Computer Science Ch. 5 & 6 online test
offshoring
when companies outsource functions of another country it is referred to as:
turing test
which of the following is a popular test of a system's ability to think?
fair use
Copyright law contains an exception known as ___ which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission
Dashboard
Google allows users to view and control all their data with a tool known as:
FISA
Laws such as the patriot act and ___ give the U.S. government broad surveillance powers
footprints
You and your devices usually leave digital ___ which is a trail of your data, activity, and even the locations where devices are used
fault-tolerant
___ computers are able to continue their operation even when problems are present
redundant
___ computers are ones that have multiple hardware systems performing the same task at the same time
SEO
___ involves improving the ranking of a website when users enter relevant keywords in a search engine
phishing
___ involves luring individuals into entering personal information into a website controlled by the hacker
Nanotechnology
___ involves the creation or manipulation of matter at the smallest possible scale
spyware
___ is a type of malware which is designed to report activity on your computer to another party
data mining
___ is discovery of new patterns or relationships between data
wireless
___ networks use radio signals that travel through the air to transmit data
strong
___ passwords are long and generally use a mix of upper and lower case letters
attenuation
___ refers to the loss of intensity and clarity of the data signal being transmitted
DDoS
a ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests
quantum
a ___ computer can represent data in states beyond the two bits (0's and 1's) of today
software engineer
a ___ is responsible for the development of computer software
repeater
a ___ is used to prevent attenuation when packets are traveling long distances
router
a ___ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination
keyloggers
a type of spyware known as ___ can record the individual keystrokes of a user
cybercrimes
actions ranging from creating viruses to disrupting computer networks are often referred to as:
surge protector
an ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur
countermeasure
any step you take to ward off a threat is called a:
Which of the following is NOT one of the three questions that potential whistleblowers should ask themselves?
can the exposure
mission-critical
certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure
zombies
computers which are under the external control of a hacker are known as:
packets
data moves through networks in structures known as ___ which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device
bandwidth
for modern networks ____ is measured in either megabits per second (Mbps) or gigabits per second (Gbps)
paperless
many companies and individuals are going ___ which means they are using technology to lower their consumption and reliance on paper
NSA
many government agencies, such as the ____ monitor the internet and mobile activities of individuals all over the world
encryption
many types of software and devices use ___ to scramble your data of communication
FAQ
many websites have an ___ area that should be checked for common questions and their responses
cyberterrorism
no form of hacking is as dangerous as ___ which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure
protocols
systems follow certain rules or ___ to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed
backups
very few countermeasures are as effective as ___ which can help you recover data that was lost to almost any type of threat