CGS 2060 final SG
Select the advantages of using a database instead of a traditional filing system.
-A database can hold larger amounts of data -A database can provide better data integrity
Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).
-Allow cookies. -Delete cookies. -Block cookies.
Select the cell phone manufacturers.
-Blackberry -Xiaomi -Huawei
Select the common Internet transmission media.
-Coaxial cable -Telephone wire -Cell phone radio waves
Cyberattacks include
-DDoS attacks -identity theft
Select the following statements that are true regarding filters.
-Filters limit the material browsers fetch. -Parents often use search engine filters to restrict offensive images from being displayed on computer monitors. -Filter settings are often accessed through a browser's preferences
Which of these devices are manufactured by Samsung?
-Galaxy -Note
Which of these operating systems is based on Linux and used on smartphones
Android
If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.
CTRL
Sage was developed during the _____ war.
Cold
The Internet service that tends to provide the most consistent speeds is _____.
DSL
The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.
Data Administration
A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.
Distributed
A collection of related records in a database is referred to as a _____.
Table
Select the domain name.
mheducation.com
The word modem stands for ____.
modulator-demodulator
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .
players
Contact your ISP if your actual Internet speed is _____ than advertised.
slower
An unsolicited email message is called _____.
spam
Software that infects a computer and is created using computer code is called a computer _____.
virus
Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.
wifi hotspot
Select what's true about the privacy risks with cookies.
-Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?
-What field name will the data fall under -What data type will be included
Identify what's true about script kiddies.
-amateur computer hackers with little programming expertise -illegally gain access to computer systems using programs (scripts) that others have written
You can change your Firefox settings to allow you to
-approve cookie storage requests. -deny cookie storage requests. -delete stored cookies automatically when you start Firefox.
There are a variety of cookie settings that can be adjusted in Google Chrome including
-blocking/allowing cookies by default. -deleting cookies. -making exceptions for cookies from specific websites or domains.
Select what's true regarding dual band routers.
-can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals in the 5.0 GHz frequency range -minimizes the impact of interference from microwave ovens and car alarms
Select the characteristics of a router.
-connects networks -provides hardware firewall protection -usually incorporates a switch
Identify common symptoms of a computer virus.
-documents won't save -computer runs extremely slowly -programs launch on their own
Rootkits allow a remote user to do which of the following.
-install rogue files -create backdoor programs -delete files
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of
-keystrokes. -passwords. -confidential information.
Select the advantages of a 3G phone
-more energy efficient - battery lasts longer -less expensive
Select the statements that are true regarding Cellular Internet service.
-uses cell phone radio waves to transmit and receive Internet signals -Many providers offer data packages that may place limits on uploading and downloading. -Many smartphones can send and receive WiFi signal, allowing them to become hotspots.
Select the statements that are true regarding Satellite Internet service.
-uses microwaves to deliver service -provides broadband service virtually anywhere -Customers usually purchase a data plan that limits uploading and downloading.
Select the statements that are true regarding DSL Internet service.
-uses telephone wires as transmission wires -Internet signals tend to be very consistent
Common types of malware include______ .
-viruses -worms -Trojan horses
Which of the following file extensions is commonly used for term papers and other word processing tasks?
.docx
Which of these extensions, if you open it, will probably install software onto your computer? Be careful!
.exe
Which of the following file extensions is commonly used for drawings?
.gif
Select the common video file formats.
.mov .avi
Select the common audio file formats.
.mp3 .mp4 (M4A) .wav
Select the common word processing file extensions.
.odf .docx
1) Modem 2) Router 3) MAC address 4) Switch
2) connects two networks 3) identifies a device within a network 1) converts analog signals into digital signals and digital signals into analog signals. 4) connects devices within a network
1)The distribution of computer applications over the Internet. Commonly referred to as web apps. 2) A programming environment used to develop, test, and disseminate web apps via the Internet. 3) An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.
3) IaaS 2) PaaS 1) SaaS
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
File Explorer
A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .
File Transfer Protocol
Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .
HDX
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.
Management
When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.
Manipulation
Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .
OneDrive
Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .
Organize
To search a database for information, create a ___ .
Query
The type of database that uses common fields to create links between tables is called a ___ database.
Relational
A link between tables in a relational database that defines how the data is related is called a _____.
Relationship
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .
Safari
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.
Trojan horse
To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .
View
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .
WPA
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
Which might be a choice for Internet service in your area?
cable Internet
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
cube
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberterrorist
Which of the following would be considered a cybercrime?
data manipulation
SAGE was developed by the US Department of ___ .
defense
The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .
digital - analog converters
A ___ name identifies a server site on the Internet.
domain
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
double-click
Which transmission media has the largest bandwidth?
fiber optic
A URL identifies a particular __ address on the World Wide Web.
file
A security system separating 2 networks or even computers on the same network is called a ___ .
firewall
In order to keep your files organized, it's a good idea to create ___ and place your files in them.
folders
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
individual users
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
internet
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
large
Fiber optic cable is _____ expensive than coaxial cable to install.
more
The BitTorrent protocol is often called ___ file sharing.
peer-to-peer
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.
right-click
An easy way to rename a folder in Windows is to ___ -click on the folder and then click Rename.
right-click
The device that connects 2 networks is a _____.
router
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .
script kiddies
ISP stands for:
Internet Service Provider
The World Wide Web was created through a collaboration led by ___ .
Tim Berners-Lee
In order to change sound waves into digital signals, smartphones contain ___ - digital converter.
analog
Which of the following should be considered when choosing an ISP?
-How many users will be logged on my network at the same time? -Will user's be streaming data? -What ISP choices are available in my area?
Which of the following are true regarding IP addresses?
-IP stands for Internet Protocol. -In most home networks IP addresses are assigned by the Internet Service Provider. -If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.
Which of the following are ways to prevent computer virus infections.
-Install the latest antivirus software and update frequently. -Downloaded content from the web should only be from trusted sites. -Limit your web surfing to trusted sites.
Select what's true about packet sniffers.
-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information.
Check all the activities that would be considered uploading a file to the Internet.
-Posting a photo on social media. -Placing an ad on Craigslist. -Posting a YouTube video.
Which of the following are common email viruses.
-Ransomware -keystroke logging Trojan
Select the sites that offer Internet speed test services.
-Speedtest.net -TestMy.net
Select what's true about passwords.
-Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. -Regularly check your accounts to ensure they have not been tampered with.
Select the major U.S. cell phone providers.
-Verizon -ATT -T-Mobile -Sprint