CGS Final
relationship
A link between tables in a relational database that defines how the data is related is called a _____.
0-1
A smartphone emits approximately ___ watts of microwaves.
300 hours
According to youtube approximately how much video is uploaded to its site every minute
settings
After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.
right click
An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.
dictionary
An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .
700 MB
CDs provide approximately _______ of data storage space
microwaves
Cell phones send and receive extremely weak ___ signals to and from cell towers.
corruption
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
internet service provider
ISP stands for
restore
If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .
3G
If you just need a phone for calling and texting, a ___ phone can save you money.
prepaid
If you just need a phone for emergencies, you might consider a ___ phone.
Keep software updated, particularly antivirus software. Physically secure computers to minimize risk of theft. Backup your data regularly
If you own a small business, what can you do to ensure your computers and data is kept secure?
roaming
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___
field
In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.
folders
In order to keep your files organized, it's a good idea to create ___ and place your files in them.
A database can hold larger amounts of data A database can provide better data integrity
Select the advantages of using a database instead of a traditional filing system.
developed by Apple for Apple products used on iPhones and iPads comes with Siri, iTunes, iBooks, etc.
Select the characteristics of the IOS.
.mov, .avi
Select the common video file formats.
reduce the bandwidth needed to transmit a file reduce storage space requirements
Select the reasons for compressing a file.
Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS
Select the usual tasks of information systems (IS) program managers.
Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database
Select what's true about object-oriented databases
logical
The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.
Tim Berners-Lee
The World Wide Web was created through a collaboration led by
True
The amount of RAM a computer comes with or the ability to expand its RAM is an important consideration when buying a new device
True
The android OS is owned and maintained by google
top level domain
The highest level in the domain name hierarchy is known as the
data
The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.
signal
The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.
Right-click a folder in the folders list. Click New and then click Folder. On the command bar, click New folder. Right-click any blank area in the Contents pane. Click New and then click Folder.
There are several ways to create a new folder in Windows. Which of these would work?
On the command bar, click Organize and then click Rename. Right-click a folder and click Rename. Click the folder icon and press F2 to activate the edit mode.
There are several ways to rename a folder in Windows. Which of these would work?
view
To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .
forms
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
players
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
Query
To search a database for information, create a ___ .
gigabytes
Typical SSD capacities for tablet computers or smartphones are measured in
double-click
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
application
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
gif
Which of the following file extensions is commonly used for drawings?
.docx
Which of the following file extensions is commonly used for term papers and other word processing tasks?
file explorer
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
save as
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
webcam
a camera that takes photos or streams video into a computer or over the internet is called a
true
a computer platform is commonly referred to as an operating system or OS
worm
a destructive program that replicates itself throughout a single computer or across a network is called a
wire-wire
a form of email fraud where criminal change the account where money is being transferred is called a _______ scam
zip
a lossless compression format
cyberterrorist
a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a
cookie
a small text file or information created by websites you visit that your web browser stores on your hard disk is called a
MAC
a switch distinguishes between various devices within a network by their ________ addresses
pharming
a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called
In Outlook express, you can create a new message and drag and drop the phishing email into the new message. address the message to [email protected] and send it In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected].
according to US-CERT if you receive a phishing message you should contact them using which of the following methods
post vacation photos to show your friends where you travelled
all of the following are best practices when using linkedin except
high frequency RFID can transmit signals further than 1500 feet
all of the following are true about RFID except
script kiddies
amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs that others have written are called
DDos
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack
Mbps
broadband is measured in
you have several devices online at the same time you need relatively high-speed internet service you want wi-fi in your home
choose the reasons for purchasing broadband internet service
viruses, worms, trojan horses
common types of malware include
persistent
cookies stored on a computers hard drive and used to collect and store information about user preferences, password and username information, IP address, and or data on web surfing behavior are called _______ cookies
identity theft, DDos attacks
cyberattacks include
From and/or subject lines
determines if the email will be opened
JPEG, PNG
image compression formats
below
inkjet printers are often sold _____ their production cost
True
many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos
magnetic hard drives
most desktop computers use ______ to store data
SSD
most tablets and phones use________ as their main storage device
white hat hackers
non malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called
trojan horse
often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a
data is only available when you're online
one disadvantage of cloud storage is that
user preferences
persistent cookies store information about
close
professionally ends the message
lossless
reduces space required by reducing redundancy within files
lossy
reduces space required by removing less valuable data
listening to pandora, watching a youtube video, watching a movie on Netflix
select examples of streaming
usb drive has shorter access time usb drive is more durable usb drive is more accurate
select the advantages of using a USB instead of a DVD
redundancy, availability
select the advantages of using cloud storage
pet identification, package tracking, inventory tracking
select the current uses for RFID tags
legitimate sniffers are used for routine examination and problem detection, unauthorized sniffers are used to steal information
select what is true about packet sniffers
salutation
sets the tone of the message
10
snaps on snapchat can be viewed up to _____ seconds depending on what the user chooses and then disappears
body
succinctly discusses the purpose of the message
hacktivism
the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called
bandwidth
the capacity of a particular transmission medium is called its
router
the device that connects 2 networks is a
cyberattack
the malicious use of computer code to modify the normal operations of a computer or network is called a
bit
the smallest unit of data storage is a
WPA
the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as
the main governmental organization that oversees internet privacy is the federal _____ commission
trade
thumb drives, flash drives
what are some commonly used names for USB drives
EDI
what technology allows for the electronic communication of business oriented transactions and information between people and organizations
software piracy
when copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called
be brief and direct state only what you witnessed
when reporting a computer ethics violation of a co-worker to your employer, its important to
Ransomware, keystroke logging trojan
which of the following are common email viruses
most widely used OS for smartphones and tablets
which of the following is a strength of the android platform
free to download and use
which of the following is a strength of the linux platform
cyberstalking and online predators are a real problem on facebook
which of the following statements about facebook is true
data manipulation
which of the following would be considered a cybercrime
true
you must individually adjust cookie settings in every browser you use