plug-ins -firewalls -drivers

plug-ins

.pdf

portable document

All of the following are best practices when using LinkedIn except

post vacation photos to show your friends where you've travelled.

In a relational database, an important field that contains a unique value that identifies each record as individual is the ___ key

primary

The first step in the program development life cycle consists of specifically stating what this software will be able to do. This is referred to as defining the

problem

The first step in the program development life cycle of defining the

problem

rectangle

process or procedure

close

professionally ends the message

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.

profile

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing polices for corporate IS typically falls to the information system __ manager

program

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system

program manager

Converting a task into commands that a computer can use to perform the task is one definition of

programming

Adware often accompanies downloaded

programs

An output device that uses light to display video or image output on a surface is called a ___ .

projector

finance

providing current investment values and opportunities

What type of server intercepts all messages between client and a server to help avert a hacker or other intruder from attacking a network

proxy

A programmer's shorthand that often serves as an intermediate step in transitioning an algorithm to the program code itself is called

pseudocode

Written in natural language, but often including programming shorthand to assist in writing the program itself

pseudocode

shorthand

pseudocode is written in a natural language, but often including programming ___ to assist in writing the program itself. pseudocode is the term that describes an intermediate step in creating an algorithm from a flow chart.

development

purchasing the necessary software for the system is the part of the system ___ step in the SDLC process

A database provides the capability of conducting searches or asking questions. A question or search for information in a database is called a ___

query

In the database view of a relational database (such as Microsoft access) a row of information is called a ___

record

Accounting

records keeping and reporting

For which of the following activities would a typical accounting department need a strong information system?

records keeping and reporting

Select the colors that are used to create pixels in most output devices

red blue green

Click on icons represent popular password management apps

red * norton

Select the reasons to compress a file.

reduce storage space requirements reduce bandwidth needed to transmit a file

compress a file

reduce storage space requirements, reduce bandwidth needed to transmit a file

lossless

reduces space required by reducing redundancy within files

lossy

reduces space required by removing less valuable data

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

The database use common fields to create links between tables. this is called a ___ database

relational

A link between tables in a relational database that defines how the data is related is called a ___.

relationship

cache

relatively small amount of memory (measured in kilobytes or megabytes).

software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is ___ desktop software

remote

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called software

remote desktop

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called

remote desktop sfotware

A worm that is a type of malware that _ itself throughout a single computer or across a network

replicates

To display or distribute a summary of data and archive snapshots of the data, data administrators or programmers create:

reports

To display or distribute information from a database, programmers or database administrators create ___.

reports

Select the characteristics of a OneDrive account

requires a Microsoft Email account provides free cloud storage can serve as extra storage space

traditional filing systems

requires no training to use

Select the characteristics of computer storage.

retains data when power is turned off sometimes referred to as secondary storage

Select the characteristics of computer storage.

retains data when power is turned off sometimes referred to as secondary storage

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

roaming

The device that connects 2 networks and often provides firewall protection is a ________

router

The device that connects 2 networks is a

router

The device that divides and connects two networks is a _________ modem router WiFi switch

router

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet. -FSB -router -switch -modem

router

Your ____ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

_Since ________ separates your home network from your ISP's network you should assign strong passwords.

router

Typically computer viruses must be _ to attack and do damage to digital device

run

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in

safe mode

Two main factors concerning your digital identity are privacy and ___.

security

Two of the main concerns that surrounds digital identity are privacy and _____.

security

the roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.

security

listening to pandora, watching a youtube video, watching a movie on Netflix

select examples of streaming

usb drive has shorter access time usb drive is more durable usb drive is more accurate

select the advantages of using a USB instead of a DVD

redundancy, availability

select the advantages of using cloud storage

requires a microsoft email account provides free cloud storage can serve as extra storage space

select the characteristics of a onedrive account

used to transmit internet signals where wires may be impractical used to transmit internet signals to and from satellites capable of transmitting internet signals over long distances

select the characteristics of microwaves

coaxial cable telephone wire cell phone radio waves

select the common internet transmission media

pet identification, package tracking, inventory tracking

select the current uses for RFID tags

posting a photo on social media placing an ad on craiglist posting a youtube video

select the examples of uploading files

emailing a file to yourself, saving a photo on flickr, purchasing online storage space

select the methods of using cloud storage

uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines internet service can often be bundled with television service

select the statements that are true regarding cable internet service

fastest home network option when available not available in all areas signal is carried by light waves so its less subject to electromagnetic interference

select the statements that are true regarding fiber optic internet service

legitimate sniffers are used for routine examination and problem detection, unauthorized sniffers are used to steal information

select what is true about packet sniffers

can transmit wi-fi signals in the 2.4 GHz frequency range can transmit wi-fi signals in the 5.0 GHz frequency range minimizes the impact of interference form microwave ovens and car alarms

select whats true regarding dual band routers

_______ a computer that provides resources and services to client computers that request them

server

What type of cookie is stored in temporary memory and is lost when the web browser is closed

session

Salutation

sets the tone of the message

salutation

sets the tone of the message

In general, the ___ the access time, the faster the hard drive.

shorter

The software code of a particular computer virus is called the virus

signature

Contact your ISP if your actual Internet speed is ____ than advertised.

slower

Contact your ISP if your actual Internet speed is _____ than advertised. -the same as -slower -larger -faster

slower

Data from the hard drive reaches the CPU ___ than data from the RAM.

slower

10

snaps on snapchat can be viewed up to _____ seconds depending on what the user chooses and then disappears

Specialized hardware of software that capture packets transmitted over a network called packet

sniffers

Specialized hardware or software that capture packets transmitted over a network are called packer

sniffers

browsers

software applications that allow users to access and surf the world wide web are called

When copyrighted software is illegally copied, distributed, modified, or sold, and is considered direct copyright infringement, this is called:

software privacy

video

some apps that use a surprising amount of data are those that include embedded

An unsolicited email message is called _____.

spam

Desean received an unsolicited email message from an unknown sender. This email was

spam

Unsolicited email is

spam

Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a

spam filter

sniffers

specialized hardware or software that capture packets transmitted over a network are called packet

While not a required step in sending an email, it's still wise to always ___ any message before clicking "send"

spell check

oval

start point or finish point

Devices that allow for the retention of data when your computer has been shut down are called ___ devices.

storage

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

traditional hard drive

stores data magnetically, contains read/write heads, contains platters

body

succinctly discusses the purpose of the message

SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software

supply

Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.

swift

Because object C was difficult to write in, Apple developed

swift

A security system separating 2 networks or even computers on the same network is called a

switch

The device that allows several computers to use your home network with just on Internet connection is called a ____________ modem switch CPU

switch

The device that connects 2 networks is a _____. -router -switch -Wi-Fi -modem

switch

_______ connect devices that are within the same network.

switches

__________ ensures that the correct data is sent to and from the correct device within the network

switches

___________ send and receive network requests to digital devices according to the device's unique media access control address

switches

A DBMS maximizes the benefits a database can provide. DBMS stands for Database Management ____

system

Computer hardware and software that an organization uses to increase its performance is referred to as its information technology(it)

system

The final step in the system development life cycle is maintaining the system. Select the two phases of this step.

system audit evaluation phase

The fourth step in the system development life cycle consists of getting necessary equipment and making sure it works correct. This is called the

system development step

Select activities that would be considered software theft.

taking a registration code from the Internet and using it register a program that you didn't purchase illegally copying a program illegally copying a program stealing software programs

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___

technician

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system ____

technicians

Select the output devices.

televisions printers

Keywords and hashtags

tell search engine what to display

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the World Wide Web

hacktivism

the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called

peer-to-peer

the bitTorrent protocol is often called ______ file sharing

bandwidth

the capacity of a particular transmission medium is called its

router

the device that connects 2 networks is a

digital- analog converters

the devices inside your phone that convert analog waves (such as sounds waves) into digital signals that your phone can process are called

investigation

the first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives and reporting the findings. This is referred to as the ___ step

cyberattack

the malicious use of computer code to modify the normal operations of a computer or network is called a

control

the part of the processor that tells the computers memory, arithmetic logic unit and input and output devices how to response to a programs instructions is called the______ unit

bit

the smallest unit of data storage is a

along with the "from" line, what is the most important factor in ensuring your message is read?

the subject line

WPA

the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the world wide web

blocking/allowing cookies by default deleting cookies making exceptions for cookies from specific websites of domains

there are a variety of cookie settings that can be adjusted in goggle chrome including

"Thumb-sucking" refers to stealing information from a network using a ___

thumb drive

What are some commonly used names for USB drives?

thumb drives flash drives

A programming design that breaks down a problem into a series of tasks is called

top down programming

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

using information systems to help foresee corporate business opportunities and threats might be done all the level of management but it was most important for which management level?

top level managers

A programming design that breaks down a problem into a series of tasks is called ___ programming.

top-down

A popular protocol (procedure) for sharing large files such as movies, TV shows, and music via the internet is Bit____.

torrent

The main governmental organization that oversees internet privacy in the Us is the Federal _____ commission

trade

the main governmental organization that oversees internet privacy is the federal _____ commission

trade

when referring to management information systems, TPS stands for ___ processing systems

transaction

When referring to management information systems, TPS stands for

transaction processing systems

Select the parts of an RFID system.

transceiver transponder antenna

To transmit large files from one server to another over the internet may use the File _______ Protocol.

transfer

A transceiver can both send and receive information.

true

Passports issued by the US and many other countries include RFID chips

true

True or false: The platform or operating system of a computer controls all of the functions of a computer.

true

true or false: Applications are computer programs created to execute specific tasks.

true

true or false: The processes of removing software from a computer is called uninstalling.

true

500 GB - 1 TB

typical laptop

16-256

typical tablet

Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.

unlimited

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

Middle mangers

use information systems for communicating polices and performance reports up and down the corporate ladder

Middle managers

use information systems for record keeping and reporting purposes

first level managers

use information systems for recording line employee performance

middle managers

use information systems for recording line employee performance

first level managers (supervisors, flood managers)

use information systems for recording the employee performance

First level mangers (supervisors, floor managers)

use information systems for scheduling daily and weekly operations

top level management

use information systems to for see corporate opportunities and threats

Top level management (business executive and presidents)

use information systems to foresee corporate opportunities and threats

hashtag

use social media

plotter printer

used for drafting or blueprints

A digital identity is comprised of a variety of digital attributes including

usernames and passwords. usernames and passwords. online search activities. online search activities. personal data such as your social security number and birthdate.

company database

users access the organization database through a lan

Select the characteristics of SSD storage.

uses flash technology uses flash technology uses the same technology that is found in USB drives has no mechanically moving parts

ink jet printer

uses ink cartridges

Select the characteristics of a traditional hard drive.

uses magnetic charges to store data has a read/write head to detect magnetic charges has physically moving platters

Select the characteristics of a traditional hard drive.

uses magnetically charged plates to store data commonly found in desktop computers

Select the characteristics of a traditional hard drive.

uses magnetically charged plates to store data commonly found in desktop computers

dvd

uses pits and lands to store data, holds approximately 4.5 GB of data

Select the statements that are true regarding DSL Internet service.

uses telephone wires as transmission wires Internet signals tend to be very consistent

Select the statements that are true regarding cable Internet service.

uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines Internet service can often be bundled with television service

laser printer

uses toner cartridges

top level managers

using information systems to help for see corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level

Select the characteristics of a modem.

usually provided by the ISP converts analog signals into digital signals converts digital signals into analog signals

Some apps that use a surprising amount of data are those that include embedded ___ .

video

Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device

virus

A key component in an employee-monitoring program is the utilization of ____ and internet filters.

web

One risks with cookies is

websites using cookies can collect your information and sell it to third parties

One reason to study programming is that coders tend to be

well compensated

thumb drives, flash drives

what are some commonly used names for USB drives

galaxy, note

what devices are manufactured by samsung

EDI

what technology allows for the electronic communication of business oriented transactions and information between people and organizations

software piracy

when copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called

management information systems

when referring to business info tech MIS stands for

be brief and direct state only what you witnessed

when reporting a computer ethics violation of a co-worker to your employer, its important to

DSS

which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

TPS

which category of management information systems (MIS) focuses on tracking sales and inventories

Ransomware, keystroke logging trojan

which of the following are common email viruses

copying a driver from a companys website and saving it to your computer buying a song on itunes so you can listen to it on your phone copying a photo from facebook and saving it to your desktop

which of the following are examples of downloading a file

IP stands for internet protocol in most home networks ip addresses are assigned by the internet service provider if two laptops are connected to the same home network and surfing the web simultaneously, each laptop must have its own IP addresses

which of the following are true regarding IP addresses

install the latest antivirus software and update frequently downloaded content from the web should only be from trusted sites

which of the following are ways to prevent computer virus infections

most widely used OS for smartphones and tablets

which of the following is a strength of the android platform

free to download and use

which of the following is a strength of the linux platform

cyberstalking and online predators are a real problem on facebook

which of the following statements about facebook is true

data manipulation

which of the following would be considered a cybercrime

internet explorer

which of these browsers was developed by microsoft

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called

white hat hackers

A form of email fraud where criminals change the account where money is being transferred is called a ___ -wire scam

wire

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

A form of email fraud where criminals change the account where money is being transferred is called a ___ scam

wire-wire

A form of email fraud where criminals charge the account where money is being transferred is called a ___ scam

wire-wire

A form of Email fraud where criminals change the account where money is being transferred is called a

wire-wire scam

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

pseudocode

written in a natural language, but often including programming shorthand to assist in writing the program itself, ____ is the term that describes an intermediate step in creating an algorithm from a flow chart.

Select the statements that describe a computer programmer's algorithm.

written in a natural language, such as English written in a natural language, such as English written in the form of a flowchart so that it will be more easily converted into a programming language

world wide web

www stand for

Select the domain name.

www.cnet.com

Select the domain name. -http://www.mit.edu/computers -www.cnet.com -mheducation.com -.gov

www.cnet.com

approve cookie storage requests deny cookie storage requests delete stored cookies automatically when you start firefox

you can change your firefox settings to allow you to

true

you must individually adjust cookie settings in every browser you use

there are risks associated with downloading content from the internet. it is important to consider all of the following when downloading from the internet except:

your anti-virus software will ensure your files are safe

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe.


संबंधित स्टडी सेट्स

English pronouns Test *Monday 28th*

View Set

CH2 SBS Overview ICD-10-C REVIEW

View Set

Community: Chapter 20 Health Teaching

View Set