Computer Security
How do I create secure passwords and manage all of my passwords?
Use more than 14 letters including, numbers, symbols, upper and lower case letters, nothing that is relative to you, no words that are in the dictionary, changing it often and by using a password management software.
Worms
Use transport methods like e-mail and networks to spread without human interaction
denial-of-service (DoS)
Users are denied access to computer system because hacker is making repeated requests. When flooded with requests, the system shuts down.
Which protocol uses standard Internet connections to make phone calls over the Internet?
VoLP
Types of Hackers
White-hat or ethical - Black-hat - Grey-hat
Rootkits
are programs (or sets of programs) that allow hackers to gain access to your computer and take control without your knowledge
Distributed denial-of-service (DDoS)
attack launches attacks from more than one zombie computer
In Windows, which character is used as a path separator?
backslash (\)
The ________ language consists of just two digits: 0 and 1.
binary
The term "bit" is short for ________.
binary digit
In the Windows operating system, the hard drive is represented as the ________.
c drive
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
device driver
Zombie
is computer controlled by hacker
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
A ________ is approximately 1 million bytes.
megabyte
The small circuit boards that hold a series of RAM chips are called ________.
memory modules (memory cards)
When referring to hard drives, access time is measured in ________.
milliseconds
The ________ contains the central electronic components of the computer.
motherboard
Inkjet printers and laser printers are examples of ________ printers.
non-impact
The most essential software in your computer system is the ________.
operating system software
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
output
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
Incremental backup
partial backup
Network Address Translation
provides a way to hide the IP addresses of a private network from the Internet while still allowing computers on that network to access the Internet
Some video games require a ________ operating system.
real time
Domain names can be purchased from companies called _____; examples include Network Solutions, eNOM and Godaddy.
registrars
A(n) ________ is a device that looks like a skinny pen but has no ink. A(n) ________ is a device that looks like a skinny pen but has no ink.
stylus
Image backup
system backup
Which of the following is an open source operating system?
Linux
Logic bombs
Logic bomb is triggered when certain logical conditions are met
macro viruses
Macro virus attaches itself to a document that uses macros
Front side bus speed is measured in ________.
Megahertz
________ is the communications methodology where data is broken into smaller chunks to be sent over various routes at the same time.
Packet Switching
Polymorphic viruses
Periodically rewrite themselves to avoid detection
An accumulation of temporary Internet files has no effect on your computer's overall performance.
Pertaining to system reliability, False
________ is the place in a computer where the programs and data the computer is currently using are stored.
RAM
An expansion hub allows you to provide new, external ports to your computer.
True
Spam
Unwanted or junk e-mail
Spyware
Unwanted piggyback programs that download with other software you install from Internet that transmit information about you
Linux is an open source operating system that can be used both on personal computers and as a networking operating system.
True
Modern printers feature Bluetooth connectivity technology.
True
Solid state drives have no platters or motors.
True
Some CPUs now have three levels of cache memory. Some CPUs now have three levels of cache memory.
True
Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.
True
The ALU is the part of the CPU that performs mathematical operations and makes comparisons.
True
The CPU is located on the motherboard.
True
The CPU machine cycle starts with the Fetch step.
True
The amount of memory your video card needs depends on what you want to display on your monitor.
True
The operating system provides the means for users to interact with a computer. Answer
True
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time.
True
The user interface is part of a computer's operating system.
True
Video cards often include their own RAM.
True
You can download a version of Linux from the Internet for free.
True
You can download open source software for free from Web sites and install it on as many computers as you like.
True
You can use System Restore to restore your system's settings back to a specific date when everything was working properly.
True
Scareware
Type of malware downloaded onto computer that tries to convince you that computer is infected with virus Then directed to site to buy fake removal tools
Which of the following operating systems is used primarily with mainframes as a network operating system?
UNIX
All of the following are terms related to part of the boot process EXCEPT:
USB
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus USB
How to Keep hackers out
Protect your digital information • Use passwords - Hide activities from prying eyes
The basic input/output system is stored on a ________ chip.
ROM
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ROM
Biometric Authentication Devices
Read unique personal characteristics - Fingerprint - Iris pattern in eye - Voice authentication - Face pattern-recogniton • Provide high level of security - Eliminate human error
Which of the following is NOT a step in the CPU machine cycle?
Register
Main Purpose of viruses
Replicate themselves and copy code to as many other files as possible
Boot-sector viruses
Replicates itself into hard drive's master boot record
Encryption viruses
Run program that searches for common types of data files Compress files using a complex encryption key that makes files unusable Asks for payment to receive the program to decrypt your files
A(n) ________ uses the same kind of memory that flash drives use and has no spinning platters or motors.
SSD
Script
Script is miniprogram hidden on Web sites that is executed without user's knowledge
Computer virus
a program that attaches itself to another computer program, Attempts to spread to other computers when files are exchanged, One of the most widespread types of cybercrimes
Trojan horse
appears to be useful but while it runs it does something malicious in background
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
________ binary digits (or bits) combine to create one byte.
eight
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
eight bits
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
ergonomics
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
file path
The CPU is connected to the system memory by the ________.
front side bus
Broadband
general term used to refer to high-speed network connections
CPU speed, also called clock speed, is currently measured in ________.
gigahertz
Microsoft Windows and Mac OS use a ________ interface.
graphical user
Any computer parts that you can actually touch are considered to be ________.
hardware
The ________ number system uses the digits 0-9 and the symbols A-F.
hexadecimal
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.
hyperthreading
To make sure your computer performs reliably, you can do all of the following EXCEPT:
increase the front side bus speed.
________ is data that has been organized or presented in a meaningful fashion.
information
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
input device
Phishing
lures users to reveal personal information that could lead to identity theft
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.
nonvolatile
Computers process data into information by working exclusively with ________.
numbers
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
operating system
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
port
The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.
power supply
________ is the semiconductor material used to make transistors.
silicon
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
swap
If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
task scheduler
RAM is considered volatile storage, which means it is ________.
temporary
Which of the following does NOT occur during the power-on self-test?
the OS is moved into RAM
Cache memory levels are determined by ________.
the chips proximity to the CPU
Moore's Law is a rule that predicts ________.
the pace at which CPUs improve
"Bandwidth"
the relative speed of a network connection
________ microphones pick up sound from only one direction.
unidirectional
The percentage of time your CPU is working is referred to as CPU ________.
usage
The earliest generation of electronic computers used ________ as switches.
vacuum tubes
Pharming
when malicious code is planted on your computer
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.
True
Adobe Dreamweaver is a Web authoring program.
True
All students are expected to maintain a working WKU email account at all times during the semester. This includes managing the quota to avoid missed messages.
True
An expansion card that translates binary data into images is a(n) ________.
True
Boot Camp is a utility that allows you to run Windows and Mac OS X at the same time.
True
Cell phones, PDAs, and portable music players should be turned off PRIOR to entering a classroom.
True
Every computer is designed with a maximum limit on the amount of RAM it can support.
True
External hard drives are an ideal solution when you need more storage than a flash drive can provide.
True
External hard drives are often used to back up data that is contained on the internal hard drive.
True
Hard drive access time is measured in milliseconds.
True
Hard drives have been growing in storage capacity by about 50 percent each year.
True
Hard drives have the largest capacity of any storage device.
True
If you install a device that is not PnP, you will be prompted to install a driver.
True
Installing a device driver can sometimes cause system instability.
True
It is important that if you are building your own computer, you make sure that the motherboard that you buy accommodates the CPU you have chosen.
True
All computer labs maintain a strict "No food, drink, or tobacco products" policy.
True
All data input into a computer will be stored as 1s and 0s.
True
The ASCII code can represent ________ unique characters.
256
OpenOffice includes all of the following components EXCEPT:
Access
What type of memory stores frequently used instructions or data needed by the CPU?
Cache
Cache memory is a form of ROM.
False
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
directories
A ________ is approximately 1 billion bytes.
gigabyte
Adware
- Displays sponsored advertisements - Pop-up windows
How hackers gain access
- Installing hacking software -Indirect access - Through Internet connection - Logical ports
Hardware firewall devices
- Routers - Keep unused logical ports closed
Malware
- Software that has malicious intent
Antivirus Software Companies
- Symantec - Kaspersky - AVG - McAfee
Threats to Data
- Unauthorized access - Tampering - Destruction
What is cybercrime and who perpetrates it?
-criminal action perpetrated primarily through the use of a computer -individuals who use computers, networks, and the Internet to perpetrate crime.
A set of rules for exchanging electronic information is called ________.
...
When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server. When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server.
...
________ lines are high-speed, fiber-optic communications lines.
...
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
.docx
A single alphabetic or special character is equal to ________ bit(s).
1
How many points are available in this course? In other words, if you got 100% on everything there is to do, how many points would you earn?
1100
Unicode uses ________ bits to code character data.
16
New technologies pushing the boundaries of printing include ________.
3D printing, cloud printing, inkless printing
What is a firewall, and how does it keep my computer safe from hackers?
A software program or hardware designed to protect computers from hackers by putting a barrier between you and the hacker.
From which types of viruses do I need to protect my computer?
All types.
Hoaxes
Attempt to make someone believe something that is untrue - Target large audiences - Practical joke, agents of social change, or time wasters - Mostly by e-mail
How do I manage online annoyances such as spyware and spam?
Avoid malware, adware, spyware and spam.
How can I surf the Internet anonymously and use biometric authentication devices to protect my data?
By using onion router, by using personal characteristics to identify you.
In Windows, a file path starts with a ________.
Drive letter
When virtual memory is in use, the condition of excessive paging is called swapping.
False
Which of the following activities is carried out by the ALU?
Completion of all arithmetic calculations
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control Key
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
DVI
Situational ethics
Decision making should be based on circumstances
Antivirus software
Designed to detect suspicious activity
Which of the following Windows utility programs arranges files on your hard drive in sequential order?
Disk Defragmenter
Stealth viruses
Erase their code from the hard drive and reside in the active memory
Rule utilitarianism
Espouses establishing moral guidelines through specific rules
________ plug into slots on the motherboard and provide additional functionality for your computer.
Expansion cards
If you regularly download and upload files, chances are that you are using ________.
FTP
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
False
Level 1 cache is located farther away from the CPU than Level 2 cache.
False
Linux is available in various packages called GIMPs.
False
One bit is equal to eight bytes.
False
RAM is nonvolatile storage.
False
RAM is stored directly on the CPU.
False
The percentage of time that your CPU is working is referred to as processing time.
False
Upgrading your CPU can increase how quickly data can move to or from the CPU.
False
The amount of RAM recommended for most systems today is measured in ________.
GB
Societal Ethics
General set of unwritten guidelines for people to follow
Multipartite viruses
Infect multiple file types
What can I do to protect my computer from viruses?
Install Antivirus, have software and hardware firewalls, do not click on unknown links or downloads.
The ________ contains all of the different configurations used by the OS and by other applications.
Kernel
Software firewalls
Most operating systems include firewall - Many security suites include firewall software
Relativism
No universal moral truth, only beliefs, perspectives, and values
Unethical behavior
Not conforming to a set of approved standards of social or professional behavior Not all illegal behavior is unethical
displays use organic compounds that produce light when exposed to an electric current.
OLED
Secondary objectives of viruses
Slow down networks, Display annoying messages, Destroy files or contents of hard drive
Cookies
Small text files that Web sites automatically store on hard drive to make return visit more efficient and better geared to your interests
Firewalls
Software program or hardware designed to protect computers from hackers
All of the following can be considered to be network operating systems EXCEPT:
Symbian OS
________ is the main suite of protocols used on the Internet.
TCP/IP
Windows ________ is similar to the Activity Monitor of a Mac that analyzes computer performance.
Task Manager
You can use the Windows ________ to check on a nonresponsive program.
Task manager
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU.
The CPU consists of which two parts?
The control unit and the arithmetic logic unit.
How can hackers attack my computing devices, and what harm can they cause?
They can gain access through directly Installing hacking software,and indirectly Through Internet connection, and Logical ports. They can steal information, break into sites, capture login ID and password, purchase items, sell credit card info.
time bombs
Time bomb is triggered by the passage of time or on a certain date