computer app mod 1 part 2
In 1969, the Advanced Research Project Agency (ARPA) of the U.S Department of Defense created ______, a network that connected computers at four universities in the western United States.
ARPANET
When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
AUP
Trey is having coffee in a cafe. Is it safe for him to transmit financial data using the restaurant's free Wi-Fi? Select your answer, then click Done.
NO
n 1986, the National Science Foundation (NSF) created a new high speed network called _____ that brought all the networks together, creating a "network of networks," otherwise known as the young Internet. Select your answer, then click Done.INSTRUCTION: In 1986, the National Science Foundation (NSF) created a new high speed network called _____ that brought all the networks together, creating a "network of networks," otherwise known as the young Internet.
NSFNET
Select an app that makes it easy for anyone to rent out empty rooms in their house. Select your answer, then click Done.
airbnb
The Internet has increased the piracy of intellectual property such as ______ and many other creative works
all
Web browsers help you find and retrieve a web page. Click on four types of web browsers
all but marketplace
Select three shared items that multiple users can instantly access on a network, then click Done.
all but personnel files
Select five ways to authenticate a user's identity.
all but registered letter
Select three types of media that carry data from one node to another, then click Done.
all but tv cable
Select four websites that are generally a credible source of accurate information, then click Done.
all except facebook and wiki
_____ is one of the most popular business to consumer (B2C) websites and also the web's largest store. Select your answer, then click Done.
amazon
___ is a security utility that protects your computer from various types of malware.
antimalware
If you visit a website or page that you would like to remember for the future, you can add it to your browser's list of ______ or favorites
bookmarks
A ______ is a device that connects two LANS or two segments of the same LAN. Select your answer, then click Done.
bridge
Select three ways you can connect to the internet,
broadband, dial up, mobile
Click on the part of the window where you would enter the email addresses of individuals other than your primary recipient
cc
The Center for Disease Control and Prevention uses ______ to discover new patterns or relationships between data that might signal a possible outbreak. Select your answer, then click Done.
data mining
By compiling data from a data processing system, a manager can use a ______ to generate specific reports than she can use to make mission-critical decision. Select your answer, then click Done.
decision support
Who regulates or censors the content on the Internet?
each country's gov
Electronic mail, commonly called ______, is a system for exchanging messages through a computer network.
A ______ uses radio signals that travel through the air to transmit data. Select the three correct answers, then click Done.
everything but fiber optic cable
The domain name uniquely identifies a company or organization in a URL (uniform resource locator).
example
While not illegal, many unethical behaviors such as ______ affect online users.
flaming and trolling
A ______ is a node on a network that serves as an entrance to another network. Select your answer, then click Done.
gateway
Click on the most popular search engine, then click Done.
A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks. Select your answer, then click Done.
hacker
The World Wide Web is a global system of linked, ______ documents.
hypertext
Whenever your operating system or browser issues a software update, you should apply it___.
immediately
Anita is buying airline tickets for her family. Instead of communicating via email, Anita should use ______ so that she gets replies from her family members immediately.
instant messaging
Whether it's dial-up, broadband, or mobile, every type of Internet service requires a connection to a(n) ______.
internet service provider
A(n) ______ uses the same software and service structure as the Internet, but it only contains a company's private information and is only accessible inside a company's building. Select your answer, then click Done.
intranet
Many online classes use a ______ to complete exams, turn in work, and communicate with their instructor and classmates.
learning management system
A coworker told Connor that he saved the files he needed to the server on the network. What is a network? Select your answer, then click Done.
linked computers
Gigi just started looking for a job. What should she do to make sure that she has a good online presence when employers are searching for her
linkedin and delete bad posts
A ______ computer system in a hospital must run without failure or with nearly instant recovery from failure. Select your answer, then click Done.
mission critical
Select three types of streaming media that are delivered on demand from an online source
music, tv, movies
Also known as a ______, the network interface card (NIC) translates and transmits packets at each node. Select your answer, then click Done.
network adapter card
Gigi found a website where she downloads expensive applications and media for free. Which of the copyrighted items are okay to download
none
Many organizations use a(n)______ to manage information and help users handle certain information-related tasks more efficiently. Select your answer, then click Done.
office automation
The most popular method for file transfer today is known as ______ file sharing
p2p
Data moves through networks in structures known as______. Select your answer, then click Done.
packets
Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."
password theft
______ is an advertising model where advertisers pay for their ads only when a website visitor clicks on the ad to go to the advertiser's site. Select your answer, then click Done.
pay per click
______ is a feature that will delete your history, cache and cookies the moment you close the private windows.
private browsing
RAID is a ______ that acts as a storage system linking disk drives so they act as a single disk. Select your answer, then click Done.
redundant disks
______ systems allow organizations to increase computing power, storage, and software without buying a new computer system. Select your answer, then click Done.
scalable
The term ______ refers to the tools and services on the Internet that allow anyone to create and share different types of information. Select your answer, then click Done.
social media
______ can often use portions of copyrighted material under the fair use provision
students and educators
Select the item that protects equipment against large power spikes or surges that may infrequently occur. When you are finished, click Done.
surge protector
A ______ is similar to a hub except it transmits packets directly to specific nodes instead of rebroadcasting in all directions like a hub. Select your answer, then click Done.
switch
______ cookies are typically created by marketing and advertising companies to generate ads that better target your interests
third party
The entire purpose of computer security is to eliminate or protect against ______. Select your answer, then click Done.
threats
The ______ of a network is the logical layout of the cables and devices that connect the nodes of the network. Select your answer, then click Done.
topology
A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Select your answer, then click Done.
trojan horse
Many people that work from home use ______ to conduct meetings with coworkers located in various locations
videoconferencing
Websites are typically located or hosted on ______ servers.
web
Christine created a website for her small business using ______, a popular blogging tool that many individuals and companies use to create websites
wordpress
A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.
worms
Teddy wants to create a music video and post it online. Where should she post her music video so she can share it with the world?
youtube
Computers infected and compromised with malware are known as______ because they are under external control of a hacker. Select your answer, then click Done.
zombie