Computer Science Ch. 5 & 6 online test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

offshoring

when companies outsource functions of another country it is referred to as:

turing test

which of the following is a popular test of a system's ability to think?

fair use

Copyright law contains an exception known as ___ which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission

Dashboard

Google allows users to view and control all their data with a tool known as:

FISA

Laws such as the patriot act and ___ give the U.S. government broad surveillance powers

footprints

You and your devices usually leave digital ___ which is a trail of your data, activity, and even the locations where devices are used

fault-tolerant

___ computers are able to continue their operation even when problems are present

redundant

___ computers are ones that have multiple hardware systems performing the same task at the same time

SEO

___ involves improving the ranking of a website when users enter relevant keywords in a search engine

phishing

___ involves luring individuals into entering personal information into a website controlled by the hacker

Nanotechnology

___ involves the creation or manipulation of matter at the smallest possible scale

spyware

___ is a type of malware which is designed to report activity on your computer to another party

data mining

___ is discovery of new patterns or relationships between data

wireless

___ networks use radio signals that travel through the air to transmit data

strong

___ passwords are long and generally use a mix of upper and lower case letters

attenuation

___ refers to the loss of intensity and clarity of the data signal being transmitted

DDoS

a ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests

quantum

a ___ computer can represent data in states beyond the two bits (0's and 1's) of today

software engineer

a ___ is responsible for the development of computer software

repeater

a ___ is used to prevent attenuation when packets are traveling long distances

router

a ___ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination

keyloggers

a type of spyware known as ___ can record the individual keystrokes of a user

cybercrimes

actions ranging from creating viruses to disrupting computer networks are often referred to as:

surge protector

an ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur

countermeasure

any step you take to ward off a threat is called a:

Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?

can the exposure

mission-critical

certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure

zombies

computers which are under the external control of a hacker are known as:

packets

data moves through networks in structures known as ___ which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

bandwidth

for modern networks ____ is measured in either megabits per second (Mbps) or gigabits per second (Gbps)

paperless

many companies and individuals are going ___ which means they are using technology to lower their consumption and reliance on paper

NSA

many government agencies, such as the ____ monitor the internet and mobile activities of individuals all over the world

encryption

many types of software and devices use ___ to scramble your data of communication

FAQ

many websites have an ___ area that should be checked for common questions and their responses

cyberterrorism

no form of hacking is as dangerous as ___ which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure

protocols

systems follow certain rules or ___ to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed

backups

very few countermeasures are as effective as ___ which can help you recover data that was lost to almost any type of threat


संबंधित स्टडी सेट्स

Diseases Preventable By Vaccines UMT 12

View Set

Anatomical Position and Planes' Terminology

View Set

Annuity Basics and Definitions Chapter Quiz

View Set

Geo Bee Questions: Bodies of Water

View Set

. Which of the following statements are true of the time of flight for a projectile? List all that apply.

View Set

Wk 5 - Practice: Ch. 19 - Advertising, Sales Promotion... [due Day 5]

View Set

Digestive System and Metabolism Exam Study Guide (Pt. 7)

View Set