comp app exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

It is common to use _____ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email addresses. Select your answer, then click Done. Font Size

bcc

Hackers who commit cybercrimes are known as ______ hackers. Select your answer, then click Done. Font Size

black hat

The speed at which data travels to and from the ISP is measured in ______. Select your answer, then click Done. Font Size

bps

___ is when a hacker targets the database of large online business to steal user account data and credit card information. Font Size

data theft

In order to keep a database free of errors, online forms usually have built-in ______ so that users don't enter erroneous or duplicate data. Select your answer, then click Done.

data validation

______ is a popular type of network attack that allows hackers to shut down or block access to websites by overwhelming them with millions of requests. Select your answer, then click Done. Font Size

ddos

When setting up a network, select three factors when deciding which topology or combination of topologies to use. Select the three correct answers, then click Done. Font Size

distance, cost, speed

______ is a feature that attempts to stop websites from automatically sharing details about your visit with other companies. Select your answer, then click Done.

do not track

A(n) ______is like an intranet except it shares its resources with users from a distant location. Select your answer, then click Done. Font Size

extranet

Copyright law contains an exception known as ______, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission. Select the your answer, then click Done. Font Size

fair use

Mission-critical hardware and software systems use ______ computers so they continue their operations even when problems are present. Select your answer, then click Done.

fault tolerant

_____ is extremely fast, carries enormous amounts of data, and is very secure. Select your answer, then click Done. Font Size

fiber optic

Select the option that examines and blocks Internet traffic in order to protect your private network. Font Size

firewall

Instead of creating a website on WordPress, Jack used Tumbler, a ______ service which is essentially a short-form blog where he shares his brief thoughts about surfing and skateboarding. Select your answer, then click Done. Font Size

microblogging

Many organizations will purchase just one or two printers because they know that any user on the _______ will be able to print to them. Select your answer, then click Done. Font Size

network

BitTorrent uses a ______ design that makes large numbers of user connections and requests small pieces of the desired file from each of them. Select your answer, then click Done. Font Size

p2p

A gateway can take a ______ from one type of network, read its header, and then add a second header that is understood by the second network. Select your answer, then click Done. Font Size

packet

Google's AdWords is an example of the ______ advertising model. Select your answer, then click Done. Font Size

pay per click

___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker. Font Size

phishing

Professor Smith wants to create a strong password for his bank account. Click on a password that is secure. Font Size

pigbank

A browser ______ is a separate program that allows your web browser to play several types of multimedia content. Select your answer, then click Done. Font Size

plug in

A ______ is typically a prerecorded talk show that can be downloaded from a variety of sources such as Apple's iTunes. Select your answer, then click Done. Font Size

podcast

A______ prevents attenuation when packets are traveling long distances. Select your answer, then click Done. Font Size

repeater

By storing routing information for networks, a ______ reads each packet's header and determines where the packet should go and the best way to get there. Select your answer, then click Done. Font Size

router

Also known as "junk" mail, ______ is unsolicited email that is sent to a bulk folder. Select your answer, then click Done. Font Size

spam

Most network installations use an Ethernet ______ with twisted-pair cables that plug into the RJ45 port located on many devices. Select your answer, then click Done. Font Size

star topology

Malware attempts to ______. Select the four correct answers, then click Done. Font Size

steal info, harm flow of a data, take control, destroy data

The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET? Select your answer, then click Done. Font Size

tcp/ip

Withdrawing money from an ATM is a good example of how a ______ works. Select your answer, then click Done.

transaction processing

Web-based documents are normally referred to as ______. Select your answer, then click Done.

web pages

A(n) ______ is an automated system that typically asks a series of questions and then takes specific actions based on the responses to those questions. Select your answer, then click Done.

expert

There are legal consequences for unethical computer behavior such as ______. Select all the answers that apply, then click Done. Font Size

hacking and sharing copyrighted files

Many activities that are unethical are also illegal. Select two technology crimes that are illegal, then click Done. Font Size

hacking and sharing files

The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done. Font Size

header

You can see the name and URL of every site you have visited by looking at your browser's ______. Select your answer, then click Done. Font Size

history

Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done. Font Size

http

______ is the ability of an organization's information system to work with other systems within the organization. Select your answer, then click Done.

interoperability

A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. Select the two correct answers, then click Done.

raid 1 and mirrored

A ______ helps you identify and examine possible threats that may harm your computer system. Select your answer, then click Done. Font Size

risk assessment

A ______ is a program that disguises itself as an interesting, useful or desirable program in order to gain access to your system. Select your answer, then click Done.

trojan

Like all files on a computer, the file name or web page is located within a folder or directory. Click on the folder/subfolder structure, then click Done. Font Size

us politics

Similar to instant messaging, ______ occurs in real time, much like a face-to-face conversation. Font Size

video calling

Unlike email, ______ is having a live, online, text-based conversation with one or more individuals. Select your answer, then click Done.

video conferencing

Connor is surfing the internet at work. He does not know the rules regarding employer and employee web activity. Which option is true? Select your answer, then click Done. Font Size

watch without his knowledge

A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, then click Done. Font Size

wireless LAN and wifi

___ requires a password when connecting to your router and makes your wireless transmissions unreadable by hackers. Font Size

wpa2

Employees typically access their company's server via a______. Select your answer, then click Done. Font Size

local

Students who want to take a free online course at a prestigious university and do not require course credit can enroll in a ______. Select your answer, then click Done. Font Size

MOOC

Select the item that acts as a surge protector and a rechargeable battery, giving you enough time to save your work before shutting down your computer. When you are finished, click Done. Font Size

UPS

Select four types of broadband connections, then click Done. Font Size

all but dial up

In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States. Select your answer, then click Done. Font Size

arpanet

Ebay is an example of a(n) ______ site that allows buyers to bid and compete for a variety of new and used goods. Select all that apply, then click Done. Font Size

auction and C2C

Sam is creating a website featuring images of NASA astronauts in training. How can he find copyright-free images that he can legally use on his website? Select all that apply, then click Done. Font Size

author's permission, public domain, government

As NSFNET traffic grew in the 1980s, the NSF brought in private companies such as IBM to upgrade existing networks and create new ______, the connections that carry most of the Internet's traffic. Select your answer, then click Done. Font Size

backbones

everything posted on social media should be considered private

false


संबंधित स्टडी सेट्स

Mental Health: Chapter 23 - Disruptive Behavior Disorders!

View Set

Network+ Guide to Networks Seventh Edition Chapter 10

View Set

Lecture 5: More 2x2 Factorial Design

View Set

CA51021 Module 3: The Federal Reserve System, Monetary Policy, and Interest Rates

View Set

Marketing Chapter 11 (Pricing Strategies)

View Set

Ms. McDaniel's 4th period English study guide

View Set

Unit 2: Types and Characteristics of Fixed-Income (debt) Securities

View Set