CIS 101 Final Exam CCC

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

SPAM

also known as junk email

Solid state

drives that are rapidly increasing in popularity, and in time they might become a viable replacement for the ubiquitous mechanical hard drive.

HTTP (HyperText Transfer Protocol)

electronic communication defining an exact way that data is formatted and transferred back and forth between web browser and server.

2 gigabytes of RAM

is the lowest amount a casual user should have

WPA2

protocol used in routers nowadays in order to maximize security:

cells

sections in batteries that hold the power to be distributed

surge-protecting power strips

to protect equipment from power problems

netbook

traditional structure of notebook computer that doesn't need the full power or size of notebook.

nodes

A computer network's ___ are processing locations such as a PC or a networked printer.

UPS

A good ___ unit can help mitigate the trouble caused by a power outage in a telecommuter's office.

bus

A network with a(n) ___ topology arranges the network nodes in a series, linking one node to the next via a single cable.

ARPANET

A predecessor of the modern Internet was ___, which was a network connecting computers at different universities and defense contractors.

chatterbot

A program known as a(n) ___ simulates conversation with human participants.

router

A(n) ___ creates and manages connections with local wireless users, and communicates data between the users and the Internet.

UPS

A(n) ___ functions as a battery backup and power conditioner for your computer.

transaction

A(n) ___ is a complete information operation. They can be one-step events like adding a new piece of information to a database, or they can be more complex and require many steps.

zombie

A(n) ___ is a compromised computer that is under external control, in many cases without the computer owner's knowledge.

LAN

A(n) ___ is a data communication system consisting of multiple devices such as computers and printers. This type of network contains computers that are relatively near each other.

bridge

A(n) ___ is a device that connects two LANs or two segments of the same LAN.

gateway

A(n) ___ is a node on a network that serves as an entrance to another network.

worm

A(n) ___ is a program that self-replicates, but it is a fully contained program and is not attached to a host file or service.

packet

A(n) ___ is a transmitted network package.

vulnerability

A(n) ___ is a weakness-anything that has not been protected and is open to harm.

surge suppressor

A(n) ___ is an inexpensive product that guards its appliances against large power spikes or surges that may infrequently occur, but does not provide protection against reduced or total loss of power.

virus

A(n) ___ is software that is attached to a host, such as a file or e-mail message, and has the ability to copy itself from one computer to another.

hacker

A(n) ___ is someone who uses a computer and network or Internet connection to intrude into another computer or system to perform an illegal act.

repeater

A(n) ___ is used to prevent attenuation when packets are traveling long distances.

enterprise

A(n) ___ license grants installation and use privileges on any computer within the company.

hub

A(n) ___ provides multiple ports for connecting nodes. When it receives a packet from one port, it transmits the packet without modification to all the other nodes.

personal

A(n) ___ software license is one that grants a single person the ability to use the program, and it may impose terms and conditions that limit the program's use.

Google

Although there are several different major search engines, ___ has firmly established itself as a leader.

hyperlink

As you read a Web page on the browser screen, you can click a word or picture encoded as a(n) ___ and immediately jump to another location within the same document or to a different Web page.

PDAs

Before the iPhone, many people carried ___, which managed appointments, ran spreadsheet programs, and allowed people to take notes with a stylus.

ring tones

Cell and smart phones have a number of conditions where they are directed to play a sound, and those sounds, called ___, can be chosen by the user.

SIM

Cell phones contain ___ cards that identify the user and subscription owner of the phone.

encryption

Data ___ is an ideal solution for keeping your information safe from all eyes but your own because it changes the data to make it completely undecipherable to anyone who does not have the exact key required to restore the data.

backup

Data ___ services focus simply on saving copies of files and allowing users to retrieve the data if needed.

like

Facebook users can click a(n) ___ button, which is a Facebook-generated link that tags an item with a user's approval.

response rate

Gamers should probably focus on the ___ more than other factors.

spreadsheet

If grade processing is not handled at a central site, then the professor may use a local solution such as Microsoft Excel or another ___ program in order to track student performance over time.

identity theft

If someone impersonates you by using your name, Social Security number, or other personal information to obtain documents or credit in your name, you are a victim of:

star

In a network with a(n) ___ topology, all nodes are connected to a hub and communicate through it.

surgical

In healthcare, computers are present to assist with ___ procedures. They can monitor a patient's vital signs during a procedure, and they can also control robotic assistants.

FTP

Internet users can copy files from one computer to another by using this Internet service

open

Mobile devices and networks alike have made it convenient to quickly connect, but you should be very cautious about joining __ wireless networks

warranty

More expensive ___ programs sometimes provide for the on-site repair of your system and may not require that you first diagnose the problem via extended telephone sessions.

smart phones

Much of the software related to mobile computing is for ___ and PDAs.

banner

One of the common methods of advertising on Web pages is the use of ___ ads, thin rectangular advertising boxes commonly placed across the top of a Web page.

terabyte

One to three ___ hard drives should be sufficient for the needs of most users.

accounting

Payroll and sales data can feed into an integrated ___ program, allowing the store owner to focus on sales trends, accounts payable, and receivable, and ways to improve operating efficiency.

fluctuations

Power ___ may cause the strength of your electrical service to rise or fall.

backbones

Private telecommunications companies built their own central network structures, called ___, in order to distribute business and commercial information.

hotspots

Public Internet access points are often called wireless ___.

virtual

Some tablets provide a(n) ___ keyboard as part of their operating environment, displaying a picture of keys on the touch screen.

header

The ___ is the first part of a packet and contains information needed by the network (such as the node address).

Twitter

The ___ service allows people to transmit micro-status messages up to 140 characters in length.

ring

The ___ topology connects the network's nodes in a circular chain, with each node connected to the next.

handheld

The category of ___ computers includes both PDAs and smart phones.

Microsoft

The desktop and notebook PC market is dominated by the ___ Operating System

GHz

The electric frequency of the processor, measured in ___, is also a measure of its relative speed.

laptop

The goal of ___ computing is to provide users with all the programs and functions of a desktop environment in a package they can comfortably carry and open to use at a moment's notice almost anywhere.

e-mail

The only Internet service used more frequently than the Web is ___, which is a system for exchanging messages through a computer network.

service

The term Internet ___ provider refers to companies that are in business specifically to provide the infrastructure necessary to connect to the Internet.

broadband

The term ___ is used to describe any data connection that can transmit data faster than is possible through a standard dial-up connection using a modem.

AMD

There are two major processor manufacturers, ___ and Intel.

poach

To ___ a wireless signal means to access a Wi-Fi device whose owner accidentally left it without password protection.

hot

To ___ swap a battery means to remove and replace it while the computer is running and active.

ISP

To connect to the Internet, most individual users set up an account with a(n) ___, a company that provides local or regional access to the Internet backbone.

hypertext

What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text that is able to respond to user input and link to other objects.

cookies

When you visit e-commerce sites, many of them store snippets of information in small files on your system known as:

Podcasts

___ are radio broadcasts suitable for downloading to a portable music player.

Tags

___ are simple labels that help identify the subject of a bookmark. You can search for them in your own list or throughout the entire Delicious service to find bookmarks that are related to that topic.

Fiber-optic

___ cable is a thin strand of glass that transmits pulsating beams of light rather than electric current.

Twisted-pair

___ cable normally consists of four pairs of wires. The individual pairs have two wires that are separately insulated in plastic.

?

___ computing can reduce the amount of hardware required because users share central hardware resources.

Cloud

___ computing is the concept of using computers owned by service providers on the Internet to for storage and program execution services.

YouTube

___ encourages users to upload videos of everything from a funny accident caught on cell phone to serious, professionally-produced presentations.

HTML

___ files contain the information to display web pages, using markup tags that identify headers, paragraphs, images, and links.

Hands-free

___ hardware allows the cell phone user to place calls without typing numbers and holding the handset.

Skype

___ is a VoIP company that offers the ability to lease a telephone number in countries around the world.

Data mining

___ is a business-intelligence-gathering process that every large organization, from banks to grocery stores, employs to sift through computerized data.

Bandwidth

___ is the amount of data over time that the media can carry, typically measured in either megabits per second (Mbps) or gigabits per second (Gbps).

Attenuation

___ is the loss of intensity and clarity of the data signal being transmitted.

Keylogging

___ programs, which save a user's keystrokes, can be used not just by hackers, but also by companies and individuals that want to monitor the detailed activity of people using computers that they own.

LCD

___ projectors and portable computers are common tools for displaying slides to assist in information delivery.

Cloud

___ service companies provide alternatives that do not require up-front hardware purchases, because users transfer data to the service company's servers for storage instead of their own central storage hardware.

Presentation

___ software is employed to create the various slides and multimedia content that are used in lectures.

Open-source

___ software is intended by its creators to be distributed freely to anyone who wants to install, use, study, and modify it.

Word processing

___ software is used to create lesson plans, course outlines, and sets of notes or other student materials that can be either printed and distributed in class, or posted online for students to retrieve on their own time.

VoIP

___ translates analog voice signals into digital data and uses the Internet to transport the data.


संबंधित स्टडी सेट्स

Negotiation/Conflict Resolution Fall 2020

View Set

stupid art history/ Indigenous America and Ancient Greek

View Set

macro: fiscal and monetary policy actions in the short run

View Set

acct chapter 11 Reporting and analyzing Stockholders Equity

View Set