computer concepts chapters 4 & 5
What is another name for public key encryption?
asymmetric key encryption
What is the term for a program that performs a repetitive task on a network?
bot
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?
cyberterrorist
Ghosting is a severe problem with today's displays.
false
If a program or device has a default password, be sure to retain it.
false
Many businesses use spyware to limit employees' web access.
false
One way to reduce electrical waste is for organizations to consolidate servers by user concatenation.
false
PINs are not the same as passwords.
false
Passwords and passphrases that are more than four characters, contain uppercase and lowercase letters, numbers, and special characters are the most secure.
false
Perpetrators of back doors trick their victims into interacting with phony websites.
false
How much do fingerprint readers typically cost?
less than $100
A(n) ____________________ agreement is the right to use software.
license
The PATRIOT Act gives law enforcement the right to monitor people's activities, including web and email habits.
true
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
IP
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user's inbox?
anti spam
____________________ involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks.
digital-forensics
Video editing software allows professionals to modify a segment of a video, called a clip.
true
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
DTP
A(n) ____________________ is a wireless network name, which you should change from the default to something that uniquely identifies your network, like the kind in the accompanying figure, especially if you live in close proximity to other wireless networks.
SSID (service set identifier)
To prevent unauthorized access and use, at a minimum a company should have a written ____________________ that outlines the activities for which a computer or network may and may not be used.
acceptable use policy (AUP)
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
access
A(n) ____________________ is used to make users more productive and/or assist them with personal tasks.
application or app
Many desktop and mobile apps use a(n) ____________________ feature, where the changes to the apps can be configured to download and install automatically.
automatic updates
Which of the following is a program or set of instructions in a program that allows users to bypass security controls?
back door
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
backup
A(n) ____________________ device authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
biometric
____________________ software is an application that helps you organize your calendar, keep track of contacts, and share this information with other devices or users.
calendar and contact management
Which of the following is an authorized person or company that issues and verifies digital certificates?
certificate authority
Employers and schools often specify standards for the ethical use of technology in an IT ____________________ and then distribute these standards to employees and students.
code of conduct
Many businesses use which of the following to limit employees' web access?
content filtering
Which type of individual may steal credit card numbers to make fraudulent purchases?
corrupt
____________________ software performs functions specific to a business or industry.
custom
The term ____________________ describes an attack whose goal ranges from disabling a government's computer network to crippling a country.
cyber warfare
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
database
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
decryption
A(n) ____________________ signature is an encryption code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
digital
A(n) ____________________ is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
disaster recovery plan
Which of the following tools searches for and removes unnecessary files?
disk cleanup
To ____________________ a document means to make changes to its existing content.
edit
What kind of application teaches a particular skill?
educational
____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.
encryption
Analog signatures help to prevent email forgery.
false
Biometric objects are entirely foolproof.
false
Buying a collection of programs in a software suite usually costs significantly more than purchasing them individually.
false
COPPA requires that schools and libraries use content filtering software in order to receive certain federal funds.
false
Distributing programs outside the terms of a license agreement is a violation of copyright law but is not a federal crime.
false
Document management software allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
false
Phishing is an unsolicited email message or newsgroup posting sent to many recipients or newsgroups at once.
false
Software registration typically is required for the use of the application.
false
The ECPA protects consumers from disclosure of their personal financial information and requires institutions to alert customers of information disclosure policies.
false
Which of the following kinds of file utilities shrink the size of a file(s)?
file compression
Which of the following (with examples such as the bold, italic, and underline shown in the accompanying figure) adds emphasis to a font?
font style
When computer users ____________________ a project, they change its appearance.
format
Which of the following performs calculations on the data in a worksheet like the one in the accompanying figure and displays the resulting value in a cell?
formula
A(n) ____________________ is a predefined formula that performs common calculations such as adding the values in a group of cells.
function
Application software often includes an image ____________________, which is a collection of clip art and photos.
gallery
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
____________________ occurs when someone steals personal or confidential information.
information theft
A(n) ____________________ is a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device.
media player
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
network
Which of the following terms means in a location separate from the computer site?
off site
With a three-generation backup policy, the grandparent is which of the following?
oldest copy of file
A(n) ____________________ is a web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities.
online security service
____________________ software is provided for use, modification, and redistribution and usually can be downloaded from the web at no cost.
open source
Computer viruses like the kind in the accompanying figure—along with worms, and Trojan horses—deliver their ____________________ on a computer or mobile device when a user opens an infected file or runs an infected program.
payload
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
phishing
____________________ software is free software, but it has been donated for public use and has no copyright restrictions.
public domain
Which of the following is a request for specific data from a database?
query
A(n) ____________________ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or devices.
rootkit
With which of the following do users choose which folders and files to include in a backup?
selective backup
____________________ is copyrighted software that is distributed at no cost for a trial period.
shareware
____________________ is the unauthorized and illegal duplication of copyrighted software.
software piracy
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
spoofing
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files to their original location on a computer?
they restore the files
A rootkit can be a back door.
true
As shown in the accompanying figure, most operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer, mobile device, or network.
true
Backup tools work with a restore tool.
true
Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights.
true
FOIA enables public access to most government records.
true
If you are nervous, a signature might not match the one on file in a signature verification system.
true
Many Internet security programs include a firewall, antivirus program, and filtering capabilities combined.
true
Many users opt for electronic distribution of documents because it contributes to green computing.
true
Most television shows and movies are created and enhanced using video and audio editing software.
true
Professional DTP software is ideal for the production of high-quality color documents such as textbooks, corporate newsletters, marketing literature, product catalogs, and annual reports.
true
Software developers typically cannot incorporate freeware in applications they intend to sell.
true
Some shareware developers render their software useless if no payment is received after the trial period expires.
true
The Computer Abuse Amendments Act outlaws transmission of harmful computer code such as viruses like the kind shown in the accompanying figure.
true
The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
true
To protect yourself from social engineering scams, shred all sensitive or confidential documents.
true
Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing.
true
When users press a key or move the mouse, a screen saver disappears and the screen returns to the previous state.
true
With web apps, you always access the latest version of the software.
true
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?
value
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
website authoring
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
QR code
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
CAD
Which of the following is a federally funded Internet security research and development center?
CERT/CC
____________________ typically consists of self-directed, self-paced instruction on a topic.
CBT (computer based training)
Into which of the following kinds of ports do external fingerprint readers plug?
USB
Which of the following provides the mobile user with a secure connection to the company network server?
VPN