info 160 all terms
privacy tools
- Private Browsing - InPrivate - Incognito
a bit consists of
0 or 1
8 binary digits is equal to
1 byte
a megabyte is how many bytes
1 million
a kilobyte is how many bytes
1000
Hexadecimal represents numbers using which base?
16
What is the base for hexadecimal numbers?
16
Expressed in decimal, the range for RGB colors is 0 to ________.
255
How many colors are used in the RGB system?
3
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
A Trojan horse
File History
A Windows utility that automatically creates a duplicate of your libraries, desktop, contacts, and favorites and copies it to another storage device, such as an external hard drive.
Task Manager
A Windows utility that shows programs currently running and permits you to exit non responsive programs when you click End Task.
Wiki
A collaborative website that can be edited by anyone that can access it.
zombie
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
Copyleft
A license that grants users the right to modify and redistribute the software
encryption virus
A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.
file compression
A process that reduces a file's size for storage or transmission purposes.
Basic Input/Output System (BIOS)
A program that manages the data between a computer's operating system and all the input and output devices attached to the computer; also responsible for loading the operating system (OS) from its permanent location on the hard drive to random access memory (RAM).
device driver
A software program that provides the instructions your computer needs to communicate with a device, such as a scanner.
Desktop Email Application
A type of email application, such as Microsoft Outlook, which is installed onto a computer.
System Restore
A utility in Windows that restores system settings to a specific previous date when everything was working properly.
boot sector virus
A virus that replicates itself into the master boot record of a flash drive or hard drive.
Which of the following is not an Internet protocol?
ARPANET
________ software helps small business owners manage their finances more efficiently.
Accounting
custom installation
Allowing user to decide which features of the software he wants to install in a computer's hard drive
Beta Software
An early version of a software program that is often provided free to users to test for bugs before the program is sold to consumers.
Which of the following optical storage devices holds the most high-definition video?
BD
Where can you create and maintain a blog for free?
Blogger.com
The main internal hard drive on a Windows computer is usually identified as the ________ drive
C:
________ is a type of memory that uses almost no power and is never erased.
CMOS
considered the brains of the computer
CPU
what is found on the motherboard
CPU, RAM, ROM, and cache
Wildcard
Characters to find words or phrases that contain specific letters or combination of letters.
pinning
Choosing which applications are tiles on the start menu
Accessibility Utilities
Designed for users with special needs
top-level domain
Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.
A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.
File History
Worms
Independent computer programs that copy themselves from one computer to other computers over a network
Which of the following best describes the transmission lines with the fastest speeds?
Internet backbone
Which is NOT a feature of security software?
Keystroke logging
Which of these File Explorer views would be best if you are looking for a specific picture?
Large Icons
real-time operating system (RTOS)
Machinery that performs a repetitive series of specific tasks in an exact amount of time
Pharming
Malicious code planted on your computer to gather information
Scareware
Malicious software of no benefit that is sold using scare tactics
When using File Explorer, the left-hand pane that shows the contents of the computer is called the ________ pane.
Navigation
Which of the following virus types changes its own code to avoid detection?
Polymorphic
open source software
Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.
multimedia software
Programs that include image, video, and audio editing software, animation software, and other specialty software required to produce computer games, animations, and movies.
When the POST is complete, the operating system is loaded into ________.
RAM
The BIOS is stored ________.
ROM chip
Files deleted from your Windows computer's hard drive are stored in the ________ until they are permanently deleted.
Recycle Bin
If your Windows 10 computer has trouble when booting, ________ attempts to diagnose and fix the system files.
Reset this PC
What is a specialty search engine?
Searches only sites deemed appropriate to an interest or industry
time bomb/logic bomb
Software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or both.
antivirus software
Software used to detect and eliminate computer viruses and other types of malware.
word processing software
Software used to prepare text documents such as letters, reports, flyers, brochures, and books.
simulation programs
Software, often used for training purposes, which allows the user to experience or control an event as if it is reality.
If you encounter a problem, the Windows ________ feature can take your system back in time to a point where it was working properly.
System Restore
preemptive multitasking
The OS processes the task assigned a higher priority before processing a task assigned a lower priority
file explorer
The file management tool in Windows 8 used to organize files.
quarantining
The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.
In the RGB system, when all three component colors are set to zero, what is the result?
The resulting color is pitch black.
multimedia software.
The software that allows you to edit digital images, videos, as well as digital audio is called
Ergonomics
The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
How do metasearch engines work?
They search other search engines' results.
Which of the following statements is NOT true about identity theft?
Thieves can easily defeat 2-factor authentication.
Who built and operates the Global Positioning System?
U.S. Department of Defense
most common computer port
USB
Which of the following ports has the fastest data transfer rate?
USB 3.1
uncompressed audio file format
WAV
Ports
________ are the places that peripheral devices attach to the computer.
spreadsheet software
a computer program that allows you to insert numbers and formulas to compute amounts(microsoft exel, libreoffice)
Some spyware catches your private information by using
a keystroke logger.
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
virus signature
a portion of virus code that is unique to a particular computer virus
trojan horse
a program that appears desirable but actually contains something harmful
Videos can be embedded in a blog from all of these sources EXCEPT ________.
a tv
email virus
a virus transmitted by email that often uses the address book in the victims email system to distribute itself
a sensor found in certain smartphones
accelerometer
When booting a Windows 10 computer, the first step is ________.
activating the BIOS
An unusual advertisement on your computer screen that pops up is usually caused by ________.
adware or spyware
multiuser operating system (network operating system)
allows multiple users access to the computer at the same time
database software
an application that allows users to create, access, and manage a database
top mobile operating systems
android, windows, IOS
note taking software
application software that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page(one note, ever note)
personal information manager (PIM)
application software that includes appointment calendar, address book, and a notepad (microsoft outlook)
The width-to-height proportion of a monitor is known as what?
aspect ratio
bit is short for
binary digit
Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.
black-hat hacker
Viruses that load from USB drives left connected to computers when computers are turned on are known as
boot-sector viruses.
What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
breadcrumb trail
B2B commerce
business to business
The decimal number 12 is represented in hexadecimal as ________.
c
Microsoft Outlook
calendars, tasks, emails
Once you encrypt your SD card, those files
cannot be read if the SD card is put in another phone.
Backing your work up to a(n) ________ is more secure than using an external hard drive.
cloud storage location
logical port blocking
completely refuses requests from the internet asking for access to specific ports
cookies
computer program, installed on hard drives, that provides identifying information
Adware
computer software that displays advertisements
has moving parts, so it is more prone to malfunction
conventional hard disk drive
What does the OS do?
coordinates and directs the flow of data and information
backups
copies of files that you can use to replace the originals if they're lost or damaged
Adobe Illustrator can be used to ________.
create technical drawings
the representation of a fact, figure, or idea
data
The most common occurrence of identity compromise is through ________.
data breaches of a company that stores your information
In everyday life, the most commonly used number system by people is ________.
decimal
Which of the following numbering systems is ordinarily used by people?
decimal
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.
denial-of-service
The ________ is the primary working area in Windows 10.
desktop
________ software allows users to design and layout complex documents such as brochures and newsletters.
desktop publishing
In which view are files and folders displayed in list form, with the additional file information displayed in columns alongside the file names?
details
When you are sorting files and folders in File Explorer, use ________ view to get the most interactive view available.
details
distros
different versions of linux
Adobe Premier is an example of ________.
digital video-editing software
Which component of a computing device drains the battery the fastest?
display screen
what can be both an input and output device
display screen
You would use Windows Action Center to check all of the following except ________.
display settings
taskbar
displays open and favorite applications for easy access
Attacks that are launched from multiple zombie computers at the same time are called ________.
distributed denial-of-service attacks (DDoS)
A metasearch engine like Dogpile eliminates ________ in its results.
duplicates
power-on self-test (POST)
ensures that essential peripheral devices are attached and operatal
Which of the following ports are used to connect a computer to a cable modem or to a network?
ethernet
You can increase the number of USB ports on your computer by adding a(n) ________.
expansion hub
In c:\cis\400\proj3.docx, the docx is a(n) ________.
extension
RAM is non-volatile storage.
false
packet filtering
filters out packets sent to logical ports
"quicken" is an example of what software
financial management
When installing new downloaded software, if the setup program doesn't automatically launch, you would ________.
find the setup files where you downloaded them and run setup.exe
Copyrighted software that certain program developers distribute for free is known as ________.
freeware
When you install all the most commonly used files and programs to your computer's hard drive, you have completed which kind of software installation?
full installation
The Android smartphone operating system was developed by ________.
an example of a web based OS is
google chrome
Operating systems that have windows and icons have which type of user interface?
graphical interface(GUI)
a collection of Tiles on the Start Menu
group
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
________ usually have the largest storage capacity of any storage device inside the computer.
hard drive
directory
hierarchical structure that includes files, folders, and drives
The list of results returned to you when you search for information on the web is called a list of ________.
hits
User Interface
how the user interacts with the computer
data that has been organized is called
information
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
inoculation
4 main functions of a computer
input, output, storage, processing
When a printer receives a command, it generates a unique signal to the OS, which is called a(n)
interrupt
A packet analyzer is called a sniffer because
it captures and reads data inside each packet.
Google is an example of a ________ search engine.
keyword
botnet
large group of software running on zombie computers
denial of service attack
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie
The power-on self-test does all of the following EXCEPT ________.
load the operating system
Which type of software is not upgraded automatically?
locally installed
Firewalls work by closing ____ in your computer.
logical ports
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
logical ports
Phishing
luring ppl into revealing info
malware
malicious software
Which of the following is usually NOT listed in the software's system requirements?
monitor
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation (NAT)
are data and information interchangeable
no
is A flash drive is needed to read a flash memory card?
no
is The web is based on the WWW protocol?
no
identity theft
occurs when a thief steals personal info and poses as you
Pretexting
occurs when someone deceives by pretending to be someone else
Device drivers are
often bundled with the operating system.
Emptying the Recycle Bin should be done ________.
only after you have determined that you no longer need any of the files that you have deleted
________ is free software that is distributed with few licensing and copyright restrictions.
open source
LibreOffice is an example of which type of software?
open source software
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
packet filter
A(n) ________ is a program that analyzes the contents of data packets on a network.
packet sniffer
A firewall designed specifically for home networks is called a ________ firewall.
personal
The process of adding a Windows 10 app to the Start menu is known as
pinning
The most common output device for hard output is a
printer
Setting a system restore point should be done ________.
prior to installing new software
What web browser feature would be particularly useful when using public computers?
privacy browsing
turns data into information
proccessing
virus
program that attaches to a computer program and spread to others
macro
program that groups a series of commands into one
Start Menu
provides access to all applications
Blog posts are not publicly available until they are ________.
published
Inoculation
records key attributes ab your computer files and keeps stats in a safe place
bit
represented by 1 or 0
When installing new software on a Windows computer, it is a good idea to create a(n) ________ point so that if problems arise, you can return your system back to how it was before you started.
restore
If you inadvertently delete a needed file from your computer's Documents folder, in Windows, you can recover it by ________.
restoring it from the Recycle Bin
The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the
root directory
A ______ is a program that takes complete control of your computer without your knowledge.
rootkit
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as
scareware
A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.
script
A specialty search engine is a(n) ________.
search engine that searches only sites that are relevant to a particular topic
Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights?
search tools
A metasearch engine is different than a regular search engine because it ________.
searches other search engines instead of individual websites
VPN (Virtual Private Network)
secure networks that are established using the public internet infrastructure
power control option that leads to a cold boot
shut down
Software that is hosted by the vendor and accessed online is called
software as a service
spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
exploit kits
software that runs on servers searching for vulnerabilities
inkjet printer
sprays ink onto paper
Which type of productivity software would you most likely use to do calculations and what-if analyses?
spreadsheet
tiles
square icons that appear on the Windows 10 Start Menu
optical storage devices
store and read data using light
The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software are called
system requirements
Which feature of a browser enables you to separate a browser tab into its own window?
tear off tabs
A GUI user interface is special because
there is a set of icons that represent the OS tasks.
The Better Business Bureau seal on a website indicates ________.
third-party verification
App Creation Software examples
thunkable, app inventor, unity, corona sdk
Logical ports are virtual, not physical, communications paths.
true
Windows Defender protects your computer from all of the following EXCEPT ________.
unexpected software updates
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
You should ________ to remove a software application from your computer.
use the Uninstall Program feature in the Control Panel
biometric authentication
uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users
The OS can optimize RAM storage by using
virtual memory
Antivirus software looks for ____ to detect viruses in files.
virus signatures
What color is displayed if each color in the RGB system is saturated?
white
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
white-hat hacker
top 3 operating systems for personal computers
windows, macOS, linux
Which of the following are considered slightly different from viruses because they can run without user interaction?
worms
When you set up your blog, can you can turn off comments?
yes
All of the following are true of virus protection software packages EXCEPT ________.
you can only scan the entire computer each time you perform a scan
ShieldsUP and LeakTest are software programs you can use to test whether ________.
your firewall is working correctly