CIS 150

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. Select your answer, then click Done.

Acceptable use policy (AUP)

___ is a security utility that protects your computer from various types of malware.

Anti-malware

A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done

Bridge

The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.

Data mining

Select three shared items that multiple users can instantly access on a network, then click Done.

Data, hardware devices, software applications

By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.

Decision support system (DSS)

Select three types of media that carry data from one node to another, then click Done

Fiber optic, twisted pair, coaxial

A____ is a node on a network that serves as an entrance to another network

Gateway

A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.

Hacker

The World Wide Web is a global system of linked, ______ documents. Select your answer, then click Done.

Hypertext

A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.

Intranet

Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates. Select your answer, then click Done.

Learning management system

Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.

NO

Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.

Network adapter card (NAC)

Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download? Select the your answer, then click Done.

None

Data moves through networks in structures known as______. Select your answer, then click Done.

Packets

Select five ways to authenticate a user's identity.

Password or PIN, Code sent VIA text to phone, fingerprint iris or face scan, credit or debit card, employee badge

Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."

Password theft

______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.

Pay-per-click

The most popular method for file transfer today is known as ______ file sharing. Select your answer, then click Done.

Peer-to-peer (p2p)

The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.

Social media

The Internet has increased the piracy of intellectual property such as ______ and many other creative works. Select all that apply, then click Done.

Software, music, photos, artwork

______ can often use portions of copyrighted material under the fair use provision. Select the two correct answers, then click Done.

Students, educators

Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.

Surge protector

______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests. Select your answer, then click Done.

Third party

While not illegal, many unethical behaviors such as ______ affect online users. Select the two correct answers, then click Done.

Trolling, flaming

Select four websites that are generally a credible source of accurate information, then click Done.

Trusted news organizations, government sites, press release from a well known company, news from research university

Websites are typically located or hosted on ______ servers. Select your answer, then click Done.

Web

Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites. Select your answer, then click Done.

World Press

A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.

Worm

Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.

Zombies

The domain name uniquely identifies a company or organization in a URL (uniform resource locator). Click on the URL's domain name, then click Done.

example.com

A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done

mission critical

Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.

office automation system

RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.

redundant array of independant discs

______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.

scalable

A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.

switch

The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.

threats

The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.

topology

A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.

trojan horse

A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.

wifi, wireless network, wireless lan


Set pelajaran terkait

AP US History vocabulary chapter 6 Making War and Republican Governments, 1776-1789

View Set

Introduction to Shielded Metal Arc Welding (SMAW)

View Set