comp app exam 2
It is common to use _____ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email addresses. Select your answer, then click Done. Font Size
bcc
Hackers who commit cybercrimes are known as ______ hackers. Select your answer, then click Done. Font Size
black hat
The speed at which data travels to and from the ISP is measured in ______. Select your answer, then click Done. Font Size
bps
___ is when a hacker targets the database of large online business to steal user account data and credit card information. Font Size
data theft
In order to keep a database free of errors, online forms usually have built-in ______ so that users don't enter erroneous or duplicate data. Select your answer, then click Done.
data validation
______ is a popular type of network attack that allows hackers to shut down or block access to websites by overwhelming them with millions of requests. Select your answer, then click Done. Font Size
ddos
When setting up a network, select three factors when deciding which topology or combination of topologies to use. Select the three correct answers, then click Done. Font Size
distance, cost, speed
______ is a feature that attempts to stop websites from automatically sharing details about your visit with other companies. Select your answer, then click Done.
do not track
A(n) ______is like an intranet except it shares its resources with users from a distant location. Select your answer, then click Done. Font Size
extranet
Copyright law contains an exception known as ______, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission. Select the your answer, then click Done. Font Size
fair use
Mission-critical hardware and software systems use ______ computers so they continue their operations even when problems are present. Select your answer, then click Done.
fault tolerant
_____ is extremely fast, carries enormous amounts of data, and is very secure. Select your answer, then click Done. Font Size
fiber optic
Select the option that examines and blocks Internet traffic in order to protect your private network. Font Size
firewall
Instead of creating a website on WordPress, Jack used Tumbler, a ______ service which is essentially a short-form blog where he shares his brief thoughts about surfing and skateboarding. Select your answer, then click Done. Font Size
microblogging
Many organizations will purchase just one or two printers because they know that any user on the _______ will be able to print to them. Select your answer, then click Done. Font Size
network
BitTorrent uses a ______ design that makes large numbers of user connections and requests small pieces of the desired file from each of them. Select your answer, then click Done. Font Size
p2p
A gateway can take a ______ from one type of network, read its header, and then add a second header that is understood by the second network. Select your answer, then click Done. Font Size
packet
Google's AdWords is an example of the ______ advertising model. Select your answer, then click Done. Font Size
pay per click
___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker. Font Size
phishing
Professor Smith wants to create a strong password for his bank account. Click on a password that is secure. Font Size
pigbank
A browser ______ is a separate program that allows your web browser to play several types of multimedia content. Select your answer, then click Done. Font Size
plug in
A ______ is typically a prerecorded talk show that can be downloaded from a variety of sources such as Apple's iTunes. Select your answer, then click Done. Font Size
podcast
A______ prevents attenuation when packets are traveling long distances. Select your answer, then click Done. Font Size
repeater
By storing routing information for networks, a ______ reads each packet's header and determines where the packet should go and the best way to get there. Select your answer, then click Done. Font Size
router
Also known as "junk" mail, ______ is unsolicited email that is sent to a bulk folder. Select your answer, then click Done. Font Size
spam
Most network installations use an Ethernet ______ with twisted-pair cables that plug into the RJ45 port located on many devices. Select your answer, then click Done. Font Size
star topology
Malware attempts to ______. Select the four correct answers, then click Done. Font Size
steal info, harm flow of a data, take control, destroy data
The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET? Select your answer, then click Done. Font Size
tcp/ip
Withdrawing money from an ATM is a good example of how a ______ works. Select your answer, then click Done.
transaction processing
Web-based documents are normally referred to as ______. Select your answer, then click Done.
web pages
A(n) ______ is an automated system that typically asks a series of questions and then takes specific actions based on the responses to those questions. Select your answer, then click Done.
expert
There are legal consequences for unethical computer behavior such as ______. Select all the answers that apply, then click Done. Font Size
hacking and sharing copyrighted files
Many activities that are unethical are also illegal. Select two technology crimes that are illegal, then click Done. Font Size
hacking and sharing files
The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done. Font Size
header
You can see the name and URL of every site you have visited by looking at your browser's ______. Select your answer, then click Done. Font Size
history
Web servers deliver web pages to your computer using a protocol known as ______. Select your answer, then click Done. Font Size
http
______ is the ability of an organization's information system to work with other systems within the organization. Select your answer, then click Done.
interoperability
A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. Select the two correct answers, then click Done.
raid 1 and mirrored
A ______ helps you identify and examine possible threats that may harm your computer system. Select your answer, then click Done. Font Size
risk assessment
A ______ is a program that disguises itself as an interesting, useful or desirable program in order to gain access to your system. Select your answer, then click Done.
trojan
Like all files on a computer, the file name or web page is located within a folder or directory. Click on the folder/subfolder structure, then click Done. Font Size
us politics
Similar to instant messaging, ______ occurs in real time, much like a face-to-face conversation. Font Size
video calling
Unlike email, ______ is having a live, online, text-based conversation with one or more individuals. Select your answer, then click Done.
video conferencing
Connor is surfing the internet at work. He does not know the rules regarding employer and employee web activity. Which option is true? Select your answer, then click Done. Font Size
watch without his knowledge
A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, then click Done. Font Size
wireless LAN and wifi
___ requires a password when connecting to your router and makes your wireless transmissions unreadable by hackers. Font Size
wpa2
Employees typically access their company's server via a______. Select your answer, then click Done. Font Size
local
Students who want to take a free online course at a prestigious university and do not require course credit can enroll in a ______. Select your answer, then click Done. Font Size
MOOC
Select the item that acts as a surge protector and a rechargeable battery, giving you enough time to save your work before shutting down your computer. When you are finished, click Done. Font Size
UPS
Select four types of broadband connections, then click Done. Font Size
all but dial up
In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States. Select your answer, then click Done. Font Size
arpanet
Ebay is an example of a(n) ______ site that allows buyers to bid and compete for a variety of new and used goods. Select all that apply, then click Done. Font Size
auction and C2C
Sam is creating a website featuring images of NASA astronauts in training. How can he find copyright-free images that he can legally use on his website? Select all that apply, then click Done. Font Size
author's permission, public domain, government
As NSFNET traffic grew in the 1980s, the NSF brought in private companies such as IBM to upgrade existing networks and create new ______, the connections that carry most of the Internet's traffic. Select your answer, then click Done. Font Size
backbones
everything posted on social media should be considered private
false