CIS Midterm
A collection of millions of web sites
World Wide Web
T/F - A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
False
T/F - Correctly installed antivirus software will prevent all intrusions
False
T/F - It is not possible to encrypt a windows hard drive volume
False
T/F - ROM is temporary and volatile, RAM is more permanent and non-volatile
False
T/F - Search history is the same as browser history
False
T/F - The web is synonymous with the internet
False
T/F - Your search history is the same as your browser history
False
A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus. (signature, payload, hoax, dropper)
Hoax
Applications that run on smartphones and tablet computers
Mobile Software
T/F - A Solid State Drive can be used as a substitute for a hard drive disk
True
T/F - A copyright holder has complete control over how a work may be used
True
T/F - A hard disk drive is an example of magnetic storage
True
T/F - Any data entering digital a device could be malware
True
T/F - Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.
True
T/F - In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.
True
T/F - In some academic settings, Wikipedia is not regarded as a reliable source of info
True
T/F - Lossy compression techniques discard some data from an image and shrink its file size
True
T/F - Most computer ads specify the speed of a microprocessor in gigahertz
True
T/F - Plain, unformatted text is sometimes called ASCII text
True
T/F - Processing is handled by a computers central processing unit (cpu)
True
Compressed files normally have a ______ at the end of the filename (.zip, .exe, .txt, none of the above)
.zip
Digital audio is stored in a variety of file formats, including ___________. (MP3, WAV, WMA, all of the above)
All of the above
Which is a component of a search engine? (Web Crawler, Indexer, Query Processor, all of the above)
All of the above
The best defense against malware is____________.
Antivirus Software
Commonly held expectations of privacy include which of the following? (Freedom from intrusive surveillance, the expectation that individuals can control their own personally identifiable information, both of the above, neither of the above)
Both of the above
Which of the following would be considered essential software for both laptop computers and a tablet computer? (Word processor, VoIP client, Office Suit, browser)
Browser
A group of eight bits
Byte
Which of the following is considered a form of spyware? (antivirus ware, keylogger, firewall, all of the above)
Keylogger
Applications that are installed on your computer's hard drive
Local Software
The first graphical web browser released in 1993
Mosaic
Which type of software must include the source code, which allows programmers to modify and improve the software? (Software, hardware, open source)
Open Source
Applications that are stored on and run from removable storage devices like CDs, DVDs, or Flash Drives
Portable Software
Which is considered to not be intellectual property (Trademark, Copyright, Patents, Public Domain)
Public Domain
Which of the following is the technique for improving the ranking and visibility of a Web site? (Search engine indexer, query processor, link popularity, search engine optimization)
Search engine optimization
Which of the following is a VoIP service? (Snapchat, Facetime, Google Talk, All of the above)
Snapchat, Facetime, Google Talk
_____________ are online services that facilitate communication and interaction among people who want to share information. (Email, Crowd Sourcing, Social Media, Geolocation)
Social Media
Another term for Short Message Service (SMS), messages of less than 160 characters sent via a cellular network
Text Message
A hypertext markup language (html) document
Web Page
A collection of related web pages connected by hyperlinks
Web Site
Applications that you can access over the internet
Web-Based Software