CSC FINAL

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

WAN

An email claiming that you have won a lottery might be an example of ________.

computer fraud

The least expensive form of Internet connection is ________.

dial-up

A ________ is a network composed of a group of clients and servers under the control of one central security database.

domain

In the URL http://www.irs.gov, irs is the ________.

domain name

An Excel spreadsheet is an example of a(n) ________ database.

flat

which of the following is NOT a video streaming service?

flickr

the distance at which subjects in front of the lens are in sharp focus is known as a cameras ____

focal length

___ adds location information to digital photos

geotagging

A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.

layers

Data in a ________ database are stored in data cubes.

multidimensional

Another name for the actual attack caused by a virus is a ________.

payload

___ is the most popular video-sharing service on the internet

youtube

which type of camera would be the best choice for a photographer who prefers to manually adjust the focus and exposure for each image?

DSLR

Twitter is an example of a microblogging site.

True

Two wireless devices that are directly connected to each other form an ad hoc network.

True

User-generated content refers to the fact that anyone can put content on the web.

True

Using the Boolean operator NOT means the results must include the first word but cannot include the second word.

True

________ is the largest online video-hosting site in the world.

YouTube

You can use a social ________ site to save and share your favorites online.

bookmarking

A ________ changes your home page and redirects you to other websites.

browser hijacker

____ mode enables you to take several pictures in quick succession by holding down the shutter button

burst

___ display the text of the audio in a video

captions

The cyberbullying of one adult by another adult, using a computer is known as ________.

cyber-harassment

once a file is compressed using lossy compression, it can be fully restored to its original raw format

false

point-and-shoot cameras do not have to worry about shutter lag

false

resolution refers to the distance at which a subject in front of the lens is in sharp focus

false

screen capture software requires a webcam to be able to capture a video of your screen

false

when selecting a video camera, resolution is not an important feature to consider

false

In a database, title, author, publication date, and ISBN are examples of ________.

fields

Hacking to make a political statement is called ________.

hacktivism

The # symbol used by Twitter is called a(n) ________.

hashtag

P2P networks are normally found in ________.

homes

Wireless access points that are available in public spaces are called ________.

hotspots

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.

https

____ allows you to sync your photos between your iPhone and your mac

iCloud

the total zoom available on a camera is determined by digital zoom ___ optical zoom

multiplied by

Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.

municipal

The science and telecommunications industries would most likely use the ________ database type.

object-oriented

Microsoft Office is an example of a(n) ________.

office support system (OSS)

a digital cameras image quality is determined by the cameras ___

resolution

The s in https stands for ________.

secure

Podcasts allow time ________, so you can listen on your own schedule.

shifting

the time between a person pressing the button and the camera taking the picture is called ___

shutter lag

You should use a(n) ________ account for everyday computing on a computer running Windows.

standard

A ________ is a device that connects multiple devices on a LAN

switch

AAC files produce higher quality music than MP3

true

MP3 players are ideal for high-impact activities because they do not contain any moving parts

true

a codec is a compression algorithm that reduces the size of a digital media file

true

a fixed-focus camera is good for objects within a specific distance

true

a smartphone is a multifunction device that blends phone, PDA, and portable media player features

true

a telephoto lens is used to zoom in on an object

true

an autofocus camera mechanically adjusts the focal length by moving the lens in or out

true

an e-reader is a specialized form of a tablet

true

To secure your wireless network at home, you should ________.

use wireless encryption with a difficult passphrase

A data ________ rule would prevent a user from entering text in a date/time field.

validation

The difference between a virus and a worm is a ________.

virus needs a host file, but a worm does not

according to the text, which of the following is NOT typically one of the important features when selecting a digital camera?

weight

Which device on a network performs network address translation?

Router

Which broadband service are you likely to use if you live in a very remote area?

Satellite

All the computers connected to the Internet are given a unique IP address.

True

VoIP uses the Internet to transmit calls instead of phone lines or cellular towers.

True

A black-hat hacker attempts to find security holes in a system to prevent future hacking.

False

Microsoft Excel is an example of a DBMS.

False

Satellite broadband service speeds are comparable to those of cable.

False

Spyware is easy to remove from your computer.

False

The United States government developed the naming system for the Internet.

False

74.125.224.72 is an example of a(n) ________.

IP address

you can use a wide-angle lens for shooting an image such as a landscape

true

you can use geotagging to add location information to a digital photo

true

When a company pays people to hack into its own system, it calls in ________ hackers.

white-hat

Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.

True

Google has a search tool called Google Scholar that you can use for research.

True

Having quick access to features in a browser is often done through a browser toolbar.

True

In a virtual world, you can select an avatar as a virtual body.

True

Internet2 is much faster than the Internet because it has a fiber optic backbone.

True

It is recommended that you have more than one web browser installed on your computer.

True

Mobile browsers are optimized to be viewed on small screens.

True

One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.

True

One way to display the data in a table is by creating a report.

True

Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

True

Search engine optimization (SEO) is used to make a website easier to find

True

Social networks have changed TV watching from a passive experience to an active, social experience

True

When designing a database, you should have separate fields for a person's first and last names.

True

When information is duplicated in multiple places, it is known as data redundancy.

True

Windows Defender is antimalware software built-in to Microsoft operating systems.

True

You should be wary about entering your credit card number into a website whose URL does not begin with https.

True

The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.

media

smartphones have the ability to download additional programs, called ___ to extend their capabilities, making them convergence devices

mobile applications

To print data or display it in an easy-to-read format, a ________ can be used.

report

An email ________ is a block of text that is automatically put at the end of your messages.

signature line

A workgroup and a homegroup refer to the same network feature.

False

Adware does NOT affect your computer's performance.

False

Asynchronous communication happens in real-time with two or more people online at the same time

False

One of the advantages of using a wired network connection rather than a wireless network connection is speed.

True

The geographic information system combines layers of geographically referenced information about Earth's surface.

True

Worms spread over network connections without any help from users.

True

The ________ database is the most popular type used by businesses.

relational

The FTP protocol is used to ________.

transfer files

By default, Windows computers are set to obtain an IP address automatically, using ________.

DHCP

What was the ARPANET?

The origins of the Internet

Which of the following statements about P2P networks is FALSE?

The services and security are centralized.

A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program

True

A peer-to-peer network can connect a Linux computer and a Windows PC.

True

A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.

True

A search engine is essentially a large database of indexed webpages.

True

A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

True

A social bookmarking site allows you to share your bookmarks with others online.

True

The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.

True

The Integrated Automated Fingerprint Identification System is considered to be a biometric database.

True

The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

True

The physical layout of a LAN is called its topology.

True

The primary key field uniquely identifies a record in a table.

True

When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle.

True

In a virtual community, you can communicate with other people by using a(n) ________.

avatar

A ________ can be set by an employer to prevent you from accessing eBay.

firewall

portable media players use ___ to store music

flash memory

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.

inference engine

basic ___ cameras are easy to use, but most do not have a view finder to help you frame an image

point-and-shoot

In a one-to-one relationship, both tables use the same ________ to link two records.

primary key

In the URL http://www.irs.gov, http is the ________.

protocol

Which of the following is an example of a social news site?

reddit

If your computer has a ________, someone else can gain access to it undetected.

rootkit

Antivirus software uses ________ to search for known viruses.

signature checking

When one business provides services for another, it is a type of e-commerce called ________.

B2B

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.

B2C

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.

Bcc

________ raises money from multiple small investors rather than a few large ones.

Crowdfunding

Which cybercrime is considered to be a form of harassment?

Cyber-stalking

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

Cyber-terrorism

The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72.

DNS

A data warehouse is used to discover relationships among data items.

False

A database controller (DBC) is a person who oversees database systems.

False

A decision support system is made up of a knowledge base and an inference engine.

False

A viral video is one that can infect your computer with malware.

False

Data travels in both directions in a ring topology.

False

Ethernet standards and equipment for your home LAN are different than those used in a business.

False

If the website is well designed, then the information on the site is probably credible.

False

Network resources refer only to hardware and files.

False

PAN stands for Public Area Network.

False

Pandora is the most popular web browser for people using Macs.

False

Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.

False

The only authority responsible for investigating cybercrime in the United States is the FBI.

False

The only program you need to fully protect your computer is a good antivirus program.

False

The original use of the Internet was to conduct business between corporations and its customers.

False

The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.

False

The top-level domain used by the government is .net.

False

The unauthorized use of your neighbor's wireless network is called trolling.

False

Using a report to enter data into a database decreases the frequency of data entry errors.

False

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?

Human Genome Project

Which organization coordinates the Internet naming system?

ICANN

Wi-Fi networks used in homes and public hotspots use the ________.

IEEE 802.11 standards

Which is a type of data that can be stored in an object-oriented database?

Images, audio, and video

The ________ was created to make it easier for victims to report cybercrimes.

Internet Crime Complaint Center

For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

LAN

The 4G network standard includes ________ technologies.

LTE

________ is a social network that is designed for business connections.

LinkedIn

In an office acceptable use policy (AUP), which of the following might be prohibited?

Logging in to eBay

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.

Network

Which would make the best primary key in a table?

Student ID

A ________ appears to be a legitimate program, but is actually something malicious.

Trojan horse

A browser plug-in is a third-party program, such as Adobe Reader.

True

A captcha is a series of distorted letters and numbers that are difficult for automated software to read but relatively easy for humans to read.

True

A company releasing a new product could use a Facebook Page to promote its release.

True

A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment.

True

A firewall can be implemented using hardware or software.

True

A firewall can be used to shield your computer from direct access to the Internet.

True

A hotfix resolves individual software problems as they are discovered.

True

A hybrid network in which several LANs are connected together can be called a Campus Area Network.

True

A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.

True

A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.

True

ARPANET is the name first given to the Internet.

True

All computers in a P2P network belong to a workgroup.

True

Antispyware software prevents adware software from installing itself on your computer.

True

By using tabbed browsing, you can have multiple home pages.

True

Cyber-harassment is defined as cyberbullying between adults.

True

Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.

True

DSL is normally slower than cable Internet access.

True

Dial-up Internet access is the slowest type of Internet connection.

True

Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.

True

Emojis are small images that represent facial expressions, common objects, and people and animals.

True

Encryption converts plain text into ciphertext.

True

FTTH uses fiber-optic cables.

True

Fiber networks use optical network terminals to connect to the Internet.

True

Firewalls can be implemented by hardware and/or software.

True

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal.

True

In a bus topology, data travels along a single cable that is terminated at both ends.

True

In a network, a file can be an example of a resource.

True

Once a computer is infected, a virus can use an email program to send out copies of itself.

True

One way to access email is to read it online through a webmail interface.

True

Phishing and pharming attempts are successful because they appear to be from legitimate websites.

True

Standards ensure that equipment made by different companies work together.

True

TLDs often represent the type of website that is being visited.

True

The 4G cellular network standard includes WiMAX Mobile Internet technology.

True

The HTTP protocol requests and delivers webpages.

True

The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.

True

The National Missing Person DNA database is part of the CODIS system.

True

The OR operator is used to return results that include either of two specific words.

True

The Subject line of an email message helps the recipient know what the message is going to be about.

True

WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.

True

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

VPN

A router is a form of security because it ________.

acts like a firewall

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.

add-on

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

administrator

A moderated chat room ensures that ________.

all content is screened

which of the following is NOT an example of speech recognition software?

amazon respond

One of the most important reasons for Ethernet standards is it ________.

assures equipment from different manufacturers is compatible

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.

atomicity

A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.

captcha

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

client-server

A(n) ________ improves over time by learning from its interactions.

cognitive computing system

Wikis are designed for ________, which is allowing people to contribute more than just posting a response.

collaboration

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ____.

crowdsourcing

A GIS can be used by local municipalities to ________.

design emergency routes

A data ________ defines the fields in a database and the type of data that each field contains.

dictionary

All the information someone can find out about you by searching the web is called your ________.

digital footprint

___ printers produce lab-quality prints of your photos

dye-sublimation

________ is one of the most popular C2C websites.

eBay

what CANNOT be done with most video editing software?

edit pictures created in the software

an MP3 file is about one-half the size of a music file on a CD

false

A database is a collection of ________ that has been organized in a meaningful way.

information

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.

lookup

An expert system is a computer programmed to ________.

make decisions in real-life situations

In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.

one-to-many

Which would be the strongest password?

p@55W0?d

A ________ network is a network in which all computers are considered equal.

peer-to-peer

Each computer is considered equal in a ________ network.

peer-to-peer

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

phishing

When you decide to use your neighbor's open wireless network without permission, you are ________.

piggybacking

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.

plug-in

The rules for communication between network devices are called ________.

protocols

A ________ could be used to retrieve all the phone numbers from a student database.

query

one disadvantage to e-ink technology is that it ____

requires an external light for night reading

when you create files on your computer from an audio CD, you are ___ the CD

ripping

A ________ connects two or more networks together.

router

A ________ is a device that connects two or more networks together.

router

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

Most home routers also include a built-in ________.

switch

In a database, a ________ stores data in rows and columns.

table

___ photos allows you to locate them more easily in the future

tagging

you would check ___ for images that are not copyrighted

the commons

compact system cameras are also known as mirrorless cameras

true

compact system cameras are also known as superzooms

true

one of the main e-readers is the amazon kindle

true

podcasts are prerecorded radio- and TV-like shows you can download and listen to or watch anytime

true

stand-alone video cameras provide better quality video than the video mode on your cell phone

true

the resolution of a camera is calculated by multiplying the length by the width of the image in pixels

true

Moving through a neighborhood trying to locate open wireless access points is called ________.

wardriving

Programs that interpret HTML to display webpages are called ________

web browsers

___ provide the ability to carry on two-way visual communication with people in different locations

webcams

A ________ contains the information for a single entity in the database.

record

.com is an example of a(n) ________.

TLD

Which operator is used to return search results that include two specific words?

AND

________ e-commerce allows anyone to sell or trade items online.

C2C

Today, the backbone of the Internet is composed of numerous Internet ________ Points around the world.

Exchange

A DBMS will define a data type for you by evaluating the data currently entered into the fields.

False

________ make data entry easier because they can be set up to match the layout of a paper document.

Forms

________ is the authoring language that defines the structure of a webpage.

HTML

Which is NOT an advantage of data normalization?

Increases database development time

Which of the following is a method of synchronous online communication?

Instant messaging

________ allows the user to selectively extract data from different viewpoints.

Online analytical processing (OLAP)

What is the Internet backbone?

A high-speed connection between networks

________ communication allows you to send a message that the receiver can access later

Asynchronous

________ is the application of information technology to the field of biology.

Bioinformatics

________ hackers hack into systems to steal or vandalize.

Black-hat

To connect peripherals at short ranges, you would use the ________ wireless technology.

Bluetooth

The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.

Computer Fraud and Abuse

The Internet was originally created as a communication system for the ________.

Department of Defense

________ is an example of asynchronous communication.

Email

________ is the largest online image-sharing site in the world.

Flickr

Which of the following is NOT a common LAN topology?

Hierarchical

________ allows you to communicate with one person at a time.

Instant messaging

Which statement about a logic bomb is FALSE?

It can spread to other machines.

MP3 stands for ___

MPEG-3 audio layer 1

Asynchronous online communication technology lets you send a message that the receiver can access later

True

A Facebook ________ is used to promote an organization, a product, or a service.

Page

________ recommends music to you based on your listening preferences.

Pandora

________ redirects you to a phony website by hijacking a domain name.

Pharming

Which of the following is NOT a SQL relational keyword?

QUIT

You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.

RSS

________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.

SEO

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

Using social media sites to sell services is called ________.

Social media marketing (SMM)

________ technology is used for sending email messages.

Store-and-forward

Bluetooth technology connects peripherals wirelessly at short ranges.

True

What is NOT true about pop-up blockers?

They are triggered by cookies.

Which statement about cookies is FALSE?

They cannot collect information you do not want to share.

Another name for a bot is a zombie.

True

Which of the following is NOT used to transmit signals on an Ethernet network?

Topology

Which is NOT a CODIS index?

Victims

The tools that allow users to create content and have changed the way people communicate and collaborate on the web are known as:

Web 2.0

In a WLAN, devices are connected by ________.

Wi-Fi

Network speeds are measured in ________ per second.

bits

A ________ is similar to an online journal, in which you can write about anything you want to share

blog

____ counteracts camera shake and allows you to take sharper images

image stabilization

camera shake can be reduced by using a camera that provides ____

image stabilization

which statement about smartphones is FALSE?

they are limited to the programs already installed during production

which of the following is an industry standard that enables a camera to connect directly to a printer?

thunderbolt

Adding a browser ________ gives you quick access to the features of the application that installed it.

toolbar


Set pelajaran terkait

Ch 3 Constitution Practice Questions

View Set

macro: introduction to fractional reserve banking

View Set

ACSM Guidelines for Exercise Testing and Prescription(Chapters 1 and 2)

View Set

Chapter 11 - Motivating Employees Through Compensation

View Set