CIS 1 - SMC - Combined 2
data manipulation
Which of the following would be considered a cybercrime?
*only have on firewall*
*could lead to issues if you have more than one*
Devices manufactured by Samsung
- Galaxy - Note
Cyberattacks include:
-identity theft -pharming -DDOS attacks
parental control in microsoft
1) open 2) click 3)under 4) adjust
1. Input 2. Storage device 3. output
1. game controller, speaker 2.projector, external hard drive 3.hard drive, mouse
DVDs provide approximately ___ of data storage space
4.5 GB
Zombie
A computer controlled by a hacker is called a _____.
Inkjet printers are often sold ____ their production cost.
Below
An integral part of a database management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data _________
Dictionary
A separate processor (computer) in your computer that enhances your video is called the ___ .
Graphic processor (GPU)
User preferences
Persistent cookies store information about
Which of the following are online nuisance
Spyare Spam Spoofing
Spyware
Spyware is software that collects information about your Internet surfing habits and behaviors. Includes the collection of keystrokes, passwords, and confidential information. Often installed via free downloads or by visiting certain illegitimate websites
To uninstall an app from your Windows 10 device a quick way is to first click the ___ . - Start - Microsoft Edge button - File Explorer icon - Settings button
Start
Apple developed ______ to work better with Mac OS and iOS
Swift
A terabyte is equal to approximately 1 _________ bytes
Trillion
A computer controlled by a hacker is called a ____.
Zombie
Zip
a lossless compression format
output
a printout of a spreadsheet
How is the screensize of a laptop computer measured?
diagonally from left corner to right corner
The devices inside your phone that convert analog waves into digital signals that your phone can process are called ______
digital- analog converters
Solid state drives store data using
electronic circuits
Solid state drives store data using ___ .
electronic circuits
The art and science of creating output that provides information in the most useful manner is called ___ .
ergonomics
hardware or software to keep a computer secure
firewall
which tab would you click to delete cookies?
general
Rachel notics that her Facebook account displyas advertisements based on her personal profile and browsing history
online nuisance: adware
An unsolicited email message is called _____.
spam
DeSean received an unsolicited email message from an unknown sender. this email was
spam
software that collects info about your internet surfing habits and behaviors
spyware
software that collects information about your internet surfing habits and behaviors is called
spyware
Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .
writing private journal entries
_________ is the shorthand programmers use while building an algorithm
Pseudocode
Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage
RAID
The accuracy of a digital recording is determined by the device's ___ rate.
Sampling
Common video file formats
- .mov -.avi
select the common audio file formats:
-.mp3 -.mp4 (M4A) -.wav
Select the traits that are currently used for biometric identification.
-fingerprint -irises
Common types of malware include______
-viruses -worms -trojan horses
4 books uses approximately
1 megabyte of data
1. Input 2. Storage 3. Output
1. Entering text in a word 2. Putting a photo onto a USB drive (thumbdrive). 3. Playing a song from Spotify.
1. Virus 2.Cyber attack
1. Trojan Horse, Worm, and Macro 2. Rootkiit, Packet Analyzer, and DOS attack
Popularized with transistor radios in the 1950s, this connector is used with nearly all cell phones today. It is a ________
3.5 mm connector
CD-R
A disc that can be burned once
DVD-ROM
A disc that cannot be burned
Trojan
A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.
DVDs store data using
A reflective coating that has pits and lands
Rootkit
A rootkit is a type of malware that is triggered each time you boot your computer. Rootkits are software programs that hide in the operating system. A rootkit often allows for the installation of hidden files and for a remote user to use and take control of the computer.
Spam filter
A spam filter is computer software that is designed to prevent spam messages from entering a user's email inbox. Spam filters are also known as spam blockers or anti-spam utilities. Spam filters search for spam by watching for keywords and by monitoring suspicious word patterns and frequencies.
Which would be used to store a single bit of data?
A transistor and a hole in a punchcard
Email virus
A virus that is attached in a file and sent via e-mail. When the infected file is opened, the virus infects the computer. Phishing - tricks users into revealing usernames and passwords by appearing legitimate. Ransomware - when activated, encrypts files on user hard drive and then sells a decryption program. Keystroke logging Trojan - when activated, saves all keystrokes for subsequent transmission to virus creator.
Which of the following numbers is the decimal number 25 converted to hexadecimal? A)19 B)20 C)18 D)12
A)19
Unicode is a system for the interchange, processing, and display of the written texts of the diverse languages of the modern world. A)True B)False
A)True
a set of programs that allow data to be exchanged on a website without changing the websites display is _______________`
AJAX (asynchronous javascript and xml)
spam
An unsolicited email message is called _____
Which of these operating systems is based on Linux and used on smartphones
Android
AJAX stands for ___ JavaScript and XML
Asynchronous
Which of the following is the binary number 1111 1111 converted to hexadecimal? A)DF B)FF C)AF D)GF
B)FF
In an ASCII file, each alphabetic, numeric, or special character is represented with a 16-bit binary number. A)True B)False
B)False
What if I get a phishing message?
Banks and credit card companies will never ask you to provide personal information via email messages, so do not give out any information. If you receive a suspicious message, contact the institution that the message was allegedly sent from. Report the incident to US-CERT.
Literally meaning "life measure", ________ technologies enable accurate identification
Biometric
A short-range wireless transmission protocol is known as _____ .
Bluetooth
A group of compromised computers controlled by a hacker is called a ____.
Botnet
Black Hat Hacker
Break into computer systems with the intent of causing damage or stealing data. Also known as hackers or crackers.
Two factors that affect a processor's speed are clock speed and _______ width
Bus
Shortcut for print
CTRL + P
Shortcut for save
CTRL + S
Most touchpads use _____ to sense when a finger has moved across the pad.
Capacitance
Select what is true about persistent cookies
Collect information about user preferences Collect formation about the IP Address Collect password and username information
Keyboard shortcut for select all
Command + A
Keyboard shortcut for find
Command + F
Keyboard shortcut for save
Command + S
Keyboard shortcut for screenshot
Command + shift + 3
Select what's true about macro viruses
Commands in the macro language set off the destructive event When file is opened the macro virus execute Initiated by downloading and opening on infected attachment
Two characteristics of thermal printing:
Commonly used for printing receipts Paper turns black when heated
A digital device that accepts input, processes and stores the input, and provides output is a ________
Computer
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
Contrast
A description of the difference in the luminence of a display's white pixels compared to the black pixels is called _______ ratio
Contrast
One disadvantage of cloud storage is that
Data is only available when you're online
Devices with a separate system unit and a relatively large footprint are called ________ computers
Desktop
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
DDoS stands for
Distributed Denial of Service
What does DDoS stand for?
Distributed Denial of Service
In the US the federal ______ covers most consumer oriented electronic transactions
EFT Act
Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.
Extensible Markup Language
Today's computer keyboard was named after Sir Wesley Reginald Qwerty, inventor of the typewriter.
False
The main government organization that oversees internet privacy is the _____
Federal Trade Commission
An application that navigates all of the files and folders on your Mac is the _____ .
Finder
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.
Firewall
Intel
Founded in 1968, largest manufacturer of processors
AMD
Founded in 1969, in all video game consoles
Nvidia
Founded in 1993, produces mobile consoles
A laptop computer's RAM is measured in ____ of data
Gigabytes
A separate processor in your computer that enhances your video is called the _________
Graphics processor
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.
Hacker
Characteristics of a laser printer (4):
Higher initial costs Popular in offices Use toner Far faster when printing multiple copies
Which acronym refers to a type of computer monitor?
IKR
contact US-CERT
If you believe you have fallen victim to a phishing scam you should
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
All of the following are true about Instagram excep
Instagram charges a fee to download the app.
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
The most common method of eye recognition uses the ______
Iris
Which of these programs make data more readable to programmers by parsing XML files?
JSON
which of these programs make data more readable to programmers by parsing XML files?
JSON
the ______ cache is located directly on the processor itself.
L1
Select what is true about packet sniffers
Legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal information
The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.
Life
Commonly used for smartphones and tablet displays
Liquid Crystal Display
When you open the Windows 10 start menu, colorful boxes containing constantly updated (when you're online) information appears. Microsoft calls these boxes ___ . - Widgets - Pinned Boxes - Info Boxes - Live Tiles
Live tiles
L1 cache
Located directly on the processor itself
L3 cache
Located next to the processor
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip
MEMS
Characteristics of an inkjet printer:
Makes fast single copy color pages Uses ink Popular for home use Low initial cost
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
The technology that provides a type of firewall protecting by hiding internal IP addresses is called
NAT
When compared to cell phone cameras, most point-and-shoot cameras use photographic technology that is ____________.
Nearly the same
white hat
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____ hackers.
___________ focuses on categorizing inputs and outputs for reusability
Object oriented programming
quarantine
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
Writing software follows a 5-step process called the
PDLC Program Development Life Cycle
CTRL+V
Paste
When you personally share an image on Pinterest it is known as a _____.
Pin
An unsolicited email message is called ____.
Spam
Spam
Spam is an unsolicited email message. Spam messages are sometimes called UBE, unsolicited bulk email, and are used for a variety of marketing purposes including selling products and services. Messages may contain a variety of malicious programs.
UBE
Spam messages are sometimes referred to as ___.
snakes
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
Packet Sniffer
Specialized hardware or software that capture packets transmitted over a network. Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information. Packet sniffers can be very difficult to detect.
Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of intel and AMD computer processor
Spectre Meltdown
An easy to use camera that has an extremely strong optical zoom is a _________
Superzoom
_______ is an easy to use camera with an extremely strong optical zoom
Superzoom
which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C)
hacktivism
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
cyberattack
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
How a computer virus works
The virus arrives via email attachment, file download, or by "clicking" in an infected website. An action triggers the virus. The virus spreads to other computer/devices or networks. The activated virus starts its destructive actions.
How a computer virus works
The virus arrives via email attachment, file download, or by "clicking" in an infected website.•An action triggers the virus. •The virus spreads to other computer/devices or networks.•The activated virus starts its destructive actions.
When you get a receipt from a store or restaurant, its probably printed on ________ paper.
Thermal
The world wide web was created through a collaboration led by
Tim Berners- Lee
The titles in the DMCA that directly impact digital copyright issues include all of the following except
Title 5 - Copyright Protection Proviso.
Laser printers are popular in offices because they use relatively inexpensive ________.
Toner
The programming design that forces programmers to consider how the algorithm can be written in computer code by first breaking it down into smaller tasks is called
Top-down programming design
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
Trade
Spam messages are sometimes called _ and are used for a variety of marketing purposes including selling products and services
UBE
Spam messages are sometimes referred to as ___.
UBE
Click on the organization below that you should contest if you receive a phishing message
US-CERT
What are symptoms that your system has been hacked
Unwanted browser toolbars Redirected internet searches Fake emails or social media messages from your account
Disk cache
Used to increase disk efficiency
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called __________.
Video conferencing
Select the audio file compression formats.
WAV MP4
the original wireless network privacy and protection standard for wifi was known at _____________
WEP
Common types of malware include
Worm Tojans Viruses
_______ was designed to display documents on the web. It provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display
XML (extensible markup language)
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a
Zombie
program scan files to identify
antivirus software
firewire connectors were developed for ___________ computers
apple
on a Macintosh home screen, where do you click to access to adjust parental control settings?
apple and settings
When referring to digital storage, RAID stands for redundant ____ of independent disks
array
The capacity of a particular transmission medium is called its
bandwidth
A gigabyte equals approximately one _____ bytes.
billion
a group of compromised computers controlled by a hacker is called a _____________
botnet
In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.
cache
relatively small amount of memory (measured in kilobytes and megabytes)
cache
select the true statements regarding an LED display
can be extremely thin, great for well-lit areas, extremely energy efficient
most touchpads use __________ to sense when a finger has moved across the pad
capacitance
optical storage media: capacity of up to 700 mb
cd
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .
checks
magnetic ink recognition (MICR) is a technology that is most commonly seen on _____________
checks
after you have clicked on the privacy tab in safari, which of the following are way to efficiently remove cookies and stored data?
click- remove all website data, or click details then select one or more websites, then click remove
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ______ storage
cloud
The number of bits of data describing each pixel in a display is referred to as ___ .
color depth
italicize
command+I
paste
command+V
undo last action
command+Z
A ________ checks for errors and converts an entire program from source code to machine language
compiler
software that infects computers and is created using is
computer cirus
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.
creative
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
debugging
true about ergo
derived the study a very
For audio output, digital devices use _________ converters
digital-to-analog
A database that stores data in different physical locations and that users access through client/ server networks is called a ________ database
distributed
Audio output is created by converting...
electrical impulses into air movement
Solid state drives store data using ______
electronic circuits
EDI stands for __________
electronic data interchange
Software theft occurs when someone engages in all of the following except _______.
erasing a program you purchased then sold to a friend
the art and science of creating output that provides information in the most useful manner is called _____________-
ergonomics
All new laptop computers come with an optical drive installed.
false
match the business information system (IS) activity with the appropriate manage level: use IS for scheduling daily and weekly operations
first level managers (supervisors, floor managers)
which of the following is a strength of the linux platform?
free to download and use
Blu-ray disks have pits and lands that absorb or reflect a laser beam and can store approximately 25 ___ of data (single layer)
gigabytes
select the email services
gmail, outlook, icloud
the visual image output that a computer creates is known as _____________
graphics
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
Juan attempts to gain unauthorized access to networks. Juan would be considered a
hacker
Magnetically charged particles on spinning disks is how traditional ____ drives store data
hard
overheating, humidity, and magnetic fields can cause damage to the ___ of a digital device
hardware
MEMS chips are used in which of the following?
hearing aids, pet identification chips, poker chips
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
helium
What is equal to one cycle per second?
hertz
What are some commonly used names for USB drives?
humb drives flash drives
MAC address
identifies a device within a network
what is true regarding the length of a USB cord?
in general, the more data being transmitted, the shorter the cord should be
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
a form of spyware that records all actions typed on a keyboard is called a ___ logger
keystroke
Optical disks, such as CDs, store data using pits and ____
lands
Another term for a programming code is a programming ___ .
language
another term for a programming code is a programming ____________________
language
Because of their compact size, touchpads are most often used with _____ computers.
laptop
the process used to develop and maintain and IT system is referred to as the SDLC. SDLC stands for the system development _______________ cycle
life
a virus written a specific language and placed within a document or spreadsheet is called a ___ virus
macro
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
macro virus
a virus written in a macro language and placed within a document or spreadsheet is called a
macro virus
Most desktop computers use ___ to store data.
magnetic hard drives
Most desktop computers use _____ to store data
magnetic hard drives
most desktop computers use ______________ to store data
magnetic hard drives
experts suggest using password ___ software to keep your passwords safe
management
android OS released in 2015
marshmallow
A million bytes of data equals approximately one ___
megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a ______
memristor
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n)
memristor
Because it is small, energy-efficient, and fast ___ storage is commonly used in smartphones
microSD
Fiber optic cable is ______ expensive than coaxial cable to install
more
fiber optic cable is _____________ expensive than coaxial cable to install
more
LCD
most laptops, tablets, and smartphones use an _ display
hiding ip
nat
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
All of the following are part of an RFID system except _____.
network
When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is _____.
not saved
when inputs can be easily placed into different categories or classes, a(n) _______________ -oriented analysis works well
object
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
running the processor faster than recommended by the manufacturer is called _____________. this can increased performance and speed, but will also void the manufacturer warranty
overclocking
expert suggest
password management
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files
peer-to-peer
Server banks have capacities measured in
petabytes
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
A type of phishing that seeks to obtian information through malicious software that is inserted on victims' computers and directs them to fake webpage is called
pharming
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
phraming
A request for an electronic "echo" or response form another computer or server is called a ______
ping
Using cells of ionized gas to create images, ___ displays are actually becoming less popular.
plasma
a point (a hole or slot) in a computer, designed to accept a specific connector, is called a _________
port
match the extension with the type of document: .pez
presentation
Select the peripherals.
printer monitor tablet
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
once the virus is identified the antivirus software attempts to remove the virus from the file. if the software cannot remove the infected file it will send the file to an isolated area on the hard disk called
quarantine
once the viruses identify
quarantine
In a database, a row of information is called a _____
record
Lossless
reduces space required by reducing redundancy within files
Lossy
reduces space required by removing less valuable data
passport issued
rfid chips
The most common method of renaming files and folders is to simple _____ on the item and select Rename
right-click
a type of malware that is triggered each time you boot your computer is called a
rookit
Typically computer viruses must be _ to attack and do damage to digital device
run
typically computer viruses must be--- to attack and do damage to a digital device
run
The two major concerns regarding cloud storage are reliability and _______
security
Two main factors concerning your digital identity are privacy and ___.
security
two major concerns regarding cloud storage are reliability and ___________
security
command+a
select all
internet filter installed
server router computer
typed of cookie is stored in temporary
session
The small computer within your phone that enhances the sound quality of your call is called a digital ______ processor
signal
The software code of a particular computer virus is called the virus
signature
Data from the hard drive reaches the CPU _____ than data from the RAM.
slower
web cookies
small text file of information created by websites you visit that your web browser stores on your hard drive
third party cookie
small text file of information. created by a website other than the one you currently visiting and are used to track your surfing habits and are considered an invasion of privacy
When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.
software piracy
Desean received an unsolicited email message from an unknown sender. This email was
spam
Unsolicited email is
spam
match the extension with the type of document: .xlxs
spreadsheet
Select activities that would be considered software theft.
stealing software programs -illegally copying a program
because objective-c was difficult to write in, apple developed _________________, a programming language for writing software for the mac OS and iOS
swift
The cell tower's base transmission station is connected to a mobile _____ station
switching
allow for interchangeable lenses and have a camera that allows the photographer to look directly through the lens
the features of a DSLR camera are they _
Laser printers are popular in offices because they use relatively inexpensive ___ .
toner
Laser printers are popular in offices because they use relatively inexpensive _________.
toner
The pointing device found on nearly all laptops is a
touchpad
Select the smartphone input device.
touchscreen or keyboard
Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.
touchscreens
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
trade
the main governmental organization that oversees internet privacy is the federal ______________ commission
trade
The platform or operating system of a computer controls all of the functions of a computer.
true
protected by intellectual
video games movies
software code of particular
viruses signature
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.
voice
with ___________ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charter and compared to existing records
voice
In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ______, than those in less populate areas
weaker
match the extension with the type of document: .html
webpage
A businesses brand is derived from all of the following except ______ .
what their competition perceived them to be
Ransomware
when activated, encrypts files on user hard drive & then sets a decryption program
voice
with _ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records
spam filters search for spam by watching for key words and by monitoring suspicious ----- patterns and frequencies
word
spam filters search for spam by watching for keywords and by monitoring suspicious --- patterns and frequencies.
word
spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies
word
the maximum number of bits per instruction that a CPU can process during 1 machine cycle is called _____________
word size
DVDs
- stores roughly 4.5 GB - used for movie rentals (non-HD)
Online Nuisance
-spoofing -Trolling -spyware -phishing
DVD-RW
A disc that can be burned multiple times
Printer speed is described using which acronym?
PPM
overheating,humanity
hardware
uses toner cartridges
laser printer
main governmental
trade
a computer controlled by a hacker
zombie
Most PC games have been written in either ___ or ___ .
C C++
The most common digital cameras (2)
DSLR and point-and-shoot
Gigahertz
Equal to one billion cycles (or instructions) per second
The image compression formats
JPEG PNG
CTRL+A
Select All
copy
command+C
signed by clinton 1988
digital
50dollar
for bank
worms
reproduce type o thing
DMCA digital
title2,1,3
1. Internet scams 2. cyberespionage 3. information theft
Which of the following are considered cybercrimes?
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
cyberattack
there are several ways to rename a folder in windows. which of these would work?
-on the command bar, click organize and then click rename -click the folder icon and press F2 to activate the edit mode -right click a folder, then click rename
1. MIDI 2. HDMI 3. Plug and Play
1. Capable of carrying digital music signals and are common in today's music scene 2. allows for the transmission of high-definition audio and video signals 3. a technology that enables the OS to detect and configure peripherals without downloading software or drivers
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cybercrime
Several ways to create a new folder in Windows
- Right-click a folder in the folders list. Click New and the click Folder - On the command bar, click New Folder - Right-click any blank area in the Contents pane. Click New and then click Folder
Spyware includes the collection of
- keystrokes -passwords - confidential information
what is true about passwords
- the term passwords and key are synonymous for passwords - passwords can be used to secure computers, networks, software, personal accounts, and digital devices
Select what's true regarding uninstalling software
-Be cautious when uninstalling software from the computer manufacturer -Be cautious when uninstalling software from the OS manufacturer. -Uninstalling system software is not recommended.
Optical drives
-Blu-ray player - DVD drive
Select the true statements regarding Instagram.
-Instagram is a photo sharing app that is available for download to a variety of digital devices.
Common symptoms of a computer virus infection include
-OS doesn't launch properly. -files get deleted or encrypted. -strange error messages or pop-up ads.
Select the advantages of using cloud storage.
-Redundancy - data is stored on multiple servers. -Availability - data can be retrieved by any Internet-connected device.
other computer term
-Software Theft -First Party Cookies -Hardware Theft
Select the qualities that make a trait useful for biometic recognition.
-The trait must be measurably different with each person. -The trait must not change over time.
Advantages of using a USB drive instead of a DVD
-USB drive has shorter access time -USB drive is more durable
Select what's true about passwords.
-Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. -Regularly check your accounts to ensure they have not been tampered with.
Select what's true about the privacy risks with cookies.
-Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.
Which would be used to store a single bit of data?
-a transistor -a hole in a punch card -a program
You can change your Firefox settings to allow you to
-approve cookie storage requests. -deny cookie storage requests. -delete stored cookies automatically when you start Firefox.
There are a variety of cookie settings that can be adjusted in Google Chrome including
-blocking/allowing cookies by default. -deleting cookies -making exceptions for cookies from specific websites or domains.
Common internet transmission media
-coaxial cable -telephone wire - cell phone radio eaves
Identify common symptoms of a computer virus.
-documents won't save -computer runs extremely slowly -programs launch on their own
identify common symptoms of a computer virus
-documents wont save -computer runs extremely slowly -programs launch on their own
which of the following statements are true? (dvd and blu ray)
-dvds and blu rays are considered optical media -dvds use longer wavelength (red spectrum) lasers
true about spyware
-includes the collection of keystorkes, passwords and confidential info -intstalled via free downloads or by visiting certain illegitimate websites -collects info about your internet surfing habits and behaviors.
Rootkits allow a remote user to do which of the following.
-install rogue files -create backdoor programs -delete files
Which of the following are considered cybercrimes?
-internet scams -cyberespionage -information theft
singler event
-keystorke logger -trojan horse -phishing
true about packet sniffers
-legitimate sniffers are used for routine examination and problem detection -unauthorized sniffers are used to steal info.
characteristics of fiber optic lines
-made of 1 or thousands of fibers - high-speed transmission
choose the samsung galaxy tablet options
-note series -tab series
select the characteristics of a plotter
-prints large graphic displays -mechanically moves a pen over a large sheet of paper
Which of the following are common email viruses.
-ransomware -keystroke logging Trojan
Select the reasons to compress a file.
-reduce storage space requirements -reduce bandwidth needed to transmit a file
select the characteristics of a onedrive account
-requires a microsoft email account -provides free cloud storage -can serve as extra storage space
Select the characteristics of computer storage.
-retains data when power is turned off -sometimes referred to as secondary storage
Which of the following are online nuisances?
-spam -spyware -spoofing
select the usual tasks of information systems (IS) program managers
-supervising IS technicians -working with developers and senior management to procure and implement IS processes -develop training plans and policies for IS
Important considerations when purchasing a new tablet computer include
-the amount of RAM it has. -the size of its screen. -the amount of storage it has.
Select the statements that refer to the term "dot pitch".
-the closer the spacing (the smaller the dot pitch) the sharper the image -the diagonal measurement of the visible display
select the advantages of using a USB instead of a dvd
-usb drive has shorter access time -usb drive is more durable
Select the characteristics of a traditional hard drive.
-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters
what should you consider when buying a new computer?
-what is the cost? -does it have hdmi ports? -does it have an sd card slot?
virus
-you cannot boot your computer -your computer is running slower than usual.
which of the following file extensions is commonly used for term papers and other word processing tasks?
.docx
Select the characteristics of audio output
1)converts electrical impulses into air movement 2)Digital devices use digital-to-analog converters
Put the steps of the boot process in the correct order
1. The device is powered on and the CPU activates BIOS 2. The power-on self-test is executed 3. The OS is loaded into RAM 4. The OS checks the registry settings and loads saved configuration settings
1. Online nuisance 2. Other computer terms
1. Trolling Phishing Spoofing Spyware 2.Hardware Theft Software theft First Party cookies
1. Hacker 2. Online nuisances
1. White hat Black hat Cyber terrorist Script Kiddie 2.Spam Spyware Adware
1. CTRL+B 2. CTRL+A 3. CTRL+X 4. CTRL+C
1. bold 2. select all 3. cut 4. copy
Rank in order of size with the smallest on top
1. byte 2. megabyte 3. gigabyte 4. petabyte
put the steps for adjusting cookie settings in proper order
1. choose safari 2. click preferences 3. click privacy 4. change cookie settings
1.Command+A 2.Command+Shift+3 3.Command+S 4.Command+F
1. select all 2. screenshot 3. save 4.find (in most apps)
setting restriction in MAC OS
1. select system 2.click 3.select a user
what is the correct order of steps to use when uninstalling a program in windows 8 using the search feature?
1. swipe to the right 2. click search 3. type control panel 4. under view by select large icons
Blu-rays provide approximately ___ of storage space.
25 GB
most new laptop computers come with how much storage?
256gb - 1 tb
Capacity of a DVD
3-5 GB
Where in the image above would you click to download a copy of your facebook data
4 triangle
Most new laptop computers come with how much storage?
4-8
When you buy a new laptop, how much RAM should it come with?
4-8 GB
when you buy a new laptop how much RAM should it come with?
4-8gb
the item that uses approximately 1 terabyte of data
40 Blu-ray movies
A typical laptop has a storage capacity of approximately ____ .
500 GB - 1 TB
Capacity of a typical laptop
500 GB- 1 TB
Laptop
500 GB- 1 TB
most new cell phones today come with approximately ____________ of RAM
500mb-2gb
black
A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.
keystroke
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
Script Kiddie
A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. Script kiddies try to illegally gain access to computer systems using programs (scripts) that others have written. Script kiddies do not have the skill or experience to write their own programs to gain illegal access to computer systems.
Keystroke logger
A keystroke logger is a form of spyware that records all actions typed on a keyboard. Can be hardware devices and software applications Software based keystroke loggers are often a Trojan that is installed without the user's knowledge. Keystroke loggers can record passwords and confidential information.
Macro Virus
A macro virus is a virus that is written in a macro language and placed within a document or spreadsheet. When the document or spreadsheet that has been infected by a virus is opened and the macro is executed, commands in the macro language set off the destructive events that the virus was designed for.
Pharming
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.
1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings. 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.
According to Microsoft, what is the correct order of steps for deleting cookies in Internet Explorer (Microsoft Edge)?
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
Active pixel sensor
_________ use technologies have resulted in many hands-free devices
Adaptive
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.
Adware
Adware
Adware is software that collects the user's web browsing history. This data is collected then used to create unsolicited targeted pop-up advertisements. Adware often accompanies downloaded programs.
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ______ generation subsystem
Application
The width of a screen compared to the height of a screen is referred to as __________.
Aspect ratio
Using extremely low power radio signals, short-distance wireless connections are often made using ________ technology.
Bluetooth
A group of compromised computers controlled by a hacker is called a
Botnet
______ is an eight-bit character coding scheme used on many larger systems. A)ASCII B)Unicode C)EBCDIC D)Hexadecimal
C)EBCDIC
Which optical drive media stores approximately 700 MBs of data?
CD
shortcut for "select all"
CTRL + A
After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data
Click - Remove All Website Data
You need to adjust cookie and data permission settings in google Chrome. Put the steps for adjusting cookie and site data permission settings in Goggle Chrome in the correct order.
Click the Chrome menu Click show advanced settings In the "cookie"
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
Cookie
session cookies
Cookies that are held in temporary memory and used to analyze and measure traffic on a Web page are called ___ cookies.
A deliberate misuse of computers and networks via the uses malicious code to modify the normal operations of a computer/network
Cyberattack
The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.
Cyberattack
_______ is the term used for 1024 bytes using the binary system. A)Terabyte B)Gigabyte C)Megabyte D)Kilobyte
D)Kilobyte
though it could theoretically hold terabytes of data for thousands of years in microscopic, ___ storage, using genetic material, is a distant storage option
DNS
Printer manufacturers advertise the quality of their products by stating how many ___ they produce.
DPI
Printer manufacturers advertise the quality of their products by stating how many ____ the produce
DPI (dots per inch)
Internet service that tends to provide the most consistent speeds is
DSL
A type of camera that allows you to look directly through the lens is a ______ camera
DSLR
__________ is one of the most difficult parts of the PDLC process
Debugging
There are a variety of cookie settings that can adjusted in Google Chrome including
Deleting cookies Blocking/allowing cookies by default Making exceptions for cookies from specific websites or domains
A DDos attack is when a computers that have been infected by a virus act as "zombie" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for
Distributed Denial of Service
DDos
Distriute Denial of service
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ___ attack
DoS
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a
Dos
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called
Dos attack
The distance between two adjacent sub-pixels on a display is referred to as _______ pitch.
Dot
Using a stylus and touchpad to mad the signature and measure pressure, pen angle etc. is called ________ signature recognition
Dynamic
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
What technology allows for the electronic communication of business-oriented transactions and information between people and organizations?
EDI
Megahertz
Equal to one million cycles (or instructions) per second
Hertz
Equals one cycle (instruction) per second
A quick way to rename files or folders in Windows is to select the item and then press the _____ key
F2
An efficient way to manage your files in Windows 10 is to use the _____. - Office menu - Office explorer - file explorer - start button
File explorer
computer hardware and software that an organization uses to increase its performance is referred to as its _____________
IT system
A program that makes creating websites and webpages much faster is ___ .
JavaScript
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
Keystroke
Refers to a type of monitor display
LCD
the two most common audio files formats are WAV and ___
MP3/MP4
NFC
Near Field Communication A short range wireless technology used for data transfer and electronic payments
the technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
Safari accepts cookies and websites data from which of the following
Only from websites you visit
Select the 3 main ways of detecting and recording fingerprints.
Optical - takes a photo of the fingerprint.
An input, output or storage device connected to a computer is known as a(an) _____ .
Peripheral
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.
Persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.
Pharming
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as
Pharming
Pharming
Pharming is a type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer. The malicious software redirects the user to a phony web page, even when the correct web address is used. When the user has reached the fake webpage they are prompted to enter their username, password, and other sensitive personal information.
Which of the following describes phishing
Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank Phishing scams use legitimate looking email messages to con a user into giving up private information
This type of display creates images with pixels made of red, green, and blue cells filled with ionized gas.
Plasma
Uses microscopic tubes of ionized gas to create displays.
Plasma
Using cells of ionized gas to create images, _____________ displays are actually becoming less popular.
Plasma
A type of printer that is used to print large graphic images such as blueprints by mechanically moving a pen over a large sheet of paper
Plotter
Which of the flowing are symptoms of an online nuisance attack?
Pop up start appearing after you visit unfamiliar sites Frequent pop ups awhile searching the web or working in programs Receiving a lot of spam message or bounced back email messages
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file if will sent the file to an isolated area on the hard disk called
Quarantine
Because of their capability of storing data in multiple hard drives, data warehouses use _____ technology to ensure redundant data storage
RAID
Refers to a type of data storage
ROM
What does RFID stand for?
Radio Frequency Identification
One version of this malware encrypts the victims data until a payment is made.
Ransomware
Number of times per second a frame in a video is advanced is the definition of frame ________.
Rate
An internet filter is firewall software used to block a user's access to specific internet content. An internet filter can be installed on which of the following
Router Computer Server
most tablets and phones use ________________ as their main storage device
SSD
Because they have no mechanically moving parts, ______ provide extremely fast, efficient storage
SSDs
because they have no mechanically moving parts, ___ provide extremely fast, efficient storage
SSDs
If you want to save a file to a particular folder or site on your computer (such as the Documents folder or your desktop, be sure to click File and then select ___ in the File menu. - Save As - Save - Keep - File
Save as
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
Sniffers
virus
Software that infects a computer and is created using computer code is called a computer _____.
This is the Windows Firewall area where you can adjust various firewall settings. Put the steps that allowed yo uto get to the screen correct order
Start button Control panel System and Security Windows Firewall
Phishing
The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called ___.
Checking the hard drive on a device using Windows 10 can be done using the _______ app
This PC
Signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars
True
The Bit Torrent protocol allows members to share large files over the Internet
True
The mobile switching station can connect calls to mobile switching station belonging to other cellular networks
True
You must individually adjust cookie settings in every browser you use
True
How do firewalls work?
Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. •There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including packet filters and a proxy server. A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules.•Proxy Server -Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network
Spam messages are sometimes referred to as ______
UBE
spam messages are sometimes called ---- and are used for a variety of marketing purposes including selling products and services
UBE
spam messages are sometimes called ___ and are used for a variety of marketing purposes including selling products and services
UBE
What type of port do most digital devices use to attach peripherals?
USB
Which of the following are widely used tactics that can help keep you safe on the Web
Use your browser's private browsing mode Consider using a VPN Make sure the sites you visit use HTTPS
Persistent cookies store information about _____.
User preferences
Most smartphones and tablets have _________ (touchscreen) keyboards.
Virtual
1. data manipulation 2. data corruption 3. cyberbullying
Which of the following are considered cybercrimes?
White Hat Hacker
White hat hackers are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___
active pixel sensor
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .
active pixel sensor
the width of a screen compared to the height of a screen is referred to as _____________
aspect ratio
Select the input devices often found at a point-of-sale station.
bar code or UPC reader receipt printer
Cell towers are connected to
base transceiver stations
cell towers are connected to ___________
base transceiver stations
Inkjet printers are often sold ____ their production cost.
below
optical storage media: capacity of up to 50gb (per side)
blue-ray
Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.
bluetooth
a short-range wireless transmission protocol is known as _____________
bluetooth
A group of compromised computers controlled by a hacker is called a
botnet
Using online servers to store data is called ___ storage
cloud
the amount of data that defines each color in a pixel is called _____________
color depth
A digital device that accepts input, processes and stores the input, and provides output is a ____ .
computer
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
contrast ratio
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
design
The distance between two adjacent sub-pixels on a display is referred to as ___ .
dot pitch
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .
english
The final step in the system development life cycle is maintaining the system. Select the two phases of this step.
evaluation phase training phase
hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a
firewall
hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a _____________
firewall
To control how information is entered into a database, programmers and database administrator create ______ to help ensure data integrity
forms
A desktop computer's RAM is measured in?
gigabytes
A laptops computer's memory capacity is measured in ___ of data
gigabytes
Most laptops have hard drive capacities measured in ___ or terabytes
gigabytes
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called
hacker
a category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purpose is
hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ______ instead of air
helium
all of the following are true about RFID except
high frequency RFID can transmit signals further than 1500 ft
All of the following are true about RFID except
high-frequency RFID can transmit signals further than 1500 feet
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage technology to retain petabytes of data within 1 cubic inch of space
holographic
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location
holographic
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
holographic
Third party apps must be reviewed and approved by Apple before being available for the
iOS
For ______ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot then to add wired Internet service
individual users
adding software to a digital device, or adding hardware components to a digital device is called ________________
installing
black hat hackers
intent to be mean sad face
firewall software used to block a user's access to specific internet content is called a ___ filter
internet
firewall software used to block a users access to specific internet content is called a(n) _____________ filter
internet
international law
internet
a program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C#____________
interpreter
The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.
investigation
while many third party apps are available through its app store, apps for _____________ must first be tested and approved before theyre made available for downloading
iphones
A form of spyware that records all actions typed on a keyboard is called a
keystroke logger
form of spyware that records all actions typed on keyboard
keystroke logger
A short email uses about a
kilobyte
A short email uses about one ___ of data.
kilobyte
A short email uses about one ______ of data
kilobyte
android OS released in 2014
lollipop
A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .
loop
file compression: reduces space required by reducing redundancy within files
lossless
because it reduces an audio file's sampling rate to save space, the MP4 format is a ___ compression format
lossy
what is the name of a virus written in macro language and placed within a document or spread sheet
macro virus
A large ___ can remove data from a traditional hard drive, but won;'t hurt a Blu-ray disk
magnet
Be careful to ony open email from senders you know and trust. ________ may be contained in email messages
malware
when referring to business information technology, MIS stands for ______________
management information systems
Experts suggest using password _ software to keep your passwords safe
management software
one of the largest data requirements of the future will likely be ___________
mapping patients genomes
the most common audio input device is a
microphone
the standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or ________________
netiquette
two common categories of cybercrimes include single events and _____________ series of events
on-going
A storage device that uses lasers to read CDs, DVDs, or Blu-ray Discs is referred to as a(n) ___ drive
optical
Blu-ray disks and DVDs are ___ media
optical
DVDs, Blu-rays and CDs are examples of _______ media storage
optical
In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.
optical
Using reflective material to store data that can be read using a laser is called ___ media storage.
optical
A storage device that uses laser to read CDs, DVDs, or Blu-ray Discs is referred to as a(n)
optical drive
Storage device that uses lasers to read CDs, DVDs, or Blu- ray discs is referred to as an _____
optical drive
Select the storage devices.
optical drive external hard drives USB drives
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
optical drives
which area of the control panel screen in windows 7 allows you to adjust parental control?
other users
A secret code used to help prevent unauthorized access to data and user accounts is called a
password
An input, output or storage device connected to a computer is known as a(an) _____ .
peripheral
stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as ___ cookies
persistent
stored on a user's hard drive, a type of cookie that collects info. about user preferences, password and username info, ip address and data on web surfing
persistent cookie
What are the current uses for RFID tags
pet identification, package tracking, and inventory tracking
Rank the storage capacities from highest to lowest:
petabyte terabyte gigabyte megabyte kilobyte
server banks have capacities measured in
petabytes
a type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
pharming
creating a fake webpage to trick victims into divulging personal information is a type of phishing known as
pharming
type phishing that seeks to obtain personal info through malicious software that
pharming
illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a blank, or insurance company is called
phishing
highlight(llegitmate use of an email message collect personal inforamation
phisihing
the smallest element of an image is called a(n) _________
pixel
Select the output devices.
printers
Converting a task into commands that a computer can use to perform the task is called ___ .
programing
Adware often accompanies downloaded
programs
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control on the network is called _______ software
remote desktop
A worm that is a type of malware that _ itself throughout a single computer or across a network
replicates
a worm is a type of malware that ___ itself throughout a single computer or across a network
replicates
The number of pixels in an image is called the image's ____ .
resolution
The number of pixels in an image is called the image's __________.
resolution
if you accidentally delete a file it's not lost forever! just go to your recycle bin, select the item and click _______________
restore
To access an app's Jump List, just ___ on the app's icon in the taskbar. - right-click - double-click - drag across - click
right-click
To open the shortcut menu inside the Documents folder, just ___ in any open area of the Documents window. - double-click - click - right-click - scroll
right-click
Software programs that hide in the operating system & allow for the installation of hidden files
rootkits
Your _____ can provide hardware firewall protection for your home network where it connects to ISP's network, just as ISP networks have firewalls where they connect to the Internet
router
the device that connects 2 networks is a ____________
router
Computer viruses typically must be ---- to attack and do damage. viruses can destory programs/ alter the operations of a computer/ networks
run
if you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___ mode
safe
If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in
safe mode
which of the following are internet service options?
satellite, cable, fiber optic
command+s
save
storage
saving a file to the cloud
The diagonal measure of the visible display is known as _______.
screen size
command+shift+3
screenshot
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____
script kiddies
amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________
script kiddies
The item that comes in capacities measured in petabytes
server banks
What type of cookie is stored in temporary memory and is lost when the web browser is closed
session
stored in temporary memory, ----- cookies are used to analyze and measure
session
stored in temporary memory, ___ cookies are used to analyze and measure traffic on a web page
session
what type of cookie is stored in temporary memory and is lost when the web is closed?
session
Rather than going through the Control Panel, an easy way to change your system settings in Windows 10 is to open Cortana and type ___ in the search window. - modify - settings - help - changes
settings
The item that uses approximately 1 kilobyte of data
short email
In general, the ___ the access time, the faster the hard drive
shorter
In general, the _____ the access time, the faster the hard drive
shorter
Increased data transfer will be less likely to have errors if you use a ___ USB cord.
shorter
this is the settings area of google chrome. where would you click to adjust cookie and site data permissions?
show advanced settings
the software code of a particular computer virus is called the virus
signature
anitiviruses programs uses a variety
signature heuristic
Specialized hardware of software that capture packets transmitted over a network called packet
sniffers
Specialized hardware or software that capture packets transmitted over a network are called packer
sniffers
specialized hardware or software that capture packets transmitted over a network are called packet
sniffers
specialized hardware or software that capture packets transmitted over a network are called packet ____________
sniffers
unsolicited email is
spam
Computer software that is designed to prevent spam messages from entering into a user's email inbox is called a
spam filter
computer software that is designed to prevent spam messages from entering into a user's email inbox
spam filter
While not a required step in sending an email, it's wise to _____ any message before clicking send
spell check
select the output devices
television, printers, keyboards
A thousand gigabytes equal 1 ___
terabyte
Bus width
the amount of data that can be transferred at a given time
converts electrical impulses into air
the characteristics of audio output
Where is the "Show Desktop" button on Windows 10? - in the File menu - on the Quick Access toolbar - the extreme right of the taskbar - in the Office menu
the extreme right of the taskbar
select the qualities that make a trait useful for biometric recognition
the trait must not change over time, everyone must have the trait, and the trait must be measurably different with each person
commonly used for reciepts
thermal printer
A kilobyte is equal to approximately one _____ bytes.
thousand
to create an image with a laser printer _____________ is(are) drawn to the drum
toner
USB drives special ___ to store information
transistors
To select a paragraph in a word processing program is usually as easy as ___ the left mouse button. - double-clicking - triple-clicking - clicking - dragging
triple-clicking
3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.
true
A computer platform is commonly referred to as an operating system or OS
true
A computer platform is commonly referred to as an operating system or OS.
true
Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today.
true
Applications are computer programs created to execute specific tasks.
true
Many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos.
true
The Android OS is owned and maintained by Google (Alphabet).
true
click on the organization below that you should contact if you receive a phishing message
us-cert
Web server
used to control access to resources on the web
Network server
used to control access to resources such as printers and applications on a network
Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device
virus
A camera that takes photos or steams video into a computer or over the Internet is called a ___ .
webcam
One risks with cookies is
websites using cookies can collect your information and sell it to third parties
it equals the number of pixels in a display and measures image quality
which are true regarding a screen's resolution
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called
white hat hackers
A destructive program that replicated itself throughout a single computer or across a network is called a ______
worm
A detractive program that replicates itself throughout a single computer or across a network is called a
worm
T or F? Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today
True
Single event
Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud.
If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them
$50
Image compression formats
- JPEG -PNG
3 items needed to install a home WiFi network
- an internet signal -a modem - a router
single event cybercrimes
- phishing - Trojan horse - keystroke logger
cyberattacks
- rootkit - packet analyzer - DOS attack
CDs
- used for music albums - store roughly 700 MB
Cell phone manufacturers
-Blackberry -Xiaomi -Huawei
Which would be used to store a single bit of data?
-a transistor - a hole in a punch card
A single letter uses approximately how many bytes of data?
1 byte of data
Select output devices
1) tv 2) printers
you need to adjust cookie and data permission settings in Google chrome
1)click the chrome menu on the browser toolbar then select settings 2) click show advanced settings. in the privacy section , click 3) in the Cookies section change the desired cookiest settings.
1. CTRL+V 2. CTRL+P 3. CTRL+Z 4. CTRL+S
1. Paste 2. print 3. undo 4. save
Microsoft recommends when that you create passwords with upper and lower case letters, numbers, symbols, and use at least ___ characters. - 8 - 6 - 10 - 4
8
Cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
Trojan
A program that appears legitimate, but executes an unwanted activity when activated. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps.
Cookie
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
Email virus
A virus that is attached in a file and sent via e-mail.•When the infected file is opened, the virus infects the computer. •Phishing -tricks users into revealing usernames and passwords by appearing legitimate. Ransomware -when activated, encrypts files on user hard drive and then sells a decryption program.•Keystroke logging Trojan -when activated, saves all keystrokes for subsequent transmission to virus creator.
macro
A virus written in a specific language and placed within a document or spreadsheet is called a _____ virus.
Business owners, copyright holders, and network administrators publish _____ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software
AUPs
Equipment and technology that allows users to input data into a computer without the use of a traditional keyboard and mouse or touchpad is referred to as _________________.
Adaptive use
Where can you type your question to search for files, folders, and apps in Windows 10, along with searching the web and interacting with Cortana? - Alexa Now window - Google Plus window - Ask me anything. window - Siri window
Ask me anything window
In the binary numbering system, 8 bits constitute a byte. A _____is half a byte. A)base 2 B)nibble C)binary digit D)exabyte
B)nibble
Judy wants to purchase a Blu-ray Disc that can be recorded on multiple times. She should choose discs that are labeled
BD-RE
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.
Barcode
the coding step of the PDLC might use which of the following languages?
C++
Put the steps to change safari cookie
Choose safari Click Preferences Click privacy Change cookie settings
The number of bits of data describing each pixel in a display is referred to as ___ .
Color depth
To adjust your Windows computer's time and date settings, it's often easiest to go to the ___ panel. - Availability - Settings - Control - Coordination
Control
Every gaming console uses a specific input device called an ___________
Controller
CTRL+X
Cut
Number of times per second a frame in a video is advanced is the definition of ___ .
Framerate
According to US-CERT if you receive a phishing message you should contact them using which of the following method
In Outlook Contact the via the phone number
Firewall software used to block a user's access to specific internet content is called a
Internet filter
A ________ allows programmers to convert source code line-by-line
Interpreter
current uses for RFID tags
Inventory tracking, package shipment tracking, and per identification
6 steps of SDLC:
Investigation Analysis Design Development Implementation Maintenance
An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .
Java
______ is an object-oriented programming language that is popular when writing Android apps
Java
Windows 10 allows you to right-click on a app's icon in the taskbar and have a menu of options. It also shows you the most recent files you've had open in the app and allows you to "Pin" items. This menu is called a ___ . - Option Menu - Choice Button - Quick Access Menu - Jump List
Jump List
Select what is true regarding keystroke loggers
Keystroke loggers can record passwords and confidential information Can be hardware devices and software applications Software based keystroke logges are often a Torjan that is installed without the user's knowledge
Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of
Keystrokes Passwords Account numbers
By efficiently turning electrons into photons, _____ backlit displays provide very bright screens with very little energy
LED (light-emitting diodes)
What are the acronyms for types of computer monitors?
LED and LCD
Lower range tones generally require ___ speakers.
Larger
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.
MEMS
the technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____________ chip
MEMS
_______ are mini-programs that allow you to program easily by streamlining processes
Macros
Malware
Malware is short for malicious software. Malware is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Malware includes a variety of programs including viruses, worms, and Trojan horses.
By upgrading to it's maximum capacity of 16 GB of RAM and 1 TB of storage, the _______ tablet could be an extremely powerful computer
Microsoft Surface Pro 4
by upgrading to its maximum capacity of 16gb of RAM and 1tb of storage, the ________________ tablet could be an extremely powerful computer!
Microsoft surface pro 4
The technology that musicians often use to connect their instruments to computers is _________.
Midi
Select what's true about fee based and free antivirus software
Most fee base software comes with technical support One with positives of free anti virus software is their malware detection performance
A link between tables in a relational database that defines how the data is related is called a
Relationship
The number of pixels in a display is called the display's ___ .
Resolution
The number of pixels in an image defines the pictures _________.
Resolution
The number of pixels in an image is called the image's ____ .
Resolution
Software programs that hide the operating system and allows for the installation of hidden files are called
Rootkits
CTRL+S
Save
Diagnosing a hacked system
Signs your system might have been hacked include: Fake antivirus messages - If you notice these messages, power down your computer and reboot your computer in safe mode. In safe mode run your anti-virus program. Unwanted browser toolbars. Frequent random fake emails or social media messages from your account.
Web cookie First party cookie Third party cookie
Small test file of information created by websites you visit that your web browser stores on your hard disk Small test file of information created by a website you visit that keep track of your personal preference and the current web browsing session Small test file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
Avoiding Viruses
Some ways to help avoid viruses include downloading and installing the latest antivirus software and installing and running a firewall. Other ways to avoid viruses include only downloading software from trusted sites and only visiting trusted websites.
on-going
Two common categories of cybercrimes include single events and _____ series of events.
Flash drives or thumb drives are common names for ___ drives
USB
Most peripherals connect to a computer uses a _______ port.
USB
Most smartphones and tablets produced today use a _____ keyboard.
Virtual
Software that infects a computer and is created using computer code is called a computer _____.
Virus
A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.
Visual
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to enormous vulnerabilities) was knowns as ______
WPA
the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as _______________
WPA (wired equivalent privacy)
In addition to activating _______ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected
WPA2
in addition to activating ___________ protection, it's a good idea to disable your routers SSID transmission once all your devices are connected
WPA2
macro virus
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.
White Hat Hackers
A destructive program that replicates itself throughout a single computer or across a network is called a
Worm
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
Worm
Zombie
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
Bus
a channel over which information flows in a computer
CDs store data using
a reflective coating that has pits and lands
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___.
active pixel sensor
transaction
business to consumer
Eight bits are considered to make one ___ of informational. In ASCII, it is the data required to store one character, such as a letter or a number
byte
In ASCII, eight bits=one ______
byte
One character of information, for example, a letter or a number consists of one ___ of storage
byte
One disadvantage of cloud storage is that
data is only available when you're online.
fuction session cookie
determine determine analyze
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym DDoS stands for
distributed denial of service
trojan malware
doesn't replicate themselves
optical storage media: capacity of up to 8.5 gb
dvd
which of the following are considered storage media?
dvds, blu ray disks
a virus is attached in a file in and sent via email message is called a ___ virus
designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display
extensible markup language
When you receive a file, you can tell what type it is by its ___ . This is a dot and 3 or more characters after the file's name. - extension - title - definition - description
extension
In general, game controllers can be interchanged between different types of gaming consoles.
false
T or F? Game controllers can be interchanged between different types of gaming controllers
false
after the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ____________ and is written in an ordinary language, such as english
flowchart
in order to keep your files organized, its a good idea to create __________ and place your files in them
folders
Number of times per second a frame in a video is advanced is the definition of ___ .
frame rate
Number of times per second a frame in a video is advanced is the definition of _____.
frame rate
Number of times per second a frame in a video is advanced is the definition of ___________.
frame rate
The term that describes how fast each pixel in a display is updated is _____.
frame rate
number of times per second a frame in a video is advanced is the definition of ____________
frame rate
which of these devices are manufactured by samsung?
galaxy, note
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.
generation
Most laptops have hard drive capacities measured in ____ or terabytes
gigabytes
a desktops computer RAM is measured in _____________ of data
gigabytes
what is equal to one cycle per second?
hertz
using refracted laser light to store data on a photoreceptive substrate is essentially how ____________ storage works. Theoretically this could store gigabytes of date within a cubic millimeter
holographic
Apple's mobile device with the largest display is the
iPad Pro
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .
information systems (information technology) technician
uses ink cartridges
inkjet printer
To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.
intellectual
Which of the following represents the least amount of storage?
kilobyte
DVDs have pits and lands that absorb or reflect a ___ beam. DVDs can store approximately 4.5 GBs of data (single layer)
laser
Image compression format of GIF
legacy (outdated) lossless format
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives
longer
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
longer
match the business information system (IS) activity with the appropriate manage level: use IS for record keeping and reporting purposes
middle managers
Megahertz is equal to one _____ cycles (or instructions) per second.
million
a megabyte equals approximately one _____________ bytes?
million
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
The only disadvantage of a solid state drive rather than a traditional (magnetic) hard drive is that the solid state technology is ___
more expensive
Image compression format of PNG
most popular lossless image compression format
Image compression format of JPEG or JPG
most popular lossy image compression format
capacitance
most touch pads use _to sense when a finger has moved across the pad
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
safari accepts cookies and website data from which of the following?
only from websites you visit
All of the following are protected against unauthorized use or distribution by intellectual property laws except
open educational resources
computers viruses typically must be ___ to attack and do damage. viruses can destroy programs or alter the operation of a computer or network
opened
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
what manages hardware and software, supports the computers basic functions, and runs programs?
operating system
which of the following are used to take fingerprints
optical, capacitance, ultra-sonic
The BitTorrent protocol is often called ______ file sharing
peer-to-peer
where would you click in the view page info screen in Mozilla Firefox page that allows you to access the area that allows you to block cookies
permissions
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
A type of phising that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called
pharming
creating a fake webpage to trick victims into divulging personal info. is a type of phishing
pharming
The illegitimate use of an email message that is sent to collect personal information and appears to be from an establish organization such as a bank company is called
phishing
Blu-ray stores data using ___ .
pits and lands that are read by a blue spectrum laser beam
The smallest controllable element of an image is called a(n)___ .
pixel
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .
plotter
used for drafting or blueprints
plotter
To create a reminder in Windows 10, click Cortana, then select the light bulb, and then click the ___ sign. - dollar - plus - bell - speaker
plus
All of the following are best practices when using LinkedIn except
post vacation photos to show your friends where you've travelled.
adware often accompanies downloaded
programs
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
projective capacitive
An output device that uses light to display video or image output on a surface is called a ___ .
projector
DMCA signed two
property organization
What type of server intercepts all messages between client and a server to help avert a hacker or other intruder from attacking a network
proxy
what type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network
proxy
Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.
pseudocode
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called ______
quarantine
in 2017, wanna cry infected nearly 250,000 computers in one day. in malware encrypted victims data files and demanded payment for decryption code. this type of malware is called
ransomware
one version of this malware encrypts the citims data until a payment is made.
ransomware
which colors typically make up a monitor's pixels?
red, green and blue
With optical zoom, resolution ____ when focusing on distant objects.
remains the same
SDLC
software development lifecycle
ted installs computers software designed to prevent spam messages from entering his email inbox. this type of software is called a ___ filter
spam
The component of a computer that allows data to be retained after power is turned off is referred to as
storage
The component of a computer that allows data to be retained after power is turned off is referred to as ____
storage
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
the component of a computer that allows data to be retained after power is turned off is referred to as ____________
storage
Most desktop computers come with a traditional hard drive to ___ data
store
highly mobile device that can be used while standing or even walking
tablet computer
A programming design that breaks down a problem into a series of tasks is called ___ programming.
top-down
connsidered intellectual
trademarks patents trade secret
Phishing
tricks users into reveling usernames and passwords by appearing legitimate.
You must individually adjust cookie settings in every browser you use.
true
UltraHD
tv displays with resolutions of at least 3840 x 2160 are referred to as _
USB flash drive
used to store data
Persistent cookies store information about
user preferences
The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.
video conferencing
most smartphones and tablets produced today use a ___________ keyboard
virtual
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
wire-wire
A computer controlled by a hacker is called a
zombie
A computer controlled by a hacker is called a _____.
zombie
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
zombie
if your debit card has been compromised US federal law says you are only liable for a maximum of ________________ in fraudulent charges if you tell your bank within two business days of learning about them
$50
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
$500
if your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to ______________
$500
If your debit card has been compromised and you wait more than 2 days, but fewer than 2 months after you learn about the loss, you can be liable for up to ______
$500dig
What are the technologies used by facial recognition software.
- 3D mapping - Skin texture measuring - Feature charting
Select the technologies used by facial recognition software.
- 3D mapping - feature charting - skin texture analysis - capacitance analysis
Advantages of using a database instead of a traditional filing system
- A database can hold longer amounts of data - A database can provide better data integrity
Video file compression formats
- AVI -MP4 -QuickTime
List the characteristics of a projector
- Allows large audiences to view digital output - Usually used with a screen - Usually requires a darkened environment
True regarding a Wi-Fi's SSID
- An SSID is the Wi-Fi's name - Most routers transmit the SSID every few seconds so roaming devices can find the signal -In the home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary
Tablet computers
- Apple iPad - Samsung Galaxy NotePRO -Amazon Fire HD
Storage
- Blu ray disc - Solid State Drive (SSD) - USB drive - Read Only Memory (ROM)
select the optical drives
- Blu-ray player -DVD drive
Which colors make up a typical monitors pixels.
- Blue - Green - Red
Optical Media
- CDs - uses layer to read/write data - blu-ray discs - DVDs
Cyberattacks include
- DDoS attacks - identity theft
select the disadvantages of using cloud storage
- Data is only available if you are online - Data stored on someone else's server can be accessed by anyone who had administrator privileges to the server
Disadvantages of using cloud storage
- Data stored on someone else's server can be accessed by anyone who has administrator privileges to the server - data is only available if you're online
USB Drive
- Durable - Also called a "thumb drive" or a "flash drive" - "uses electronic circuits to store data - very fast
Which of these should business owners do to help protect their data?
- Establish strong firewall protection for their business's network - Ensure antivirus software is installed and up-to-date - create strong password protections and protocols
List Input Devices
- Game controller - Keyboard - Microphone - Mouse
MEMS chips are used in which of the following?
- Hearing Aids - Smartphones
Characteristics of a Blu-ray Disc
- Holds approximately 25 GB of data - Uses pits and lands to store data
true regarding IP addresses
- IP stands for Internet Protocol - In most home networks IP addresses are assigned by the Internet Service Provider - If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address
List some Peripherals.
- Keyboard - Printers
List the acronyms that describe a type of computer monitor.
- LCD - LED
List common printer manufacturers.
- Lexmark - HP - Canon - Brother
computers infected with a virus exhibit many symptoms including
- OS does not launch properly - files get deleted or encrypted - strange error messages or pop-up ads
Common symptoms of a computer virus infection include
- OS doesn't launch properly - files get deleted or encrypted - strange error messages or pop-up ads
Memory
- Random Access Memory (RAM) - Processor registers - L3 Cache
Advantages of cloud storage
- Redundancy - Availability
List Output Devices
- Speaker - Printer - Monitor - Projector
Blu- ray discs
- Stores roughly 25 GB - Used to store HD movies
Usual tasks of information systems program managers
- Supervising IS technicians - working with developers and senior management to procure and implement IS processes - Developing training plans and policies for IS
Which is true regarding a displays refresh rate?
- The higher the refresh rate, the smoother the video - Describes how fast each pixel in a display is updated - Videos play best with refresh rates at even multiples of the frame rate
virus
- Trojan horse - worm - macro
List the input devices often found at a point-of-sale station.
- UPC scanning wand - Keypad - Bar code or UPC reader
The characteristics of a DVD
- Uses pits and lands to store data - Holds approximately 4.5 GB of data
Audio file compression formats
- WAV -MP4
What's true about database fields
- a group of related characters in a database -Represent a characteristics of someone or something -Primary key is a field designation
cookies settings you can adjust in Internet Explorer (Microsft Edge)
- allow cookies -delete cookies -block cookies
identify what is true about script kiddies
- amateur computer hackers with the little programming expertise - illegally gain access to computer systems using programs (script) that others have written
Functions of Mobile Switching Stations
- assigns frequencies to your calls - sends your call to the receiver's MSS -changes the cell and base station your transmissions go through as you travel
the advantages of using cloud storage
- availability; data can be retrieved by any internet connected device - Redundancy; data is stored on multiple servers
When reporting ethics violations of a co-worker to your employer, it's important to ______
- be brief and direct -state only what you witnessed
on-foing series of events cybercrimes
- blackmail - cyberstalking
true regarding dual band routers
- can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals int eh 5.0 GHz frequency range - minimizes the impact of interference from microwave ovens and car alarms
Usual tasks of a data analyst
- collects data -interprets information provided by the database - creates reports for senior management
Characteristics of a router
- connects networks -provides hardware firewall protection -usually incorporates a switch
If you believe you have fallen victim to a phishing scam you should
- contact the institution the message was allegedly sent from - contact US-CERT
the privacy risks associated with cookies
- corporate and government entities can track your web behavior - websites can track your surfing behavior and create a profile - websites using cookies can collect your information and sell it to a third parties
you can change your Firefox settings to allow you to
- delete stored cookies automatically when you start Firefox -Approve cookies storage requests -Deny cookie storage requests
you can change your Firefox settings to allow you to
- deny cookie storage requests - delete stored cookies automatically when you start firefox 0 approve cookies storage requests
select the characteristics of desktop computers:
- desktops allow for relatively easy upgrade and expansion -desktops are often used in offices since they dont need to be mobile -desktops use a full OS
the functions of session cookies
- determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used
common symptoms of a computer virus
- documents won't save - computer runs extremely slow - programs launch on their own
which of the following are ways to safely download antivirus software
- download the software from a trusted sit like www.cnet.com - download the software form a known anti-virus software vendor
Select the characteristics solid state drive storage devices
- durable, no moving mechanical parts - use electronic circuits to store data
Characteristics of solid state drive storage devices
- durable, no moving mechanical parts - uses electronic circuits to store data
True regarding Fiber Optic Internet service
- fastest home network option when available -not available in all areas - signal is carried by light waves so it's less subject to electromagnetic interference
select the characteristics of cloud storage
- files are backed up (stored on multiple servers) - servers act like giant hard drives - users can download files to other devices on the internet
Characteristics of a hard drive
- has a read/write head to detect magnetic charges - uses magnetic charges to store data - has physically spinning platters
select the characteristics of a blu ray disk
- holds approximately 25gb of data -uses pits and lands to store data
Characteristics of a DVD
- holds approximately 4.5 GB of data - uses pits and lands to store data
which of the following should be considered when choosing an ISP?
- how many users will be logged on my network at the same time? -will users be streaming data? -what ISP choices are available in my area?
cyberattacks include
- identity theft - pharming - DDOS attacks
Rootkits allow a remote user to so which of the following
- install rogue files - create backdoor programs - delete files
Of you own a small business, what can you do to ensure your computers and data is kept secure?
- keep software updated, particularly antivirus software - physically secure computers to minimize risk of theft - backup your data regularly
what is true regarding keystroke loggers
- keystroke loggers can record passwords and confidential information - can be hardware devices and software applications - software based keystroke loggers are often a trojan that is installed without the user's knowledge
True about packet sniffers
- legitimate sniffers are used for routine examination and problem detection - unauthorized sniffers are used to steal information
what is true about packet sniffers
- legitimate sniffers are used for routine examination and problem detections - unauthorized sniffers are used to steal information
the correct statements about fee based antivirus and free anti-virus software
- most of the free anti-virus programs perform almost as effectively as their fee-based counterparts - one of the main differences between free and anti-virus software is the number of features ------------ incorrect!!! one of the positives of free anti-virus software is their spam detection performance
When choosing a cell phone provider, factors to consider include
- network size/ coverage - service/speed -pricing
For which of the following activities would a typical marketing department need a strong information system?
- online sales - online advertising - updating the business's social media sites
Storage devices
- optical drive -external hard drive - USB drives
on the privacy tab in internet explorer you can adjust which settings?
- override your privacy settings for certain types of cookies - block or allow specific websites - what types of cookies are blocked or allowed
typical firewall programs or hardware devices filter all information coming through the internet to your network or computer system. there are a variety of techniques that are used to minimize the risk of harmful infusion into a computer or network including
- packet filters - proxy servers
Advantages of helium drives over traditional hard drives
- platters spin faster - platters stay cooler - more platters can be placed on the same amount of space
which of the following are symptoms of an online nuisance attack?
- pop up start appearing after you visit unfamiliar sites - receiving a lot of spam messages or bounced back email messages - frequent pop-ups while searching the web or working in programs
examples of uploading files
- posting a photo on social media - placing an ad on craigslist - posting a YouTube video
Select the characteristics of a plotter.
- prints large graphic displays - mechanically moves a pen over a large sheet of paper - uses inexpensive toner rather than ink - paper turns black when heated
which of the following re factors to consider to help protect them hardware of your digital device
- protecting a digital device from humidity - protecting a digital device from magnetic fields - protecting a digital device from overheating
which of the following are common email viruses?
- ransomware - phishing - keystroke-logging trojan
Select the reasons of compress a file
- reduce storage space requirements - reduce bandwidth needed to transmit a file
Reasons for compressing a file
- reduce the bandwidth needed to transmit a file - reduce storage space requirements
Characteristics of a OneDrive account
- requires a Microsoft Email account - provides free cloud storage -can serve as extra storage space
Characteristics of computer storage
- retains data when power is turned off - sometimes referred to as a secondary storage
Methods of using cloud storage
- saving a photo on Flickr - purchasing online storage space -emailing a file to yourself
antivirus programs use a variety of techniques to identify and remove viruses and malware. two of the most common techniques are
- signature-based detection - heuristic-based detection
which of the following are online nuisances?
- spam - spoofing - spyware
Online nuisances
- spam -spyware -spoofing
Object-oriented databses
- store instructions for how to compute the data as well as the data to be processed - equipped to handle unstructured data such as MP4 files, video, images, and extremely large files - use object query language to construct queries that extract data from the database
important considerations when purchasing a new tablet computer include:
- the amount of RAM it has -the size of its screen -the amount of storage it has
Commonly used names for USB drives
- thumb drives - flash drives
What are some commonly used names for USB drives?
- thumb drives - flash drives
this is the system and security area that is accessed by clicking control panel>system and security. when you click windows firewall, what are some of the firewall settings you can adjust?
- turn windows firewall on or off - update your firewall settings - changes notification settings
what are the symptoms that your system has been hacked?
- unwanted browser toolbars - redirected internet searches - fake emails or social media messages from your account
Characteristics of cloud storage
- users can download files to other devices on the internet - files are backed-up (stored on multiple servers) - servers act like giant hard drives
True regarding Cellular Internet service
- uses cell phone radio waves to transmit and receive internet signals - many providers offer data packages that may place limits on uploading and downloading -many smartphones can send and receive WiFi signals, allowing them to become hotspots
Select the characteristics of SSD storage
- uses flash technology - has no mechanically moving parts - uses the same technology that is found in USB drives (thumb drives)
Characteristics of SSD storage
- uses flash technology - uses the same technology that is found in USB drives - has no mechanically moving parts
Characteristics of a traditional hard drive
- uses magnetic charges to store data -has a read/write head to detect magnetic charges - has physically moving platters
The characteristics of a traditional hard drive
- uses magnetically charged plates to store data - commonly found in desktop computers
true regarding satellite internet service
- uses microwaves to deliver service -provides broadband service virtually anywhere -customers usually purchase a data plan that limits uploading and downloading
Select the characteristics of a Blu ray disc
- uses pits and lands to store data - holds approximately 25 GB of data
True regarding DSL internet service
- uses telephone wires as transmission wires -internet signals tend to be very consistent
True regarding cable internet service
- uses the same coaxial cable that brings the cable television signal -usually has more bandwidth than DSL lines - Internet service can often be bundled with television service
Common types of malware
- viruses -worms - trojan horse
true about privacy risks with cookies
- websites using cookies can collect your information and sell it to third parties - Websites can track your surfing behavior and create a profile - Corporate and government entities can track your web behavior
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data
- what field name will the data fall under - what data type will be included
How can you attach a mouse or other pointing device to your computer?
- with a Bluetooth connection - with a wire through a USB port
Reasons for purchasing a broadband internet service
- you have several devices online at the same time - you need relatively high-speed internet service - you want Wi-Fi in your home
select the common word processing file extensions:
-.odf -.docx
Which of the following refer to ultra-high-definition television displays?
-4K UHD -8K UHD -UltraHD -SuperHd
Which of the following are considered storage media?
-DVDs -Blu-ray discs -external hard drives
The 3 phases that should be accomplished in the investigation step of the SDLC include:
-Defining the problem. What should this system do? Who will by using this IT system? -Examining alternatives. Can available hardware and software perform the same task? -Reporting. Document your investigation's findings.
There are a variety of cookie settings that can be adjusted in Google Chrome including
-Deleting cookies -blocking/allowing cookies by default -making exceptions for cookies from specific websites/domains
Identify the characteristics of a desktop computer.
-Desktops are useful for those who need a computer they can walk around with. -Desktops are often used in offices since they don't need to be mobile. -Desktops allow for relatively easy upgrade and expansion.
Select what's true about session cookies.
-Determine the start and end of a session. -Analyze and measure traffic on a web page. -Determine the web browser being used.
The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.
-Holiday conversion - placing the new system online while everyone is gone. -Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly. -Parallel conversion - running both systems side-by-side for a while and then shutting the old system. -Direct conversion - shutting down the old system completely and starting the new one.
According to US-CERT if you receive a phishing message you should contact them using which of the following methods.
-In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. -In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. -If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.
Which of the following are ways to prevent computer virus infections.
-Install the latest antivirus software and update frequently. -Downloaded content from the web should only be from trusted sites. -Limit your web surfing to trusted sites.
Select the video file compression formats.
-MP4 -MP3
Select the characteristics of RFID.
-Select the characteristics of RFID. -RFID can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -High-frequency RFID can transmit signals further than 1500 feet. RFID doesn't require line of sight scanning.
Which of the following should you consider when buying a new computer?
-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot? -Does it come with Windows XP?
Which of the following statements about Instagram are true?
-Your Profile section on Instagram must be accurate. -It is important to adjust your privacy settings so you can determine who follows you. -If you don't want to be tracked turn off geo-tagging in the settings under Location Services.
online nulsances
-adware -spyware -spam
Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).
-allow cookies -delete cookies block cookies
select the statements that refer to color depth
-also known as "bit depth" -a measure of the accuracy of the color of each pixel -specifically, the number of bits of data describing each pixel in a display
identify what's true about script kiddies.
-amateur computer hackers with little programming expertise -illegally gain access to computer systems using programs (scripts) that others have written
Functions of a Digital Signal Processor
-analyzes signals received from the analog-digital converter to enhance audio quality -reduces unwanted noise -moderates call volume
select the functions of a digital signal processor
-analyzes signals received from the analog-digital converter to enhance audio quality -reduces unwanted noise -moderates call volume
select all the tablet computers
-apple ipad -samsung galaxy note PRO -amazon fire hd
True about worms
-automatically reproduce - replication exhausts networks bandwidth or available storage - often sent using email attachments
select whats true about worms:
-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email attachments
Select what's true about worms.
-automatically reproduce -replication exhausts network bandwidth or available storage -often sent using email attachments
When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.
-be brief and direct -state only what you witnessed
On-going series of events
-blackmail -cyberstalking
Select appropriate LinkedIn contacts.
-business contacts -professional peers
Select the true statements regarding an LED display.
-can be extremely thin -extremely energy efficient -create a significant amount of heat
select the common internet transmission media:
-coaxial cable -telephone wire -cell phone radio waves
select what's true about macro viruses
-commands in the macro language set off the destructive events -when file is opened the macro virus executes -initiated by downloading and opening an infected attachment
Select the characteristics of thermal printing.
-commonly used for printing receipts -paper turns black when heated -makes high quality photo prints -useful for printing multiple color copies
if you believe you have fallen victim to phising scam
-contact the instituition was message was allegedly sent from -contact US-CERT
if you believe you have fallen victim to a phishing scam you should:
-contact the institution the message was allegedly sent from -contact US-CERT
If you believe you have fallen victim to a phishing scam you should
-contact the institution the message was allegedly sent from. -contact US-CERT.
hacker
-cyberterrorist -black hat -white hat -script kiddles
Which of the following are considered cybercrimes?
-data manipulation -data corruption -cyberbullying
Which are true regarding a screen's resolution?
-equals the number of pixels in a display -described as distance between 2 pixels -equals the diagonal length of the screen
symptoms that your system has been hacked
-fake emails or social media messages from your account -redirected internet searches -unwanted browser toolbars
online nuisance
-frequent pop-ups while searching the web/working in programs -pop-ups start appearing after visiting unfamiliar sites -receiving a lot of spam emails and bounced back email.
select the characteristics of a dvd
-holds approx 4.5 gb of data -uses pits and lands to store data
Select the characteristics of a Blu-ray disc.
-holds approximately 25 GB of data -uses pits and lands to store data -a read/write head senses the magnetic charges
Select the characteristics of a CD
-holds approximately 700 MB of data -uses pits and lands to store data
Select the characteristics of a CD.
-holds approximately 700 MB of data -uses pits and lands to store data -a read/write head senses the magnetic charges
virus symptoms
-if a system/network is infected severely, it may even black out/ not even launch the startup process - the operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. -critical files may get deletd automatically , and this can happen periodically or all at once
which are considered cybercrimes?
-internet scams -cyberespionage -information theft
considered cybercrimes
-internet scams -cyberspionage - information theft
Select the features common in DSLR cameras.
-often allow for interchangeable lenses -are less expensive than point-and-shoot cameras
Select the features common in DSLR cameras.
-often allow for interchangeable lenses -usually have a mirror that allows the photographer to look directly through the lens -rarely include optical zoom -are less expensive than point-and-shoot cameras
Select what's true about Trojan malware.
-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls
A digital identity is comprised of a variety of digital attributes including
-online search activities -the spreadsheet software you're using.
Select the current uses for RFID tags.
-package tracking -inventory tracking -musical fidelity
In the settings area of each browser you should consider
-periodically deleting cookies. -blocking/customizing your cookie settings. -decide from which sites you want to allow cookies.
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following?
-periodically reviewing computer-use policies -enforcing standards by creating firewalls, monitoring protocols, and filters -instructing employees on standards
Internet service options
-satellite -cable -fiber optic
Select the factors that should be considered when purchasing external speakers for a digital device.
-sound quality -portability -price
select the sites that offer internet speed test services
-speedtest.net -testmy.net
Malware is designed to do which of the following?
-steal info - incapacitate a computer/network -destroy data
select the statements that are true regarding switches
-switches connect computers and other devices within a network -switches are usually integrated in the routers of home networks -switches ensure that correct data is transferred to and from the appropriate devices in networks
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
-tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. -tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. -tell you boss that others have told you that this co-worker frequently visits porn sites at work.
select the statements that refer to the term "dot pitch"
-the distance between two adjoining sub-pixels in a display -the closer the spacing (the smaller the dot pitch) the sharper the image
which statements are true regarding instagram?
-the profile section lists your name, birthday, gender and phone number -if you dont want to be tracked, turn off geo-tagging in the settings under location services
true about passwords
-the term passcode and key are synonyms for pw -pws can be used to secure computers, networks,software,personal accounts and digital devices
select the characteristics of a traditional hard drive
-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters
select the characteristics of a traditional hard drive
-uses magnetically charged plates to store data -commonly found in desktop computers
select the statements that are true regarding satellite internet service
-uses microwaves to deliver service -provides broadband service virtually anywhere -customers usually purchase a date plan that limits uploading and downloading
select the statements that are true regarding cable internet service:
-uses the same coaxial cable that brings the cable television signal -usually has more bandwidth than DSL lines -internet service can often be bundled with television service
select the characteristics of a projector
-usually requires a darkened environment -allows large audiences to view digital output -usually used with a screen
ways to catch a computer virus
-visiting questionable internet sites -downloading files from the internet -borrowing a friends usb storage device to save a file.
select the statements that describe a computer programmers algorithm
-written in a natural language such as english -written in the form of a flowchart so that it will be more easily converted into a programming language
Which of these extensions, if you open it, will probably install software onto your computer?
.exe
file extension used for drawings
.gif
A smartphone emits approximately _____ watts of microwaves
0-1
this is window firewall area
1) clicking start button 2. control panel 3. system and security 4/ window firewall
steps to have firefox block cookies from one website
1) go to website 2) right click 3) in the page info 4)underneath set cookies
What are the advantages of a point and shoot camera over a smartphone camera?
1) larger pixel sensor arrays, providing higher resolution 2) point and shoot cameras, being thicker, often come with optical zoom capability
characteristics of a plotter
1) prints large graphic displays 2) mechanically moves a pen over a large sheet of paper
Select the statements that refer to the term "dot pitch"
1) the distance between two adjoining sub-pixels in a display 2) the closer the spacing (the smaller the dot pitch) the sharper the image
steps of a virus infection in correct order
1) the virus arrives via email attachment, file download, or by visiting an infected site. 2) action such as running/ opening the file triggers the virus. 3) the payload is activated & virus starts its destructive actions.
Which of the following are true regarding high definition displays?
1) typically have aspect ratios of 16:9 2) typically have 1,080 horizontal lines of pixels
According to Mozilla, one of the most effiicient ways to clear cookies in Firefox
1)click the menu button, choose History and then Clear Recent History 2) once you have cleared recent history you should set the time range to clear Everything 3) Click on the arrow next to details to expand list of history items 4) select cookies and make sure that other items you want to keep are selected. close the clear recent history window. 5) click clear.
The text contained in about 4 books uses approximately ___ times more data than a short email.
1,000
1. Ways to avoid a computer virus 2. Ways to catch a computer virus
1. Adjust your web browser's security settings to allow browsing only on trusted sites Surf the web and download content safely Purchase a new router every other year to ensure you have the latest firewall protection 2. Downloading files from the internet Opening suspicious or infected email messages Visiting questionable websites
Rank the following by capacity with the smallest at the top
1. Compact Disc 2. Digital Versatile Disc (single layer) 3. Digital Versatile Disc (double layer) 4. Blu-ray Disc
1. Online nuiscance 2.Virus
1. Frequent pop-ups while searching the web Receiving a lot of spam emails and bounced back email Pop-ups start appearing after visiting unfamiliar sites 2. You cannot boot your computer Your computer is running slower than usual
step adjusting cookie settings
1. choose safari 2.click preference 3. click privacy 4) change cookie
according to Mozilla, one of the most efficient ways to clear cookies in Firefox is
1. click the menu button, choose history, and then clear recent history 2. once you have to cleared recent history you should set the time range to clear everything 3. click on the arrow next to details to expand list of history items 4. select cookies and make sure that other items you want to keep are not selected. close the clear recent history window 5. clear clear now to clear cookies
place the steps of the program development life cycle in the correct order
1. defining the problem 2. creating a plan 3. writing the code 4. debugging the code 5. testing the code
place the steps of the SDLC in order
1. investigation 2. analysis 3.design 4. develop
1. L1 cache 2. L3 cache 3. Disk cache
1. memory located directly on the processor itself 2. memory located adjacent to the processor 3. memory used to increase a hard drive's efficiency
according to Microsoft, what is the correct order of steps to accept all cookies in internet explorer?
1. open internet explorer 2. click the tools icon 3. click internet options 4. click the privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply
most efficient way to block cookies is
1. open the desktop, and then tap or click the internet explorer icon on the task bar 2. tap or click the tools bar, and then tap or click internet options 3. tap or click the privacy tab, and under settings, move the slider to the top to block all cookies, and then tap or click OK
place the steps in order to store a file on google drive
1. open your google drive account (sign in if necc) 2. click on new to open the drop-down menu 3. select file upload 4. browse to the file and click open
put the remaining steps required to set parental controls in Mac OS X in the correct order
1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. in the user is not in the list, click add, then fill in the name, account, and password information to create a new user
put the steps of a virus infection in the correct order
1. the virus arrives via email attachment, file download, or by visiting an infected site 2. an action such as running or opening the file triggers the virus 3. the infection is spread to other devices or a network 4. the payload is activated and the virus starts its destructive actions
put the steps in order to open a microsoft email account:
1. type "onedrive.live.com" into your browser window 2. select personal and sign up for free 3. select create a microsoft account 4. select get a new email address
select the 3 main ways of detecting and recording fingerprints
1. ultra sonic- uses sound waves to detect ridges and whorls 2. optical- take a photo of the fingerprint 3. capacitance- uses electron movement, similar to a touchscreen or touchpad
1.Virus symptoms 2.Ways to catch a computer virs
1.Critical files may get deleted The operating system may not launch properly If a system or networks is infected severely, it may even black out or not even launch 2.Borrowing a friends USB storage device to save a file Downloading files from the internet Visiting questionable internet sites
According to Microsoft, the most efficient way to block cookies is:
1.Desktop 2.Tap or click Tool button 3. Tap or click privacy
1. 5GL 2. 4GL 3. 2GL 4. 1GL 5. 3GL
1.Extremely advanced - uses statements (scripts) rather than algorithms. 2. Specifically designed for creating database management programs. 3. Assembly language - an assembler converts 2GL into machine language. 4.Machine language - represented by a series of 1s and 0s. 5.High-level programming language - uses a compiler to convert into machine language.
According to Microsoft, the most efficient order of steps to customize cookie settings is
1.Open desktop 2.Tap or click 3.BIG PARAGRAPH 4. When you are done
1. Online nuisance 2. Virus
1.Receiving a lot of spam emails and bounced back email Pop - up start appearing after visiting unfamiliar sites Frequent pop ups while searchings the web or working in programs 2.Your computer is running slower than usual You cannot boot your computer
Put the remaining steps required to set parental controls in Mac OS X in the correct order
1.Select system perferences then click parntal controls 2.Click the lock icon to unlock it 3.Select a user, then enable parental controls 4.If the user is not in the list, click Add, then fill in name
1. input 2. storage 3. output
1.entering text in a word doc 2.putting a photo onto a USB drive (thumbdrive) 3.playing a song from spotify
Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.
10
High definition displays typically have ______ horizontal lines of pixels.
1080
Capacity of a typical tablet
16-256 GB
iPad
16-256 GB
"Full HD" resolution is expressed as:
1920 x 1080
full HD resolution is expressed as
1920x1080
Twitter recommends using no more than ___ hashtags per Tweet.
2
Personal computer CPU clock speeds range between _______ .
2 to 4 gigahertz
the item that uses approximately 1 gigabyte of data
20 music CDs
Blu-rays provide approximately ___ of data storage space
25 GB
As of 2017, tweets can be a maximum of ___ characters.
280
as of 2017, tweets can be a maximum of _____________ characters
280
Which area of the control panel screen in windows 7 allows you to adjust parental control
3 user accounts
DVD
3-5 GB
Also known as additive manufacturing (AM), ______ printing sprays successive layers of material to create an object
3D
Also known as additive manufacturing (AM), _________ printing sprays successive layers of material to create an object.
3D
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing
3D
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.
3D
select all the technologies used for facial recognition
3D mapping, feature charting, and skin texture
This is a Mozilla Firefox screen. Where on the screen would you click to delete cookies
4 line one
What is the most complex program language generation? 1G or 5G?
5G
A tablet is generally understood to have a screen size of at least ____ inches
7
CDs provide approximately _____ of data storage space
700 MB
Distributed Denial of Service
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
DoS and DDoS Attacks
A DoS attack stands for Denial of Service. A DoS is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. A DDoS attack stands for Distributed Denial of Service. A DDoS attack launches a virus on a computer. Once the computers are infected they act as zombies and work together to send out legitimate messages creating huge volumes of network traffic resulting in a network crash.
Computer Virus
A computer virus is software that infects computers and is created using computer code. Computer viruses typically must be "run" to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network.
Cookie
A cookie is a small text file of information created by websites you visit that your web browser stores on your hard disk. When you revisit a website that uses cookies your browser will send the cookie to the Web server which uses this information to customize and optimize your experience.
cybercrime
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
Cyberattack
A cyberattack is a deliberate misuse of computers and networks. Cyberattacks use malicious code to modify the normal operations of a computer or network, resulting in disruptions that can compromise data and lead to a variety cybercrimes.
Cyberterrorist
A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Attacks include the disruption of ecommerce and government sites. The power grid and public utilities have also been targeted.
worm
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
Worms
A destructive program that replicates itself throughout a single computer or across a network. Automatically reproduces itself. Designed to attack both wired and wireless networks. Replication exhausts network bandwidth or available storage.
Firewall
A firewall is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. Firewalls allow or block Internet traffic in and out of a network or computer. An ideal firewall configuration consists of both hardware and software. Personal software firewalls are typically included with the operating system and can be configured based on user preference. Hardware based firewalls can be purchased as a stand-alone product but are often also included in broadband routers.
Botnet
A group of compromised computers controlled by a hacker is called a _____.
Hacker
A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. The term hacker and cracker are synonymous.
Hacker
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
1. Open the desktop, and then tap or click the Internet Explorer (Microsoft Edge) icon on the taskbar. 2. Tap or click the Tools button Tools , and then tap or click Internet options. 3. On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4. When you're done making changes, tap or click OK.
According to Microsoft, the most efficient order of steps to customize cookie settings is?
1. Click the menu button, choose History, and then Clear Recent History. 2. Once you have cleared recent history you should set the time range to clear Everything. 3. Click on the arrow next to Details to expand list of history items. 4. Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.
According to Mozilla, one of the most efficient ways to clear cookies in Firefox is?
Identify what is true about script kiddies
Amateur computer hackers with little programming expertise Illegally gain access to computer systems using programs that other have written
Script kiddies
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .
Internet Filters
An Internet filter is firewall software used to block access to specific Internet content. Filters can be used by organizations, parents, and businesses to restrict access to file transfers, web sites, or Internet downloads. The software can reside in a router or user's computer, a stand-alone filter attached to a server or on a network. Internet/web filters are also called parental controls.
FireWire connectors were developed for ______ computers.
Apple
The mouse was developed by which company?
Apple
What company popularized the use of the mouse for PCs?
Apple
On a mac home screen, where do you click to access to adjust parental control settings?
Apple Settings
Select the popular video teleconferencing applications.
Apple Facetime microsoft skype google+ Hangouts
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
Bluetooth
Using extremely low power radio signals, short-distance wireless connections are often made using ________ technology
Bluetooth
Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies
C
What programming languages work best for PC games?
C and C++
_____ was developed by Microsoft and works well with Window-based OS
C#
What is the binary code for the character Z? A)1111 1111 B)1110 1001 C)0101 1010 D)1010 1001
C)0101 1010
______ is an eight-bit character coding scheme commonly used on many personal computers. A)EBCDIC B)Hexadecimal C)ASCII D)Unicode
C)ASCII
Refers to a computers processor
CPU
shortcut for bold
CTRL + B
shortcut for copy
CTRL + C
shortcut for cut
CTRL + X
Shortcut for Undo
CTRL + Z
Three important types of memory in your computer include registers, RAM, and ___
Caches
Fingerprints are most commonly scanned using ____________ technology
Capacitance
Most touchpads use _______ to "sense" when a finger has moved across the pad
Capacitance
____________ fingerprint scanners are the most common biometric identification devices.
Capacitance
This is the System and Security area that is accessed by clicking Control Panel System and Security. When you click Windows Firewall, what are some of the firewall settings you can adjust?
Change notification settings Update your firewall settings Turn windows firewall on or off
Password techniques
Change your passwords frequently. Use generic passwords. Keep your password private. Use a combination of letters, symbols, and numbers. Check your accounts.
1. Choose Safari. 2. Click Preferences. 3. Click Privacy. 4. Change cookie settings.
Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari.
with a capacity of about 600-700 MBs, ___ disks are most commonly used to store music files
Compact
To adjust your Windows computer's display settings, it's often easiest to go to the ___ panel. - Start - Display - Control - Settings
Control
Privacy risks with cookies
Cookies pose many potential privacy risks. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.
Persistent
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
The digital personal assistant that comes with Microsoft's Windows 10 is called ___ . - HAL - Cortana - Siri - Alyx
Cortana
A deliberate misuse of computers and networks, ______ use malicious code to modify the normal operations of a computer or network
Cyberattacks
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
Cyberbullying
Cyberbullying
Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner. Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging with the intention of harming another person. Cyberbullying is also known as cyberstalking.
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _______
Cybercrime
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.
Cybercrime
Cybercrime
Cybercrime is criminal activity committed with a computer.•Cybercrimes include cyberespionage, information theft, data manipulation, cyberbullying, and data corruption. •The Office of Homeland Defense reported that cybercrime has increased by 400% in the last year. Cybercrime is a crime in which a computer is the object of the crime or is used to commit a crime or offense. •There are two common types of cybercrimes, Single event and On-going series of events.
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.
Cyberterrorist
An attack in a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ______ attack
DDoS
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.
DDoS
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
You can change your Firefox setting to allow you to
Delete cookie Approve cookie Deny cookie
In the settings area of each browser you should consider
Deleting cookies Decide from which sites you want to allow cookies Blocking or customizing your cookie settings
In photography, there are two ways to focus on distant objects: optical zoom and _______ zoom.
Digital
A digital presence created online by an individual or organization using a digital device as called a __________
Digital identity
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests called
DoS attack
What is true about RFID?
Does not require line-of sight scanning Can transmit signals more than 90 feet Can be used to identify a variety of objects
Which of the following are ways to safely download antivirus software
Download the software from a known anti virus software vendor Download the software from a trusted site like www.cnet.com
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?
Dynamic
In the United States the federal _____ covers most consumer oriented electronic transactions.
EFT Act
in the united states, the federal ____________ covers most consumer oriented electronic transactions
EFT act
Free openly licensed learning resources that are available online for instructors and students to use are called Open _______ Resources
Education
A mouse that fits the hand comfortably and can reduce the risk of repetitive stress injuries such as carpel tunnel. What is it called?
Ergonomic Mouse
The art and science of creating output that provides information in the most useful manner is called ___ .
Ergonomics
T/F International laws on internet privacy are very similar
F
In a database a ______ is a group of related characters in a database table that represents a characteristic of someone or something
Field
All of the following are considered e-commerce transactions except
G2B
_______ analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
Gait
Samsung smartphone
Galaxy s6
Safe browsing tactics
Go Incognito - The four most popular web browsers have a private browsing option. Be cautious when using social media - Go to Facebook click on settings then download a copy of your Facebook data. Consider using a VPN - Virtual Private Networks (VPNs) are a very useful tool in protecting your online identity. HTTPS - Make sure the sites you are visiting have "https" at the beginning of the URL.
Put the steps to have Firefox block cookies from one website in the correct order
Go to the website you wish to block from setting cookies in Firefox Right-click In the page Underneath
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .
GoPro
A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.
HDMI
The standard port for video and audio input into televisions today is the ______ port.
HDMI
A port that allows the transfer of high quality video and audio signals is called an ________
HDMI port
Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire _______
HDX
The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.
Hacktivism
Hacktivist
Hacktivism is the act of hacking, or breaking into a computer system for a politically or socially motivated purpose. Individuals who take part in hacktivism are called hacktivists. Hacktivism uses the same techniques as a hacker, but does so in order to disrupt services and to bring attention to a political or social cause. Anonymous is one of the hacktivism groups that receives a lot of press.
Hacking computer systems for a politically or socially motivated purposes is called
Hacktivist
cyberbullying
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
To allow hard drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air
Helium
Firewalls Anit virus programs Anit malwarre apps
Help protect against worms and hackers Help protect against viruses Help protect against malware
Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:
Heuristic-based detection Signature-based detection
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the record then make up a table. This organization is referred to as a data ______
Hierarchy
HDMI stands for:
High definition multimedia interface
The abbreviation for megahertz is ___ .
MHz
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
All of the following are common ports that are included with laptop computers except
MIDI Ports
all of the following are common ports that are included with laptop computers except
MIDI ports
A popular lossy video and audio compression format is ___
MP4
two most common audio file formats are WAV and ______________
MP4
The video file compression formats
MP4, AVI, QuickTime
What is the name of a virus written in a macro language and placed within a document or spreadsheet?
Macro virus
the technology that provides a type of firewall protection by hiding internal IP address is called
NAT (network address translation)
A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .
NFC
Apple Pay uses _____ for payment transfer.
NFC
NAT
Network Address Translation (NAT) was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet. NAT provides a type of firewall protection by hiding internal IP addresses. NAT can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS.
This is the privacy tab in internet Explorer. IS the slider in the image set to the right level to allow all cookies?
No, to save all cookies you need to move the slider all the way to the bottom
Relatively expensive technology, but makes extremely thin, curved and flexible displays possible.
OLED
Though currently expensive, curved and paper-thin displays are possible using ___ display technology.
OLED
though currently expensive, curved and paper-thin displays are possible using __________ display technology
OLED
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.
OMR
Select what's true about Trojan malware
Often uses to find passwords, destroy data, or to bypass firewalls Similar to viruses, but do not replicate themselves Often found attached to free downloads and apps
Find the incorrect statement about fee based antivirus and free antivirus software
One of the posties of free anti virus is their spam detection performance
How does antivirus software work?
One popular technique that antivirus software uses to detect viruses is to look for a virus signature, or virus definition. A virus signature is the software code of a particular computer virus. The antivirus program compares its database of known virus signatures with the files on a digital device and on removable media. Antivirus software companies are constantly searching for and updating their database of known signatures. It is important to make sure your antivirus program is on a regular update schedule. Once the virus is identified the antivirus software attempts to remove the virus. If the software cannot remove the virus it will send the file to an isolated area on the hard drive called a quarantine. Quarantined files will remain on your computer until you delete or restore them.
Online nuisances
Online nuisances are annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money. Online nuisances include: ---Spam ---Spyware ---Phishing and Pharming ---Trolling and Spoofing
In photography, there are two ways to zoom-in on distant objects: digital zoom and _________ zoom.
Optical
Most cellphones cameras do not have ______ zoom capability
Optical
Using reflective material to store data that can be read using a laser is called ___ media storage.
Optical
Printer manufactures often advertise how fast their printers are by using the acronym ________.
PPM
Printer manufacturers often advertise how fast their printers are using the acronym:
PPM (pages per minute)
There are a variety of techniques tha tare used to minimize the risk of harmful intrusions into a computer or network including
Packet filters Proxy
Persistent Cookie
Persistent cookies are stored on the hard drive and are not lost when the web browser is closed. Persistent cookies are only lost if they are designed with an expiration date. Persistent cookies collect information about user preferences, username and password information, IP address, and web surfing behavior.
Phishing
Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. In order to appear legitimate the message often contains the company's logo and identifying information. Phishing uses legitimate looking email messages to con a user into giving up private information such as account numbers, social security numbers and personal information. Phishing scams direct users to a fake website where they are asked to enter or update personal information.
Phishing
Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. •In order to appear legitimate the message often contains the company's logo and identifying information. Phishing uses legitimate looking email messages to con a user into giving up private information such as account numbers, social security numbers and personal information. •Phishing scams direct users to a fake website where they are asked to enter or update personal information.
To create an image, the technology used by smartphones is called active ____________.
Pixel Sensor
The 4 major steps in the software development process are:
Planning Programming Debugging Beta Review
This is the options tab in Firefox. where would you click to adjust cookie settings
Privacy
PDLC
Product Development Lifecycle
Which of the following are factors to consider to help protect the hardware of your digital device
Protecting a digital device from overheating magnetic fields humidity
largest memory of a computer, connected to the processor via the front side bus
RAM
the place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___________
RAM
__________ is actually storage since it retains data and information when the power has been turned off
ROM (read only memory)
RFID stands for which of the following.
Radio Frequency Identification
RFID
Radio Frequency Identification Used to track physical items
Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called
Ransomeware
The term that describes how fast each pixel in a display is updated is ___ .
Refresh rate
which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a ______
SSID
which of the following refers to the distribution of computer applications over the internet and is commonly referred to as web apps?
SaaS
Session Cookie
Session cookies are files that are stored in temporary memory. Session cookies are lost when the web browser is closed. Session cookies collect information about the start and end of a browsing session, analyze and measure web traffic on the web pages visited, and determine the web browser being used.
web cookie
Small text file of info. created by website you visit that that your web browser stores on your hard disk
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.
Smartboard
Pictures or videos taken and shared on Snapchat are called _____.
Snaps
spyware
Software that collects information about your Internet surfing habits and behaviors is called _____.
adware
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
Virus Symptoms
Some virus symptoms include: The operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. Critical files may get deleted automatically, and this can happen periodically or all at once. Error messages will become prevalent. It may become difficult to save documents, and the computer may be running slower than usual. If a system or network is infected severely, it may even black out or not even launch the startup process.
Phishing Ransomware Keystroke-logging Tojan
Tricks user into revealing usernames and passwords by appearing legitimate When activated encrypts files on user hard drive and then sells a decryption programs When activated, saves all keystrokes for subsequent transmission to virus creator
Often accompanying download music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a
Trojan
a program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus
Trojan
program that appears legitimate, but executes an unwanted activity when activated is called --horse virus
Trojan
Often accompanying downloaded music or apps, programs that appear to be legitimate, but execute an unwanted activity when activated is called a ______
Trojan horse
A program that appears legitimate, but executes an unwanted activity when activated is called a
Trojan horse virus
How do firewalls work?
Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including packet filters and a proxy server. A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules. Proxy Server - Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network.
this type of connector is the most common for connecting peripherals (printers, monitors, storage devices etc) to a computer
USB
One type of storage device is a ___ .
USB Drive
One type of storage device is a ___
USB drive
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .
UltraHD
URL stands for
Uniform Resource Locator
How does a virus infect a computer?
Viruses can affect a digital device in a number of ways including: ---Opening an infected Email attachment ---Downloading an infected file from the Internet ---Sharing infected files ---Visiting a contaminated Web site
when discussing digital cameras or smartphone cameras with APS CMOS, APS stands for _________________
active pixel sensor
develop a cisco and used by firewall
address
developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, Network _ Translation provides a type of firewall protection by hiding internal IP addresses
address
developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, network ___ translation provides a type of firewall protection by hiding internal IP addresses
address
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
Devices which house every component except the keyboard and mouse inside the same case as the monitor are called _____ computers.
all-in-one
designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer
all-in-one computer
select the popular video teleconferencing applications
apple facetime, microsoft skype, google+hangouts
what is true about worms
automatically reproduces itself
a device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ______________ reader
barcode
In order to download an app from the Microsoft Store will need to ___ . - be logged into a Microsoft account - have a debit card - be logged into a Google account - be over 18 years old
be logged into a Microsoft account
the final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) _______________ test
beta
If it can be answered as either yes or no, or true or false, the question is called ___ .
binary
A hole in a punchcard, a transistor on a circuit board, or the reflective element on a DVD each represent the smallest unit of data storage called a ___
bit
Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.
bit
The smallest unit of data is a ____
bit
The smallest units of storage is called a ___. It is the data held or processed by a single transistor
bit
represented as either a 0 or 1, a ____________ is the smallest unit of data a computer can process
bit
A _ hat hacker breaks into computer system with the intent of causing damage or stealing data
black
Intrusion Detection Systems use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ______, which closes the access point used by the hacker
block
intrusion detection systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___________, which closes the access point used by the hacker
block
A group of compromised computers controlled by a hacker is called a _____.
botnet
An internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a _______ signal
broadband
software applications that allow users to access and surf the world wide web are called _______________
browsers
A USB drive, also called a thumb drive or a flat drive, is a popular external storage choice. USB stands for universal serial ___
bus
One character of information, for example, a letter or a number consists of one ____ of storage
byte
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.
character
Having your files stored on multiple online servers means there is minimal risk of your data being lost. This is a significant advantage of using ___ storage
cloud
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods
cloud
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.
cloud
The amount of data that defines each color in a pixel is called ____ .
color depth
the number of bits of data describing each pixel in a display is referred to as ___________
color depth
Router
connects 2 networks
Switch
connects devices within a network
spyware is
considered an online nuisance
according to US-CERT if you receive a phishing message you should contact them using which of the following methods?
contact them either via email or phone
The part of the processor that tells the computer's memory, arithmetic logic unit and input and output devices how to respond to a program's instructions is called the ______ unit
control
the two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.
control
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.
control panel
Modem
converts analog signals into digital signals and digital signals into analog signals
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
a small text file of information created by websites you visit that your web browser stores on your hard disk is called a _______________
cookie
Small test files created websites you visit that your web browser stores on your hard disk is called
cookies
what was the major question that ARPAnet wanted to solve?
could a network be built that would continue to work even if multiple parts collapsed?
if you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down _________ and drag the file
ctrl
A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called
cyber crime
The malicious use of computer code to modify the normal operations of a computer or network is called a _____
cyberattack
a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a ___
cyberattack
the malicious use of computer code to modify the normal operations of a computer or network is called a _____________
cyberattack
A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a
cyberbully
crime in which a computer is the object of the crime / used to commit a criminal offense
cybercrime
which of the following statements about facebook is true?
cyberstalking and online predators are a real problem on facebook
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a _____
cyberterrorist
aperson who uses computers and the internet to launch attacks against computer systems for political/ ideoological reason
cyberterrorist
Being able to surf the web, watch videos, and listen to streaming audio is why cell service with a _____ plan is extremely popular in the U.S.
data
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
data analyst
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a _____
data analyst
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ________________. most often, this crime is committed by employees inside the company rather than outside hackers
data theft
match the extension with the type of document: .accdb
database
devices with a separate system unity and a relatively large footprint are called ______________ computers
desktop
writing software follows a 5-step process called the PDLC. PDLC stands for the program ________________ life cycle
development
screen size is measured by the ___________ across the monitor
diagnol
screen size is measured by the __________
diagonal distance between the upper right and lower left corners of the screen
How is Screen size messure?
diagonally from a top corner to a bottom corner of a visible display
When you ______ a file Windows should automatically open it. If it can't Windows will prompt you to select to correct app to open the file
double-click
Transferring a file from the Internet to your digital device is called _____.
downloading
it is important to think before click when _ software from the web
downloading
The optical media most often used to store movies are ___ and have a capacity of approximately 4-5 GBS
dvds
solid state drives store data using _________________
electronic circuits
A significant advantage of using a solid state drive instead of a traditional hard drive is that a solid state drive uses ___ so it has much shorter access times
electronics
which transmission has the largest bandwidth?
fiber optic
a URL identifies a particular ____________ address on the world wide web
file
a protocol commonly used to transfer large files from one server to another on the internet is the __________
file transfer protocol
software that limits the material that a browser fetches or that a search engine displays are called ______
filters
A security system separating 2 networks or even computers on the same network is called a _____
firewall
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
The red arrow in the image is pointing at what component of a network designed to prevent unauthorized internet intrusions
firewall
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.
flowchart
a graphic representation of a process is called a __________
flowchart
all of the following are considered e-commerce transactions except
g2b
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery
gait analysis
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
gait analysis
Storage capacity for laptop hard drives is typically described in terabytes or ___ .
gigabytes
Storage capacity for laptops hard drives is typically described in terabytes or ____
gigabytes
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called
hacktivism
MEMS chips are used in which of the following?
hearing aids, smartphones
In the body of a professionally formatted business email, where should a request be placed?
in the first sentence of the body of your email
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ______
information systems technician
These facilitate getting data and information into your computer.
input devices
these facilitate getting data and information into your computer
input devices
Adam was in fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ________
integrity
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
memory located directly on the processor itself
l1 cache
designed for those who need a mobile computer but need to enter a large amount of data
laptop computer
because of their compact size, touchpads are most often used with _____________ computers
laptops
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
large
select the android operating systems
lollipop, marshmallow
Because a metal platter is physically spinning, hard drives have ______ access time than solid state hard drives
longer
because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives
longer
file compression: reduces space required by removing less valuable data
lossy
most desktop computers use ___ to store data
magnetic hard drive
One of the largest data requirements of the future will likely be _____
mapping patients' genomes
A million bytes of data equals approximately one ______
megabyte
One million bytes equal a ___ of data. This is enough to store the text in approximately four books
megabyte
a million bytes of data equals approximately one ________________
megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___
memristor
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
memristor
an electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ________________
memristor
Examples of input devices
mouse, keyboard and camera
Examples of input devices include what?
mouse, keyboard, and camera
select the features common in DSLR cameras
often allow for interchangeable lenses, usually have a mirror that allows the photographer to look directly through the lens
To type on a touchscreen device with Windows 10, enable the ______. - dragon type - mouse - on-screen keyboard - touchscreen
on-screen keyboard
Paul Baran developed a technology called _____ switching that made the Internet possible and reliable
packet
Specialized hardware/ software that capture packets transmitted over a network are called
packet sniffers
BitTorrent utilizes no central server, instead opting to utilize a _____________ structure where each device connected to a network has equal access to shared files
peer-to-peer
a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called _______________
pharming
Adding an app's icon to the taskbar in Windows 10 makes the application easily accessible. This is called ___ the app to the taskbar. - tagging - attaching - buttoning - pinning
pinning
Adding an application's tile to the Start menu in Windows 10 is called ___ the app. - highlighting - starting - pinning - Activating
pinning
Blu-ray stores data using
pits and lands that are read by a blue spectrum laser beam
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ______.
plotter
below is an image of the internet options tab in internet explorer. which tab should you click to block cookies in internet explorer?
privacy
this is the options tab in Mozilla Firefox. where would you click to adjust cookie settings
privacy
input
recording a song using MIDI
Click on icons represent popular password management apps
red * norton
which colors make up a typical monitor's pixels?
red green blue
when referring to digital storage, RAID stands for _____________
redundant array of independant disks
when referring to digital storage, RAID stands for
redundant array of independent dics
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
The term that describes how fast each pixel in a display is updated is ___ .
refresh rate
the term that describes how fast each pixel in a display is updated is ____________
refresh rate
extremely small amount of memory (measured in bits) located throughout the processor
register
The type of database that uses common fields to create links between tables is called a ______ database
relational
with optical zoom, resolution ______________ when focusing on distant objects
remains the same
To display or distribute information from a database, programmers or database administrators create
reports
To personalize your desktop in Windows 10, just put your cursor on any open area of the desktop, ___ and select "Personalize". - right-click - double-click - swipe - scroll left
right-click
Want to get rid of one of the app's on your Windows 10 taskbar? It's easy! First ___ the app's icon, then click "Unpin this app". - right-click - click on - double-click - scroll
right-click
Which of the following will open the account management area of Windows 10? - hold down Ctrl+Alt+Delete then click the Start button - right-click File Explorer and select account - right-click on the Start button - double-click the Start button
right-click the Start button
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ______
roaming
if youre in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called _________________
roaming
First-party cookie
small text file of info. created by a website you visit that keep track of your personal preferences and the current web browsing session
Third-party cookie
small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
first party cookie
small text file of information created by a website you visit that keep track of your personal preferences and the current web browsing session
Because it has no physically moving parts, an SSD is extremely durable and energy efficient. SSD stands for ____ state drive
solid
select the factors that should be considered when purchasing external speakers for a digital device
sound quality, portability, price
an unsolicited email message is called _____________
spam
T/F A transceiver can both send and receive information
t
A collection of related records in a database is referred to as a
table
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ______.
tablet
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
A thousand gigabytes equals one ___ .
terabyte
A thousand gigabytes equals one _____
terabyte
One thousand gigabytes equals one _____. That's enough capacity to store 40 blu-ray movies!
terabyte
Which of the following represent the highest amount of storage?
terabyte
which of the following represent the highest amount of storage?
terabyte
sharing an internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the internet, is referred to as _______
tethering
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
the World Wide Web
HTML and it's 5th revision (html5) allow content to be displayed on _____________
the world wide web
The most common printers for printing receipts are ___ printers.
thermal
The most common printers for printing receipts are ______ printers.
thermal
the most common printers for printing receipts are _______________ printers
thermal
because they're inexpensive and reliable ___________ have become extremely popular storage devices
thumbdrives (USB or flash drive)
the world wide web was created through a collaboration led by _________
tim berners-lee
To create an image with a laser printer ___ is drawn to the drum.
toner
To create an image with a laser printer ___ is(are) drawn to the drum.
toner
The highest level in the domain name hierarchy is known as the ____
top level domain
match the business information system (IS) activity with the appropriate manage level: use IS to monitor overall business performance
top level management (business executives and presidents)
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers
select the parts of an RFID system
transceiver, transponder, antenna
phishing
tricks users into revealing usernames and passwords by appearing legitimate
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.
trojan horse
often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____________
trojan horse
As technology advances there are fewer keyboard options available for computer users.
true
similar to a tablet but comes with a detachable keyboard/touchpad unit
two-in-one computer
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.
uninstall
A USB drive uses special transistors that can store data when not powered. USB stands for ___ serial bus
universal
WhatsApp users can create groups, and send _____ images, video and audio messages for free.
unlimited
Removing an application's tile from the Start menu in Windows 10 is called ___ the app. - unpinning - executing - hiding - deemphasizing
unpinning
File server
used for data storage
to change the size of your folder's icon, just right-click on a blank area of the contents pane and click _____________
view
Software that infects a computer and is created using computer code is called a computer _____.
virus
ransomeware
when activated, encrypts files on user hard drive and then sells a decryption program
keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to bvirus creator.
keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
the more data being transmitted, the shorter the cord should be
which is true regarding the length of a USB cord
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ______
white hat hackers
non-malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called _____________
white hat hackers
a form of email fraud where criminals change the account where money is being transferred is called a ______________ scam
wire-wire
There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except
your anti-virus software will ensure your files are safe.
file compression: a lossless compression format
zip
Select what's true requarding all-in-one computers.
-All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. -All-in-one computers are designed to be highly mobile so that they can be used by people on the go.
Cybercrime
Cybercrime is criminal activity committed with a computer. Cybercrimes include cyberespionage, information theft, data manipulation, cyberbullying, and data corruption. The Office of Homeland Defense reported that cybercrime has increased by 400% in the last year. Cybercrime is a crime in which a computer is the object of the crime or is used to commit a crime or offense. There are two common types of cybercrimes, Single event and On-going series of events. Single event - Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud. On-going series of events - More serious than single event cybercrimes. On-going series of events include cyberstalking, child predation, extortion, blackmail, and terrorist activities.