computer science final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which operator is used to return search results that include two specific words?

AND

Wi-Fi networks used in homes and public hotspots use the ________.

IEEE 802.11

For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

LAN

A router is a form of security because it ________.

acts like a firewall

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.

add-on

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

administrator

A moderated chat room ensures that _______.

all content is screened

Network speeds are measured in ______ per second.

bits

________ hackers hack into systems to steal or vandalize.

black-hat

A _____ is similar to an online journal, in which you can write about anything you want to share.

blog

To connect peripherals at short ranges, you would use the ________ wireless technology.

bluetooth

You can use a social ______ site to save and share your favorites online.

bookmarking

A ________ changes your home page and redirects you to other websites.

browser highjacker

A distorted series of letters and numbers, called a ______, is used to ensure that you are a human and not a computer.

captcha

_______ display the text of the audio in a video.

captions

A ______ network is one that has at least one computer that provides centralized management, resources, an security.

client-server

The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.

computer fraud and abuse

______ is an example of asynchronous communication.

email

A data warehouse is used to discover relationships among data items.

false

A database controller (DBC) is a person who oversees database systems.

false

A decision support system is made up of a knowledge base and an inference engine.

false

A viral video is one that can infect your computer with malware.

false

A workgroup and a homegroup refer to the same network feature.

false

Adware does NOT affect your computer's performance.

false

Ethernet standards and equipment for your home LAN are different than those used in business

false

If the website is well designed, then the information on the site is probably credible.

false

Microsoft Excel is an example of a DBMS.

false

Network resources refer only to hardware and files.

false

Screen capture software requires a webcam to be able to capture a video of your screen.

false

Spyware is easy to remove from your computer.

false

The only program you need to fully protect your computer is a good antivirus program.

false

The top-level domain used by the government is .net.

false

Using a report to enter data into a database decreases the frequency of data entry errors.

false

When selecting a video camera, resolution is not an important feature to consider

false

A _______ can be set by an employer to prevent you from accessing eBay.

firewall

Portable media players use ________ to store music.

flash memory

________ make data entry easier because they can be set up to match the layout of a paper document.

forms

Camera shake can be reduced by using a camera that provides ________.

image stabilization

________ counteracts camera shake and allows you to take sharper images.

image stabilization

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.

inference engine

A database is a collection of ________ that has been organized in a meaningful way.

information

Each computer is considered equal in a ______ network.

peer-to-peer

________ redirects you to a phony website by hijacking a domain name.

pharming

The ________ database is the most popular type used by businesses.

relational

To print data or display it in an easy-to-read format, a ________ can be used.

report

One disadvantage to e-ink technology is that it ________.

requires an external light for night reading

In a database, a ________ stores data in rows and columns.

table

________ photos allows you to locate them more easily in the future.

tagging

You would check ________ for images that are not copyrighted.

the commons

Which of the following is NOT used to transmit signals on an Ethernet network?

topology

A browser plug-in is a third-party program, such as Adobe Reader.

true

A captcha is a series of distress letters and numbers that difficult for automated software to read but relatively easy for humans to read.

true

A codec is a compression algorithm that reduces the size of a digital media file.

true

A company releasing a new product could use a Facebook Page to promote its release.

true

A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program

true

A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment.

true

A firewall can be implemented using hardware or software.

true

A firewall can be used to shield your computer from direct access to the internet.

true

A hotfix resolves individual software problems as they are discovered.

true

A hybrid network in which several LANs are connected together can be called a Campus Area Network.

true

A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.

true

A peer-to-peer network can connect a Linux computer and a Windows PC.

true

A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.

true

An e-reader is a specialized form of a tablet.

true

Another name for a bot is a zombie.

true

Antispyware software prevents adware software from installing itself on your computer.

true

Asynchronous online communication technology lets you send a message that the receiver can access later.

true

Fiber networks use optical network terminals to connect to the internet.

true

Firewalls can be implemented by hardware and/or software.

true

In a network, a file can be an example of a resource.

true

Internet2 is much faster than the Internet because it has a fiber optic backbone.

true

MP3 players are ideal for high-impact activities because they do not contain any moving parts.

true

Mobile browsers are optimized to be viewed on small screens.

true

One advantage of using domain is that you only have to log in one time to obtain access to all servers within that domain.

true

One of the advantages of using a wire network connection rather than a wireless network connection is speed

true

One of the main e-readers is the Amazon Kindle.

true

One way to access email is to read it online through a webmail interface.

true

Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

true

Search engine optimization (SEO) is used to make a website easier to find.

true

Social networks have change TV watching from a passive experience to an active, social experience.

true

Stand-alone video cameras provide better quality video than the video mode on your cell phone.

true

Standards ensure that equipment made by different companies work together.

true

TLDs often represent the type of website that is being visited.

true

The 4G cellular network standard includes WiMAX Mobile Internet technology.

true

Two wireless devices that are directly connected to each other form an ad hoc network.

true

User-generated content refers to the fact that anyone can put content on the web.

true

When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle.

true

Windows Defender is antimalware software built-in to Microsoft operating systems.

true

Worms spread over network connections without any help from users.

true

You should be wary about entering your credit car number into website whose URL does not begin with https.

true

To secure your wireless network at home, you should ________.

uses wireless encryption with a difficult passphrase

When a company pays people to hack into its own system, it calls in ________ hackers.

white-hat

In a WLAN, devices are connect by _______.

wi-fi

_______ is the largest online video-hosting site in the world.

youtube

________ is the most popular video-sharing service on the Internet.

youtube

Which organization coordinates the Internet naming system?

ICANN

74.125.224.72 is an example of a(n) ________

IP address

________ mode enables you to take several pictures in quick succession by holding down the shutter button

burst

A(n) ________ improves over time by learning from its interactions.

cognitive computing system

An MP3 file is about one-half the size of a music file on a CD.

false

Asynchronous communication happens in real-time with two or more people online at the same time.

false

Data travels in both directions in a ring topology.

false

Once a file is compressed using lossy compression, it can be fully restored to its original raw format.

false

PAN stands for Public Area Network.

false

Pandora is the most popular web browser for people using Macs.

false

Podcasts can be either radio-like or TV-programs that are aired live on the in the internet

false

Point-and-shoot cameras do not have to worry about shutter lag.

false

Resolution refers to the distance at which a subject in front of the lens is in sharp focus.

false

Satellite broadband service speeds are comparable to those of cable

false

The United States government developed the naming system for the Internet.

false

The only authority responsible for investigating cybercrime in the United States is the FBI.

false

The original use of the Internet was to conduct business between corporations and its customers.

false

The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.

false

The unauthorized use of your neighbor's wireless network is called trolling.

false

In a database, title, author, publication date, and ISBN are examples of ________

fields

An Excel spreadsheet is an example of a(n) ________ database.

flat

Which of the following is NOT a video streaming service?

flickr

________ is the largest online image-sharing site in the world.

flickr

The distance at which subjects in front of the lens are in sharp focus is known as a camera's ________.

focal length

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

phishing

When you decide to use your neighbor's open wireless network without permission, you are _______.

piggybacking

A fixed-focus camera is good for objects within a specific distance.

true

A search engine is essentially a large database of indexed webpages.

true

A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

true

A smartphone is a multifunction device that blends phone, PDA, and portable media player features.

true

A telephoto lens is used to zoom in on an object.

true

AAC files produce higher quality music than MP3 files.

true

ARPANET is the name first given to the Internet.

true

All computers in a P2P network belong to a workgroup.

true

All the computers connected to the Internet are given a unique IP address.

true

An autofocus camera mechanically adjusts the focal length by moving the lens in or out.

true

Bluetooth technology connects peripherals wirelessly at short ranges.

true

By using tabbed browsing, you can have multiple home pages.

true

Compact system cameras are also known as mirrorless cameras.

true

Compact system cameras are also known as superzooms.

true

Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.

true

Cyber-harassment is defined as cyberbullying between adults.

true

Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.

true

DSL is normally slower than cable Internet access.

true

Dial-up Internet access is the slowest type of Internet connection.

true

Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.

true

Emojis are small images that represent facial expressions, common objects, and people and animals.

true

Encryption converts plain text into ciphertext.

true

FTTH uses fiber-optic cables.

true

Google has a search tool called Google Scholar that you can use for research.

true

Having quick access to features in a browser is often done through a browser toolbar.

true

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal.

true

In a bus topology, date travels along a single cable that is terminated at both ends.

true

In a virtual world, you can select an avatar as a virtual body.

true

It is recommended that you have more than one web browser installed on your computer.

true

Once a computer is infected, a virus can use an email program to send out copies of itself.

true

The HTTP protocol requests and delivers webpages.

true

The IEEE 802.11 standards are used in wi-fi networks found in homes and public hotspots.

true

The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.

true

The Integrated Automated Fingerprint Identification System is considered to be a biometric database.

true

The National Missing Person DNA database is part of the CODIS system.

true

The OR operator is used to return results that include either of two specific words.

true

The Subject line of an email message helps the recipient know what the message is going to be about.

true

The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

true

The geographic information system combines layers of geographically referenced information about Earth's surface.

true

The physical layout of an LAN is called its topology

true

The primary key field uniquely identifies a record in a table.

true

The resolution of a camera is calculated by multiplying the length by the width of the image in pixels.

true

Twitter is an example of a microblogging site.

true

Using the Boolean operator NOT means the results must include the first word but cannot include the second word.

true

VolP uses the internet to transmit calls instead of phone lines or cellular towers.

true

WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.

true

When designing a database, you should have separate fields for a person's first and last names.

true

When information is duplicated in multiple places, it is known as data redundancy.

true

You can use a wide-angle lens for shooting an image such as a landscape.

true

You can use geotagging to add location information to a digital photo.

true

When one business provides services for another, it is a type of e-commerce called _____

B2B

When you buy a textbook online from Amazon.com, you are participating in _______ e-commerce.

B2C

When sending one email to everyone in your address book, you should use the ______ field to keep their addresses private.

Bcc

________ e-commerce allows anyone to sell or trade items online.

C2C

By default, Windows computers are set to obtain an IP address automatically, using ______.

DHCP

The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72.

DNS

Which type of camera would be the best choice for a photographer who prefers to manually adjust the focus and exposure for each image?

DSLR

________ is the authoring language that defines the structure of a webpage.

HTML

The 4G network standard includes ________ technologies.

LTE

MP3 stands for ________.

MPEG-1 Audio Layer 3

Which of the following is NOT a SQL relational keyword?

QUIT

You can subscribe to ______ feeds to stay up-to-date on podcasts and news feeds.

RSS

_______ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.

SEO

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

.com is an example of a(n) ________.

TLD

Employees who are traveling can connect securely to their office network through the internet when a _______ had been established.

VPN

A company with offices in Buffalo and Seattle would use dedicated _______ lines to connect the two offices.

WAN

What is the Internet backbone?

a high-speed connection between networks

One of the most important reasons for Ethernet standards is it __________.

assures equipment from different manufacturers is compatible

______ communication allows you to send a message that the receiver can access later.

asynchronous

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.

atomicity

In a virtual community, you can communicate with other people by using a(n).

avatar

________ is the application of information technology to the field of biology.

bioinformatics

Wikis are designed for _________, which is allowing people to contribute more than just posting a response.

collaboration

An email claiming that you have won a lottery might be an example of ________.

computer fraud

_______ raises money from multiple small investors rather than a few large ones.

crowdfunding

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ______.

crowdsourcing

The cyberbullying of one adult by another adult, using a computer is known as ________.

cyber-harassment

Which cybercrime is considered to be a form of harassment?

cyber-stalking

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

cyber-terrorism

The Internet was originally created as a communication system for the ________.

department of defense

A GIS can be used by local municipalities to ________.

design emergency routes

The least expensive form of Internet connection is ________.

dial-up

A data ________ defines the fields in a database and the type of data that each field contains.

dictionary

All the information someone can find out about you by searching the web is called your ______.

digital footprint

A _______ is a network composed of a group of clients and servers under the control of one central security database.

domain

In the URL http://www.irs.gov, irs is the ________.

domain name

________ printers produce lab-quality prints of your photos.

dye-sublimation

_______ is one of the most popular C2C websites.

eBay

What CANNOT be done with most video editing software?

edit pictures created in the software

Today, the backbone of the Internet is composed of numerous Internet ________ Points around the world.

exchange

A DBMS will define a data type for you by evaluating the data currently entered into the fields.

false

A black-hat hacker attempts to find security holes in a system to prevent future hacking.

false

________ adds location information to digital photos.

geotagging

Hacking to make a political statement is called ________.

hacktivism

The # symbol used by Twitter is called a ______

hashtag

Which of the following is NOT a common LAN topology.

hierarchical

P2P networks are normally found in __________.

homes

Wireless access points that are available in public spaces are called ________.

hotspots

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.

https

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?

human genome project

________ allows you to sync your photos between your iPhone and your Mac.

iCloud

Which is a type of data that can be stored in an object-oriented database?

images, audio, and video

Which is NOT an advantage of data normalization?

increases database development time

Which of the following is a method of synchronous online communication?

instant messaging

______ allows you to communicate with one person at a time.

instant messaging

The ________ was created to make it easier for victims to report cybercrimes.

internet crime complaint center

Which statement about a logic bomb is FALSE?

it can spread to other machines

A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.

layers

_____ is a social network that is designed for business connections

linkedIn

In an office acceptable use policy (AUP), which of the following might be prohibited?

logging in to eBay

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.

lookup

An expert system is a computer programmed to ________.

make decisions in real-life situations

The collection of websites that enable users to create user-generated content, connect, network, and share is called social _______

media

Smartphones have the ability to download additional programs, called ________, to extend their capabilities, making them convergence devices.

mobile applications

Data in a ________ database are stored in data cubes.

multidimensional

The total zoom available on a camera is determined by digital zoom ________ optical zoom.

multiplied by

Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.

municipal

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.

network

The science and telecommunications industries would most likely use the ________ database type.

object-oriented

Microsoft Office is an example of a(n) ________.

office support system (OSS)

In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.

one-to-many

________ allows the user to selectively extract data from different viewpoints.

online analytical processing (OLAP)

Which would be the strongest password?

p@55W0?d

A Facebook ______ is used to promote an organization, a product, or a service.

page

_____ recommends music to you based on your listening preferences.

pandora

Another name for the actual attack caused by a virus is a ________.

payload

A ________ network is a network in which all computers are considered equal.

peer-to-peer

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________

plug-in

Basic ________ cameras are easy to use, but most do not have a viewfinder to help you frame an image.

point-and-shoot

In a one-to-one relationship, both tables use the same ________ to link two records.

primary key

In the URL http://www.irs.gov, http is the ________

protocol

The rules for communication between network devices are called _______.

protocols

A ________ could be used to retrieve all the phone numbers from a student database.

query

A ________ contains the information for a single entity in the database.

record

Which of the following is an example of a social news site?

reddit

A digital camera's image quality is determined by the camera's ________.

resolution

If your computer has a ________, someone else can gain access to it undetected.

rootkit

A _______ is a device that connects two or more networks together.

router

A ________ connects two or more networks together.

router

If you want to connect your home network to the internet you will need a __________ in addition to a modem.

router

Which device on a network performs network address translation?

router

Which broadband service are you likely to use if you live in a very remote area?

satellite

The s in https stands for ________.

secure

Podcasts allow time _______, so you can listen on your own schedule.

shifting

The time between a person pressing the button and the camera taking the picture is called ________.

shutter lag

Antivirus software uses ________ to search for known viruses.

signature checking

An email _____ is a block of text that is automatically put at the end of your messages.

signature line

Using social media sites to sell services is called ______.

social media marketing (SMM)

You should use a(n) ________ account for everyday computing on a computer running Windows.

standard

_______ technology is used for sending email messages.

store-and-foward

Which would make the best primary key in a table?

student ID

A _______ is a device that connected multiple devices on a LAN.

switch

Most home routers also include a built-in _______.

switch

What was the ARPANET?

the origins of the internet

Which of the following statements about P2P networks is FALSE?

the services and security are centralized

Which statement about smartphones is FALSE?

they are limited to the programs already installed during production

What is NOT true about pop-up blockers?

they are triggered by cookies

Which statement about cookies is FALSE?

they cannot collect information you do not want to share

Which of the following is an industry standard that enables a camera to connect directly to a printer?

thunderbolt

Adding a browser ________ gives you quick access to the features of the application that installed it.

toolbar

The FTP protocol is used to ________.

transfer files

A ________ appears to be a legitimate program, but is actually something malicious.

trojan horse

A social bookmarking site allows you to share your bookmarks with others online

true

A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.

true

One way to display the data in a table is by creating a report.

true

Phishing and pharming attempts are successful because they appear to be from legitimate websites.

true

Podcasts are prerecorded radio- and TV-like shows you can download and listen to or watch any time.

true

A data ________ rule would prevent a user from entering text in a date/time field.

validation

Which is NOT a CODIS index?

victims

The difference between a virus and a worm is a ________.

virus needs a host file, but a worm does not

Moving through a neighborhood trying to locate open wireless access points is called ___________.

wardriving

The tools that allow users to create content and have changes the way people communicate and collaborate on the web are known as:

web 2.0

Programs that interpret HTML to display webpages are called ________.

web browsers

________ provide the ability to carry on two-way visual communication with people in different locations

webcams

According to the text, which of the following is NOT typically one of the important features when selecting a digital camera?

weight


Set pelajaran terkait

NURB 3060 Heart and Neck Vessels Chp 19 Jarvis

View Set

The Musical Comedy of Murders of 1940: Marjorie Baverstock Lines

View Set

Ch. 32: Skin Integrity and wound care

View Set

TX GOVT 2306, Chap. 11, Homework, Prof. Clark, DMC

View Set

Chapter 3: Legal, Ethical, and Professional Issues in Information Security

View Set

Quill: Furthermore, In Addition, & Moreover

View Set