IS EXAM 3
When you visit certain Web sites, spyware may be automatically downloaded. This is called a a. botnet. b. spybot. c. logic bomb. d. drive-by download
d. drive-by download
The World Wide Web was introduced in ________. a. 1969 b. 1984 c. 1991 d. 2000
c. 1991
Unauthorized access to computer systems is called a. a virus. b. spoofing. c. phishing. d. hacking.
d. hacking.
Yahoo!, MSN, and AOL/Netscape are examples of ________. Selected Answer: a. servers b. ISPs c. Web directories d. portals
d. portals
Yahoo!, MSN, and AOL/Netscape are examples of ________. a. servers b. ISPs c. Web directories d. portals
d. portals
With the TCP protocol, a message is sent on the Internet broken into ________. a. addresses b. packets c. URLs d. clusters
b. packets
The top-level domains for countries consist of two letters. a. True b. False
a.true
Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar to a T1. a. upstream b. downstream c. asynchronous d. upload
b. downstrea
One example of a synchronous method of communication is a. blogs. b. instant messaging. c. forums. d. email.
b. instant messaging
________ is software that can be used to encrypt data. a. Malware b. Decrypting software c. PGP d. Forensic software
c. PGP
Cybersquatters are: a. People who do athletics on the Internet b.Hackers who steal information on cyberspace c.People who buy popular domain names to sell them later for a profit d.Identity thieves
c. People who buy popular domain names to sell them later for a profit
Software programs that close potential security breaches in an operating system or application are known as a. security breach fixes. b. refresh patches. c. security repairs. d. security patches.
d. security patches.
If you want to secure an email message, use a(n) a. decrypter. b. encryption key. c. encryption software package. d. cryptosystem.
d. cryptosystem.
f you want to secure an email message, use a(n) a. decrypter. b. encryption key. c. encryption software package. d. cryptosystem.
d. cryptosystem.
Theft of computers is most common for desktop computers. a. True b. False
b. False
XML is used to write small programs called applets. a. True b. False
b. False
_______ is another term for millions of bits. a. Kilobits b. Megabits c. Terabits d. Gigabits
b. Megabits
A worldwide public newsgroup available on the Internet is a. TCP/IP. b. Usenet. c. Listserv. d. Blogger.
b. Usenet.
After an HTML document is completed, it needs to be uploaded onto a ________ server before it's visible on the Web. a. FTP b. Web c. Email d. File
b. Web
________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area. a. 3G b. WiMAX c. Bluetooth d. Infrared
b. WiMAX
RSS-reading applications which periodically visit Web sites, examine the feeds, and display new content are known as ________ a. blogs b. aggregators c. plug-ins d. cookies
b. aggregators
The most effictive type of backup for recovering data after a fire would be a(n) _________ backup. a.incremental b.bootable c.off-site d.archive
b. bootable
A virus that attaches itself to documents that contain macros is called a(n) Selected Answer: a. email virus. b. macro virus. c. Trojan horse. d. time bomb.
b. macro virus.
A(n) ________ converts a message from digital to analog or from analog to digital. a. hub b. modem c. switch d. port
b. modem
What is the most common tool used to restrict access to a computer system? a. biometrics b. passwords c. computer keys d. access-control software
b. passwords
A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site. a. spamming b. phishing c. VPN d. MMORPG
b. phishing
An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a a. Trojan horse. b. virus. c. worm. d. botnet.
b. virus.
The most effictive type of backup for recovering data after a fire would be a(n) _________ backup. incremental bootable off-site archive
bootable
________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true broadband speed. a. 4G b. DSL c. 3G d. Wi-Fi
c. 3G
T3 connections transmit data at this speed a. 1 Mbps. b. 1.5 Mbps. c. 45 Mbps. d. 1 Gbps.
c. 45 Mbps.
________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time. a. Attenuation b. Megahertz c. Bandwidth d. Ethernet
c. Bandwidth
A personal area network is possible because of the wireless technology known as a. USB. b. FireWire. c. Bluetooth. d. PDA.
c. Bluetooth.
Which of the following statements about Web page authoring is FALSE? a. Web pages can be written without any special Web authoring tool. b. Microsoft Expression Web is an example of a Web authoring tool. c. Programs such as Microsoft Word cannot be used to author Web pages. d. Web authoring tools generate the underlying HTML code for a Web page.
c. Programs such as Microsoft Word cannot be used to author Web pages.
Which statement is NOT true regarding antivirus programs? a. They are designed to search for and remove viruses. b. They will notify users when a virus is found. c. They always detect every virus on a PC. d. They must be updated to remain effective.
c. They always detect every virus on a PC.
Which statement is NOT true regarding antivirus programs? a. They are designed to search for and remove viruses. b. They will notify users when a virus is found. c. They always detect every virus on a PC. d. They must be updated to remain effective.
c. They always detect every virus on a PC.
Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1 gigabit per second. a. node b. local area c. backbone d. mesh
c. backbone
Internet connections that work through the same network of coaxial cables that deliver television signals work through a ________ modem. a. fax b. satellite c. cable d. POTS
c. cable
A(n) ________ cable uses light waves to transmit multimedia and voice data. a. copper b. twisted-pair c. fiber-optic d. coaxial
c. fiber-optic
The most basic computer network can be described as a. a minimum of five computers linked together. b. the Internet. c. two or more computers that are linked together. d. the use of satellites linking computers together.
c. two or more computers that are linked together.
Every host computer on the Internet has a(n) ________. a. similar IP address b. unique 15-digit number c. unique IP address d. DNS
c. unique IP address
In the email address [email protected], "bowles" is the ________. a. password b. server name c. user name d. client computer
c. user name
A ________ stores data and software that can then be shared by several users. a. file server b. firewall c. thread d. client
a. file server
The protocol used to transfer Web pages is ________. a. http b. ftp c. smtp d. dns
a. http
An autonomous system can assume almost complete responsibility for a task and minimizes risk because of its absolute reliability. True False
False
The Web was built with push technology. True False
False
A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse? a. logic bomb b. Code Red c. Melissa d. spybot
a. logic bomb
A ________ is a hardware device that connects a computer to a telephone line. a. modem b. router c. network card d. hub
a. modem
What is a coaxial cable made of? Mostly copper Glass fibers Mostly copper and aluminum Mostly plastic
Mostly copper and aluminum
What is a coaxial cable made of? Mostly copper Glass fibers Mostly copper and aluminum Mostly plastic
Mostly copper and aluminum
Which department of the U.S. government developed the initial stages of the Internet? a. Department of Commerce b. Department of Defense c. CIA d. Judicial Department
b. Department of Defense
Which key of the computer cannot be shared with other computers? Public key Private key
Private key
What is the major light principle fiberoptic cables are based on? Total reflection Deviation Brightness Color
Total reflection
"Cracker" is the correct term for the term "hacker" we use today. True False
True
Bill Gates was the original developer of the World Wide Web. a. True b. False
b. False
Computer forensics is a form of computer crime. a. True b. False
b. False
Networks that use electrical lines are sometimes called ________. Selected Answer: a. power-line networks b. electrical-line networks c. twisted pair networks d. power-line paired networks
a. power-line networks
The first part of a URL refers to the ________ that must be used to access information, for example http. a. protocol b. user name c. host d. domain
a. protocol
When radio or TV broadcasts are streaming at the same time they are happening, it is called a. real-time. b. plug-in. c. 3-D. d. RealOne.
a. real-time.
Nonprofit organizations' URLs typically end with .net. a. True b. False
b. False
When a business can legally copy software to all of the computers they own, the company has a ________ license. a. site b. company c. pirate d. sharing
a. site
RAID is a collection of Internet-based disks that serve to back up a hard drive. a. True b. False
b. False
Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack. a. social engineering b. hacking c. identity theft d. trojan horse
a. social engineering
This IP address doesn't change every day: a. static IP address. b. dynamic IP address. c. unique IP address. d. common name and number
a. static IP address.
Computer crime often goes unreported because businesses fear negative publicity. a. true b. false
a. true
In 2000 the U.S. government found Microsoft guilty of operating a monopoly. a. true b. false
a. true
The latest version of the Internet Protocol is IPv9. Answers: a. True b. False
b. False
A(n) ________ server maintains look-up tables that map domain names to IP addresses. a. DNS b. Web c. DHCP d. Ethernet
a. DNS
The system of satellites used to determine any position on the Earth is known as a. GPS. b. LAN. c. Wi-Fi. d. MAN.
a. GPS.
A DSL connection can share signals with a telephone line. Selected Answer: a. True b. False
a. True
Adobe Flash and Microsoft Silverlight both can be used to create media-rich Web components. a. True b. False
a. True
All e-mail addresses consist of a user name, followed by the @ sign, followed by a host address. a. True b. False
a. True
The digital divide separates people in the world with access to technology and digital information from those who do not. a. True b. False
a. True
To register a business name and create a unique URL, a business pays a fee that goes to ________. a. a domain name registry company b. the Department of Commerce c. Google d. Microsoft
a. a domain name registry company
A(n) ________ signal is represented by a continuous wave. a. analog b. digital c. bandwidth d. network
a. analog
In the Web address www.bbc.co.uk, "uk" is a(n) ________. a. country code b. protocol c. domain name d. file path
a. country code
The scrambling of code in an email message can be done using a. cryptography. b. programming. c. auditing. d. decryption
a. cryptography.
The name for harassment on the Internet is a. cyberstalking. b. cyberpersecution. c. cyberdenigration. d. cyberhounding.
a. cyberstalking
T1 and T3 connections are considered ________ connections. a. direct b. dial-up
a. direct
In 1999, the Melissa virus was a widely publicized a. email virus. b. worm. c. Trojan horse. d. time bomb.
a. email virus.
T1 connections transmit data at this speed: a. 1 Mbps. b. 1.5 Mbps. c. 45 Mbps. d. 1 Gbps.
b. 1.5 Mbps.
Which of the following is a legal IP address? a. 124.14.19 b. 144.12.18.8 c. 13.15.188.12.4 d. 123.44.1.14.1.55
b. 144.12.18.8
In what decade was ARPANET developed? a. 1950s b. 1960s c. 1970s d. 1980s
b. 1960s
The World Wide Web is a distributed browsing and searching system originally developed at ________. a. CSPAN b. CERN c. POTS d. Microsoft
b. CERN
Web authoring software includes all of the following EXCEPT ________. a. Microsoft Expression Web b. Adobe Dreamweaver c. Apple's iWeb d. Adobe Acrobat
d. Adobe Acrobat
In the 1970s, Xerox developed ________, which continues to be a popular networking architecture. Selected Answer: Incorrectc. extranet Answers: a. Wi-Fi b. the Internet c. extranet d. Ethernet
d. Ethernet
Unlike the Web protocol, the ________ protocol is designed solely to allow files to be transferred from a server to a client. a. HTTP b. HTTPS c. SMTP d. FTP
d. FTP
All of the following statements are true EXCEPT a. Wireless networks are convenient for people on the move. b. Wireless networks are easier to install because they don't require drilling or digging. c. Wireless networks use radio transmitters. d. Wireless networks are faster than wired networks.
d. Wireless networks are faster than wired networks.
URLs uniquely identify ________. a. a Web site b. an email address c. a computer d. a Web page
d. a Web page
Using Internet applications differs from using PC applications because the Internet is based on a ________ model. Answers: a. login b. distributed server c. digital server d. client/server
d. client/server
The following are all examples of broadband access EXCEPT ________. a. DSL b. cable c. satellite d. dial-up
d. dial-up
A ________ helps block unauthorized access to a computer. a. bridge b. VPN c. WEP d. firewall
d. firewall
According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds
d. two-thirds
According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds
d. two-thirds
Bluetooth technology can reach a range of 10 meters. Selected Answer: a. true b. False
true