CIS 150
When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.
Acceptable use policy (AUP)
___ is a security utility that protects your computer from various types of malware.
Anti-malware
A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done
Bridge
The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.
Data mining
Select three shared items that multiple users can instantly access on a network, then click Done.
Data, hardware devices, software applications
By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.
Decision support system (DSS)
Select three types of media that carry data from one node to another, then click Done
Fiber optic, twisted pair, coaxial
A____ is a node on a network that serves as an entrance to another network
Gateway
A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.
Hacker
The World Wide Web is a global system of linked, ______ documents. Select your answer, then click Done.
Hypertext
A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.
Intranet
Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates. Select your answer, then click Done.
Learning management system
Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.
NO
Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.
Network adapter card (NAC)
Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.
None
Data moves through networks in structures known as______. Select your answer, then click Done.
Packets
Select five ways to authenticate a user's identity.
Password or PIN, Code sent VIA text to phone, fingerprint iris or face scan, credit or debit card, employee badge
Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."
Password theft
______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.
Pay-per-click
The most popular method for file transfer today is known as ______ file sharing. Select your answer, then click Done.
Peer-to-peer (p2p)
The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.
Social media
The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.
Software, music, photos, artwork
______ can often use portions of copyrighted material under the fair use provision. Select the two correct answers, then click Done.
Students, educators
Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.
Surge protector
______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests. Select your answer, then click Done.
Third party
While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.
Trolling, flaming
Select four websites that are generally a credible source of accurate information, then click Done.
Trusted news organizations, government sites, press release from a well known company, news from research university
Websites are typically located or hosted on ______ servers. Select your answer, then click Done.
Web
Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites. Select your answer, then click Done.
World Press
A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.
Worm
Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.
Zombies
The domain name uniquely identifies a company or organization in a URL (uniform resource locator). Click on the URL's domain name, then click Done.
example.com
A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done
mission critical
Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.
office automation system
RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.
redundant array of independant discs
______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.
scalable
A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.
switch
The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.
threats
The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.
topology
A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.
trojan horse
A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.
wifi, wireless network, wireless lan