Computer Concepts Final Exam
The trend toward online collaboration is usually called workgroup computing. (T/F)
True
Tim Berners-Lee proposed the idea of the World Wide Web.
True
With a(n) peer-to-peer (P2P) network, a central server is not used. (T/F)
True
List at least five strategies for virus prevention. (essay)
- antivirus software to detect and eliminate computer viruses and other types of malware - control access to computers and networks - intrusion protection systems can help businesses detect and protect against DoS attacks - prevent programs from being installed without permission using security settings - use mobile security software to protect mobile devices
Describe what is a Malware and list 4 types of malware? (essay)
- any type of malicious software that is written to perform destructive acts - computer virus -- a software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system - computer worm -- a malicious program designed to spread rapidly by sending copies of itself to other computers via a network - Trojan horse -- malicious program that masquerades as something else, usually an application program - Mobile malware -- Primary goal is to obtainmobile banking credentials
Describe the importance of data integrity, security, and privacy and how they affect database design (essay)
- integrity -- Quality of data entered determines the quality of generated information -- Data validation refers to the process of ensuring that data entered into the database is valid - security -- protects data against destruction and misuse (both intentional and accidental) -- Protects against unauthorized access to and unauthorized use of a database and data loss - privacy -- addresses protecting the privacy of personal data stored in databases
What are the phases involved in program development? (essay)
- problem analysis -- specifications are developed and reviewed by systems analyst and programmer - program design -- program specifications are used to develop an algorithm - program coding -- writing the code using programming language - program debugging and testing -- ensures program is free of errors (bugs) and works as it is supposed to - program implementation and maintenance -- getting programmed installed and running and then updating software as needed
Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences. a. cookies b. blogs c. podcasts d. filters
A. COOKIES b. blogs c. podcasts d. filters
One common way to deal with spam that makes it to your computer is to use a(n) ____. a. e-mail filter b. war drive c. encryption scheme d. hot site
A. E-MAIL FILTER b. war drive c. encryption scheme d. hot site
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used. a. information privacy b. information security c. information piracy d. digital Counterfeiting
A. INFORMATION PRIVACY b. information security c. information piracy d. digital Counterfeiting
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network. a. network interface card (NIC) b. powerline card c. data communications card (DCC) d. USB
A. NETWORK INTERFACE CARD (NIC) b. powerline card c. data communications card (DCC) d. USB
Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement. (T/F)
False
Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more. (T/F)
False
The use of cookies provides no benefits to consumers. (T/F)
False
A(n) computer network is a collection of computers and other hardware devices connected together so that network users can share hardware, software, and data, as well as communicate with each other electronically. (T/F)
True
. ____________________ cable is the newest and fastest wired transmission medium. (F/I)
Coaxial cable
A bus network uses a central device (such as a server or a switch) to which all network devices connect and through which all network data is sent (T/F)
False
A(n) copyright is a word, phrase, symbol, or design (or a combination of words, phrases, symbols, or designs) that identifies and distinguishes one product or service from another. (T/F)
False
Direct Internet connections are much slower than dial-up connections. (T/F)
False
FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________ (T/F)
False
Security software protects devices against malware and other threats.(T/F)
True
Describe the star network topology (essay)
In local area networks where the star topology is used, each machine is connected to a central hub. The star topology allows each machine on the network to have a point to point connection to the central hub. All of the traffic which transverses the network passes through the central hub. Advantages: *Easy to install and reconfigure. *No disruptions to the network when connecting or removing devices. *Easy to detect faults and to remove parts. *Less expensive. *Includes robustness, that is, if one link fails, only that link is affected, other links remain active. Disadvantages: *If the hub fails, the whole system is dead. *If the hub, switch, or concentrator fails, nodes attached are disabled. *Requires more cable length than a bus topology. *More expensive than bus topologies because of the cost of the hubs, etc.
A(n) ____________________ is a private network, such as a company LAN, that is designed to be used by an organization's employees and is set up like the Internet. (F/I)
Intranet
Some monitoring systems in use today use the RFID tags and RFID readers to monitor the status of objects (such as shipping boxes, livestock, or expensive equipment) to which the RFID tags are attached. (T/F)
True
Structured programming embodies a top-down design philosophy. (T/F)
True
System failure can occur because of a hardware problem, a software problem, or computer sabotage.(T/F)
True
___________________ is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his or her Internet connection. (F/I)
Spyware
A government database is a collection of data about people that is collected and maintained by private industry. (T/F)
True
TCP/IP is the protocol used for transferring data over the Internet. (T/F)
True
In ____, data is sent when it is ready but all data must be delivered at the time that it is needed. a. synchronous transmission b. isochronous transmission c. asynchronous transmission d. endrosynchronous transmission
a. synchronous transmission B. ISCOCHRONOUS TRANSMISSION c. asynchronous transmission d. endrosynchronous transmission
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information. a. Framing b. Pharming c. Profiling d. Auctioning
a. Framing B. PHARMING c. Profiling d. Auctioning
____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies. a. Object-oriented programming (OOP) b. Structured programming c. Object programming (OP) d. Aspect-oriented programming (AOP)
a. Object-oriented programming (OOP) b. Structured programming c. Object programming (OP) D. ASPECT-ORIENTED PROGRAMMING (AOP)
____ is the use of networking technology to provide medical information and services. a. Telecommuting b. Remote medicine c. Telemedicine d. Remote health
a. Telecommuting b. Remote medicine C. TELEMEDICINE d. Remote health
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. a. Trojan horse b. hub c. firewall d. bridge
a. Trojan horse b. hub C. FIREWALL d. bridge
____ was originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service. a. Twisted-pair cable b. Fiber-optic cable c. Coaxial cable d. Single-wire cable
a. Twisted-pair cable b. Fiber-optic cable C. COAXIAL CABLE d. Single-wire cable
Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming b. object-oriented programming c. function programming d. virtual programming
a. aspect-oriented programming B. OBJECT-ORIENTED PROGRAMMING c. function programming d. virtual programming
The technique used for data sent over the Internet is ____. a. docket switching b. wideband switching c. packet switching d. data switching
a. docket switching b. wideband switching C. PACKET SWITCHING d. data switching
In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program. a. flowchart b. object c. algorithm d. module
a. flowchart b. object C. ALGORITHM d. module
A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a. logic error b. assembly error c. syntax error d. coding error
a. logic error b. assembly error C. SYNTAX ERROR d. coding error
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used. a. piracy policy b. security policy c. identity policy d. privacy policy
a. piracy policy b. security policy c. identity policy D. PRIVACY POLICY
A(n) ____ is a network designed to service an urban area, typically a city or county. a. supernet b. metropolitan area network (MAN) c. local area network (LAN) d. intranet
a. supernet B. METROPOLITAN AREA NETWORK (MAN) c. local area network (LAN) d. intranet