CIS105 FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?

Intranet

Which of the following would not impact the digital divide? A. A decline in the price of internet access. B. Expansion of free wifi connectivity in major cities. C. Legislation allowing communications companies to charge per website for access. D. Less sharing of the work we produce.

Less sharing of the work we produce

The most common computer port is the ______ port.

USB

The process whereby users prove they have authorization to use a computer network is known as

authentication

Ergonomics is an important consideration

for all computing devices.

All of the following are current focuses of AI research EXCEPT... A. Natural language processing B. Cognitive surplus C. Knowledge representation D. Perception

Cognitive surplus

Which of the following actions would NOT help to identify your personal ethics? A. Describe yourself. B. Conduct a genealogic study of your extended family. C. Prepare a list of values that are most important to you. D. Identify the influences of your work environment.

Conduct a genealogic study of your extended family

Data and information are interchangeable terms.

FALSE

RAM is non-volatile storage.

FALSE

An authentication server is used to host websites on a client/server network.

False

Artificial intelligence systems think exactly like human beings do. A. True B. False

False

Catfishing is posting inflammatory remarks online to generate negative responses. (T or F)

False

Podcasts can only be created by professional organizations (T or F)

False

Routers are used to send data on a specific route through an internal network.

False

The move toward access instead of ownership is a sign of cognitive surplus. A. True B. False

False

Web-based databases cannot be used to help investigators solve criminal cases. A. True B. False

False

Which of the following is not one of the factors used in multi-factor authentication?

Identity

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? a. B2B b. mobile commerce c. social commerce d. C2C

mobile commerce

The most common output device for hard output is a

printer

What web browser feature would be particularly useful when using public computers? a. pinned tabs b. privacy browsing c. session restore d. all of the above

privacy browsing

Which of the following functions of a computer is mostly responsible for turning data into information?

processing

if you use an internet cache, then the information displayed in your browser is automatically refreshed

false

instant messaging is secure because of the type of encryption used

false

the term dotted quad means you have four dots in a row in your Java source code

false

Sometimes groups of data packets are sent together in a package called a

frame

HTTPS is different than HTTP because a. of how it transforms or reformats the data b. it is a combination of HTTP and the secure sockets layer c. it extracts data from source databases d. it stores data in the data warehouse

it is. a combination of HTTP and the Secure Sockets Layer (SSL)

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability

Which of the following is not a component of a search engine? a. indexer program b. spider c. search assistant d. search engine software

search assistant

SMTP is the set of rules used to a. send e-mail along the internet to its destination b. shrink the amount of space it takes to store e-mail c. encrypt e-mail messages d. make shopping on the internet more available

send e-mail along the Internet to its destination

The information in a data packet includes a. that data and the destination b. the data and circuit identifier c. just the data d. different types of information depending on the type of message being sent

the data and the destination

A private key is important a. to reboot the system hardware b. to reset your public key if you lose a password c. to decode an encrypted message d. because it enables you to use MIME

to decode an encrypted message

MIME is the protocol that supports sending files as e-mail attachments

true

Your internet service provider has a default DNS server to translate a URL into an IP address

true

Which component of a computing device drains the battery the fastest?

display screen

Bike sharing programs like Citi Bike are an example of...

A subscription-style business model made possible by technology

Which server would a client/server network include to ensure only authorized users are logging onto the network?

Authentication

Which is not a key component of a typical client/server network?

Bastion host

Ensuring that website content is not slanted in its point of view is checking for: a. Authority b. Audience c. Bias d. Relevance

Bias

A touch pad is a pointing device usually found in tablets.

FALSE

The crisis-mapping tool Ushahidi...

Shows that a free software product can have great value

SSD drives are superior to conventional disk drives because they have no moving parts.

TRUE

You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? a. "Captain America: Civil War" b. *Civil War c. Captain America Civil War d. Captain America *

"Captain America: Civil War"

In the URL https://www.whitehouse.gov/blog, which part is considered the top-level domain name? a. http b. gov c. /blog d. www.whitehouse.gov

.gov

A(n) ______ is a laptop computer that can convert into a tablet-like device.

2-in-1 PC

Being computer literate includes being able to...

Avoid spam, adware, and spyware; use the web effectively; diagnose and fix hardware and software problems

The set of instructions that define how to display the HTML elements in your site is a. CSS b. XML c. AJAX d. PHP

CSS

Sophisticated modeling software is helping international researchers...

Increase the pace of research in finding and producing vaccines

______ printers work by spraying tiny drops of ink onto paper.

Inkjet

The collection of large national and international networks used to establish the Internet is called the a. T1 b. highway system c. oc d. internet backbone

Internet backbone

Intellectual property...

Is the result of someone's creative work and design; can be protected legally by the patent system; can include works of music, film, or engineering design

Which of the following describes an IP address? a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet. c. It identifies a website. d. all of the above

It is referred to as a dotted quad. It identifies any computer connecting to the Internet. It identifies a website (all of the above)

Crowdfunding sites include...

Kickstarter and GoFundMe

Which topology tends to provide the fairest allocation of network resources?

Ring

Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights? a. Custom Search b. Search Tools c. History d. Favorites

Search Tools

Which of the following is an advantage of installing a client/server network in a business?

Sharing of peripherals

The "brain" of the computer is the CPU.

TRUE

Which statement is not true about the web? a. The web is based on the WWW protocol. b. The web was based on a protocol developed by Tim Berners-Lee. c. Special links are used to navigate from page to page on the web. d. The web is a subset of the Internet.

The web is based on the WWW protocol.

Google Docs is an example of a wiki (T or F)

True

Hactivism is different from cyberterrorism. A. True B. False

True

Intellectual property can be legally protected even though it is not a physical object. A. True B. False

True

Most modern operating systems include some type of NOS functionality.

True

Network adapters perform specific tasks to enable nodes to communicate on a network.

True

Star topologies are the most widely used topology.

True

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. (T or F)

True

Your location can be captured from your mobile device even if app location tracking is turned off. (T or F)

True

Which network cable type is most susceptible to signal interference?

UTP

Which of the following statements is FALSE? A. Individuals who have no sense of right or wrong exhibit amoral behavior. B. Life experience affects an individual's personal ethics. C. Unethical behavior is always illegal. D. Ethical decisions are usually influenced by personal ethics.

Unethical behavior is always illegal

Touch-screen devices usually feature ______ keyboards.

Virtual

An applet is a. a small application located on a server computer b. a program distributed by Apple Inc c. a hardware device that encrypts e-mail messages d. a program language used to help create dynamic web pages

a small application located on a server computer

Which of the following is a sensor found in certain smartphones?

accelerometer

IPv6 uses 128 bits to assign a: a. data packet to each transmission b. memory address to the CPU c. address to every device connect to the internet d. destination internet address to each e-mail

address to every device connected to the Internet

In a computer, each _____ can represent either a 0 or a 1.

bit

Encryption is used to a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the internet more available

code your e-mail so only one person can decipher it

Which of the following is a good precaution to take when making online purchases? a. use the same strong password for all online accounts b. pay by debit card c. use a private browser when purchasing items from a public computer d. make sure http: and an open padlock displays in the address bar

use a private browser when purchasing items from a public computer

The internet is primarily funded by a. voluntary contributions b. Google c. your state income taxes d. your federal income taxes

your federal income taxes


संबंधित स्टडी सेट्स

oop with inheritance, polymorphisms ,encapsulation, and abstraction

View Set

Neuro - Test Banks - Brunner & Suddarth's Textbook of Medical-Surgical Nursing 14e Chapter 65 - 70

View Set

Cells, mitosis, review of POB lecture quiz

View Set

Sigmon- Earth & Enviromental Science Final Exam Review

View Set

left + right sided heart failure

View Set

PreAlgebra: sections 5-5 to 5-9 Vocab

View Set

Social psychology - Prosocial behavior and altruism Ch 11

View Set