Computer Science
RAID
A(n) __________ is a storage system that links any number of disk drives so that they act as a single disk.
Expert System
A(n) __________ is a type of information system that performs analytical tasks traditionally done by a human.
DBA
A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.
Hub/Switch
A(n) __________ is the device that all nodes connect to in order to communicate wirelessly.
Creative Commons
A(n) __________ license allows authors to set conditions for the free use and distribution of their work.
MOOC
A(n) _______________ is a huge, noncredit, online course that is offered for free by a variety of universities
Fiber-optic
A(n)__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
False
A Kensington lock is an effective countermeasure against phishing threats.
Switch
A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes
True
A decision support system can include or access other types of data, such as stock market reports or data about competitors.
VPN
A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
Information-System
A(n) __________ is a complex system for acquiring, storing, organizing, using, and sharing data and information.
1. Education use and commentary are more acceptable than a for-profit use 2. Copying news article is more acceptable than a popular song or major network TV show 3. Using only a few seconds of a song or video is more acceptable than copying the entire thing 4. If you are claiming fair use just to avoid paying for a book, song, or movie, then fair use will likely not apply
Briefly describe the four factors that must be considered for "fair use."
Email promotions that come up whenever you check your email, banner ads and pop-ups which can both pop up anytime you are surfing the web
Describe three types (or models) of advertising on the web
1. News you can choose 2. Share this (sharing is emerging as a way or distributing the news) 3. Like it (by clicking a "thumbs up" or "thumbs down" icon, can give politicians an instant read on opinions and positions posted on their web pages
Describe three ways in which social media have been used to help bring about political or social change.
First party cookie are issues read by actual websites you are on. Third-party cookies, typically are created by marketing and advertising companies that work with a website you are visiting
Contrast first-party cookies with third-party cookies. Which one of these raises privacy concerns for many individuals?
False
Copyright protection lasts for approximately 15 years after the author applies for it.
Packets
Data moves through networks in structures known as __________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
The discovery of new patterns or relationships between data. Amazon.com uses data mining to predict what costumers might like in order to feature it when the costumer logs in and begins to browser
Define data mining and provide one example of how a retail company might use it.
A logical collection of info gathers from many different operational databases it supports business analysis activities an decision-making tasks
Define data warehouse and provide on example of how it can be used.
The application of sociological principles to specific social problems. Ex. 1. Familiarity Exploit 2. Creating a hostile situation
Define social engineering and provide two examples or techniques it employs
1. Instead of buying something you're not going to use very often, borrow it from someone 2. Carpool with friends, walk, take bus, ride bike 3. Turn lights off that you are not using
Describe at least three ways in which you can recycle and reduce computing-related waste.
A WAN (wide area network) is not restricted to a geographical location, although it might be confined within a state or country. A WAN connects several LAN's and may be limited to an enterprise or accessible to the public. Ex. WiFi (LAN), Ex. WAN (for offices)
Describe the difference between a LAN and a WAN, and provide one example of each.
Have a good subject, a proper title, and 2-3 sentences using proper grammar or however long depending on the email
Describe three guidelines that should be followed for good email ettiquette.
True
For a computer, "sleep" mode uses less electricity than "hibernate" mode.
True
For mission-critical systems, technology companies construct computer hardware and software that can never fail.
False
HTTP and HTTPS are the heart of Internet communication, setting rules for the transport and addressing of packets.
Rogue hotpots
Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:
Social networks are for keeping up-to-date with events you care about, professional networks are strictly for business
How are social networking sites different from professional networking sites?
True
If a company hires an outside organization to handle its accounting, it is engaged in outsourcing.
Gate Way
In its simplest form, a(n) __________ is a node on a network that serves as an entrance to another network.
Piracy
In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.
Yes, it is right because someone could be doing his job incorrectly
Is it legal for a company to monitor employees while they work? Is it ethical? Defend your answers.
False
It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.
spam
Junk mail, or _________, is unsolicited email that is sent in bulk
Copyright
Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.
Back, forward, stop, refresh and home all on the front page of any web browser these buttons are used all the time in computer usage.
List and briefly define five navigation buttons found in most web browsers
1. Anti-malware - helps protect your computer from various types of malware 2. Firewall - examines and blocks internet traffic in order to protect your private network 3. Encryption - many types of software and devices use encryption to scramble your data or communication making it unreadable
List and describe three countermeasures (security utilities) against malware and hacking.
1. Outlawing the use of computing resources to commit crimes, such as hacking and piracy 2. Restricting particular serutes, such as file-sharing on their networks 3. Banning inappropriate and unethical behavior and guidelines for theory netiquette 4. Stressing the importance of security especially the creation of a strong password 5. Explaining the ownership and privacy of email, storage, and other resources
List five elements that are typically found in acceptable use policies.
Weather, jobs, monsters and indeed, Travel-Expedia, orbite, entertainment, sports, rotten tomatoes, ESPN
List four categories of reliable sites and provide an example or brief description of each.
1. The ability to hire or keep workers whose schedule or location would make it impossible for them to work at the company's office 2. Reduced costs for office space and utilities 3. Improved employee morale, which can boost productivity and loyalty
List three advantages of telecommuting
FAQ
Many websites have __________ areas that should be checked for common questions and their responses.
Wodo
Network media helps carry data from one __________, or connection point, to another.
protocals
Networks must follow rules, known as communication __________, to ensure that data is sent, received, and interpreted properly.
Copyright
One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work.
Privacy policy
Online companies typically have a(n) ___________ _____________ on their websites that clearly state what information is collected from users and what is done with that information.
False
The asterisk symbol is often used to mark keywords or topics in a social post or tweet
Cyberbulling
Repeated hostile behavior with intent to harm another individual is known as __________.
False
Scalability is the ability of each organization's information system to work with the other, sharing both data and services.
True
Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.
Intranet
Some organizations offer an internal version of the Internet, called a(n):
1. Purchase a digital copy of almost anything at various websites 2. Rent for 2 days 3. Ad supported streaming 4. Subscription services can view legally
Suppose that you wanted to watch a Hollywood movie or the entire season of a TV show. List four legal ways in which you could view this content.
Star
The __________ topology, where nodes connect to a hub, is the most common type used today.
HTML
The ______________ language, which was used in the first web page, is still being used today alongside other languages.
Digital divide
The __________refers to the technology gap that exists between different social and economic classes.
Ethernet
The network standard known as __________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Netiquette
The term __________ refers to the set of online behaviors that are considered polite and proper.
broadband
The term _____________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies
ISP
To access the Internet from home you must connect to ____________, which typically involves makes monthly payments to a telecommunications company
VoIP
Translates analog voice signals into digital data and used the Internet to transport the data.
B2C is business to consumer., C2C -IS consumer to consumer , B2B IS business to business
What are the differences between B2C, C2C, and B2B?
Bookmarks are for remembering pages for the future, history is a list of sites you've previously used, cache contains every singe page, image and videos for all web pages you've recently retained
What are the differences between browser bookmarks, history, and cache?
An individual who possesses advanced skills, often making a computer do something that is wasn't intended to do. Yes there are identity theft hackers which is the most dangerous form of hacking
What are the original and modern meanings of "hacker"? Are there different types of hackers? What is the most dangerous form of hacking?
What you know. This typically refers to passwords or PINS an individual must memorize What you have. Refers to a credit or debit card that allows people to access their money Who you are. Many systems are now authenticating individuals by scanning their unique finger print, iris, or face
What are the three general strategies used to authenticate individuals? Include one example of each
Zombies are under external control. Botnets can be used by the hacker to spread malware, send spam, and conduct carefully orchestrated net-work attacks computers infected and compromised in this way are known as zombies
What are zombies and botnets? What can hackers do with them?
Plug-in is a separate program that allows your web browser to play several types of multimedia content, browser extension is also a separate program with purpose adding a variety of useful features to the web browser
What is the difference between a browser plug-in and a browser extension? Provide one example of each.
Surge protectors provide protection by dissipating any excess power and preventing it from reaching your connected device. A UPS provides protection against surges as well, but includes a built-on battery wit varying capacity based on model
What is the difference between a surge protector and a UPS? In your response, be sure to indicate the types of threats they help minimize.
Monitor internet and mobile-devices of individuals
What sort of Internet surveillance does the U.S. government engage in? Name two laws that give government agencies broad surveillance powers.
BCC
When sending email to a large number of individuals, placing their addresses in the __________ field will prevent all those addresses from being seen by the recipients
AC
Which of the following Wi-Fi standards is the fastest?
Nanotechnology
Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?
DSL
Which of the following is NOT a high-speed Internet connection for homes?
ARPANET
Which of the following networks, which began with just four universities, is the earliest ancestor of the Internet?
Domain name
Which part of a URL identifies a site and a brand on the web?
TPS
Which type of information system handles the processing and tracking of transactions?
Worm
Which type of malware is a fully contained program that self-replicates and spreads through networks?
It updates so quickly about breaking news and up to date information, it always has recent political debates or even sports highlights uploaded to twitter right away by various users
Why has twitter become such an important service? List three reasons.
True
Wireless networks use radio signals that travel through the air in order to transmit data.
Threat generally can NOT be controlled, vulnerability can be treated weaknesses should be identifies and proactive measures taken to correct identified vulnerabilities
With respect to computer security, what is the difference between a threat and a vulnerability?
web portals
Yahoo and MSN are both examples of:
world-wide-web
_______________is a global system of linked, hypertext documents
Green Computing
__________concentrates on reducing the environmental impact of computers and their widespread use.
Help-Desk
You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.
Redundant
__________ computers are ones that have multiple hardware systems performing the same task at the same time.
AI
__________ involves the development of intelligent systems.
Private browsing
__________ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser.
Empathy
__________ is the ability to recognize, understand, and share the feelings of others.
Whistleblowing
__________ is the act of alerting the public about harmful activities that are being hidden by an organization.
Bandwidth
__________ is the amount of data that can be transmitted over a given amount of time.
Ethics
__________ is the philosophical study of morality.
Automation
__________ occurs when computers or machines can perform the work that was once done by a human.
forumns
____________ is a discussion board where individuals can ask questions and reply to each other.forumns
Instant Messaging
_____________ is the act of having an online, text-based conversation with one or more individuals
Social Norms
________________ sites, such as Reddit, encourage users to share links to news and other interesting content they find on the web.
blog
a_____________ is a web page or small website that contains a series of chronological posts and commentsblog
peer-to-peer
file sharing uses a distributed network of individual users instead of a central server to transfer files
Trolling
is the act of being annoying and antagonistic in areas such as online forums.