ITEC FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Consisting of a network of 500 sensors used to collect data to improve quality of life, The array of Things in the city of ___ feeds data such as pollution levels and traffic patterns to an open site on the internet.

Chicago

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

The internet service that tends to provide the most consistent speeds is

DSL

A separate processor (computer) in your computer that enhances your video is called the ___ .

Graphic Processor (GPU)

Which of the following is NOT true about the privacy risks with cookies.

Hackers can use cookies to launch attacks on your computers.

A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a _____.

LAN

Which of the following is NOT example of management information systems (MIS) _____

MBA

The Da Vinci robot, named after the famous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow ___ to perform intricate procedures.

surgeons

copyright protection varies from nation to nation

true

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

Which of the following is a strength of the Windows platform?

wide availability of software options

The protocol for wireless networks is called ___ .

wifi

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

wifi hotspots

A computer controlled by a hacker is called a _____.

zombie

Data flows between different parts of the computer via _____ .

Buses

The DMCA was to create an updated version of ___ laws to deal with the issues of regulating digital material.

Copyright

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas

ICARUS

Which of the following is NOT the examples of uploading files.

printing a document

A virtual _____ network (VPN) creates a secure connection between 2 computers.

private

Which of the following statements that are NOT true regarding switches

the primary function of a switch is to connect 2 networks

Which of the following statements that are NOT true regarding cable Internet service.

uses same twisted pair line

Software that infects a computer and is created using computer code is called a computer _____.

virus

When talking about business decision making, the acronym BDA stands for _____.

Big Data Analytics

A short-range wireless transmission protocol is known as _____ .

Bluetooth

A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers.

Network

What manages hardware and software, supports the computer's basic functions, and runs programs?

OS

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Overclocking

Unlike circuit switching, data transfer with ___ doesn't rely on a dedicated physical path.

Packet Switching

Software comes in various categories. One category is system software, which provides the instructions that hardware needs to operate (iOS, Android, Windows, etc.). Another category is game software (League of Legends, Hearthstone, Angry Birds, etc.). Another category of software includes applications such as Office 365, iWork, QuickBooks, Googledocs, etc. This software is referred to as ___ software.

Productivity

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.

Quantum

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

RAM

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .

ROM

Joe's boss said she wanted to host a synchronous online video conference. Joe knows that synchronous means that ___ .

The conference will take place in real time

URL stands for ___ Resource Locator.

Uniform

One advantage of using a web-based Email service, such as Gmail, is that ___ .

Users can access it from nearly any Internet-connected device.

When two or more LANs have been connected using a public network a _____ is created.

WAN

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

Which of the following is NOT needed to install a home WiFi network?

a bluetooth device

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system.

authentication

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.

bit

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.

control

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

Which of the following statements about Facebook is true?

cyberstalking and oline predators are real problem

Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.

diabetes

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

dual band

_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.

employee-monitoring

Which transmission media has the largest bandwidth?

fiber optic

A security system separating 2 networks or even computers on the same network is called a ___ .

firewall

Which of the following is a strength of a Linux platform?

free to download and use

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

holographic

All of the following are true about Instagram except

instagram charges fee to download

__ consists of human knowledge and ideas that the law protects against unauthorized use by others.

intellectual property

isp stands for

internet service provider

Which of the following are NOT ways to prevent computer virus infections.

leaving thumb drives and dvds in your computer when you restart it

Be careful to only open emails from senders you know and trust. ____ may be contained in email messages

malware

Select what is NOT true regarding applets.

not included with the operating system

Which of the following is NOT characteristics of a modem.

often transmits bluetooth signals

A computer platform is commonly referred to as a _____ system or OS.

operating system

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system, OS

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

Software that can be added to a browser to increase its functionality are called ___ .

plugins

Which of the following is NOT considered cybercrimes?

pop-up advertising

All of the following are best practices when using LinkedIn except

post vacation photos to show friends where youve travelled

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .

radiologists

Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ .

self-driving trucks

Data from the hard drive reaches the CPU ___ than data from the RAM.

slower

An unsolicited email message is called _____.

spam

Which of the following is NOT common types of malware ______ .

spam


संबंधित स्टडी सेट्स

A & P 142 The Endocrine System Penrod - CVCC

View Set

Chemistry- 4.3: Formation of Ionic Compounds notes/ Questions

View Set

AP World History - Chapter 18 <Study Guide>

View Set

structure and function of chloroplast

View Set

Chapter 4 Life Insurance Missed Questions

View Set

1.2 How Are Our Ecological Footprints Affecting Earth?

View Set