CsCi Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

-sharing flash drives -downloading and running a file attached to an email -downloading a song from a peer-to-peer sharing site ALL OF THE ABOVE

Computer viruses can be spread by

Clickstream data

Data captured as users navigate through a website is called

code your e-mail so only one person can decipher it

Encryption is used to

Network address translation (NAT)

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are

it is a combination of HTTP and the Secure Sockets Layer (SSL)

HTTPS is different than HTTP because

Error handling

How the program should behave if the input data is invalid is part of

address to every device connected to the internet

IPv6 uses 128 bits to assign an

Scalability

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

Keep the default network name and router password

Which of the following should you not do to secure a wireless network?

A wireless extender

Which of the following would not cause interference or poor connectivity between nodes on a wireless network?

Authentication

Which server would a client/server network include to ensure only authorized users are logging onto the network?

Ring

Which topology tends to provide the fairest allocation of network resources?

Fiber-optic

Which type of broadband internet offers connections nearing the speed of light?

Rootkit

A ______ is a program that takes complete control of your computer without your knowledge.

File history

A backup of all the data files on your computer can be managed easily using the windows 10 _______ utility.

One-to-one

A customer information table linked to a password table in a business database reflects which type of relationship

It captures and reads data inside each packet

A packet analyzer is called a sniffer because

to decode an encrypted message

A private key is important

Normalization

A process to ensure that data in a database is organized most efficiently is called

Save your device if a voltage spike is sent through the electrical system

A surge protector may look like just another power strip but it also can

Fake News

A type of journalism where stories are invented and intended to spread misinformation rather than being fracture is known as

Editing and debugging

An IDE is a tool that has support for

a small application located on a server computer

An applet is

Inoculation

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

Biometrics

Authentication techniques that rely on personal biological traits are called

P2P Network

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?

-How quickly the final code must run -How much space the final code delivered can occupy -If there is a specific target environment (say, a specific operating system) -ALL OF THE ABOVE

In selecting the most appropriate language it is useful to know

-because of the persistence of information -because employees often review social media before hiring employees -to ensure information about you is accurate ALL OF THE ABOVE

It is important to maintain your online reputation

Only needs to be complied once and can run on many different CPUs

Java is considered to be architecture neutral because it

It decreases the file size

Reducing the sampling rate when digitizing a file has which effect on the file?

send e-mail along the internet to its destination

SMTP is the set of rules used to

Frame

Sometimes groups of data packets are sent together in a package called a

Internet backbone

The collection of large national and international networks used to establish the internet is called the

Digital Convergence

The combination of media, internet, entertainment, and phone services into a single device illustrates the principal of

Structured Query Language

The database programming language SQL stands for

Identify all of the categories of inputs that are part of the problem

The first step when using object-oriented design is to

the data and the destination

The information in a data packet includes

your federal income tax

The internet is primarily funded by

Authentication

The process whereby users prove they have authorization to use a computer network is known as

CSS

The set of instructions that define how to display the HTML elements in your site is

Describing the problem

The steps of the program development life cycle start with

Multidimensional Database

The type of database that would be best to store and organize data with feature and measure attributes is which of the following?

WAN

The type of network that would be necessary to connect the networks of two college campuses would be:

Data Redundancy

Unnecessary duplication of data in a database is referred to as

Is possible under the "fair use" doctrine

Using copyrighted works without permission of the copyright holder

Boot-sector viruses

Viruses that load from USB drives left connected to computers when computers are turned on are known as

Problem Identification

What is the first step of the SDLC?

Modem and Router

What two devices are often combined into one device to connect the network to the internet and to share the connection between devices on the network?

Digitizing

When analog data is measured and converted to a stream of numerical values, this is referred to as _______ the data.

When the data is simple and can be organized in one table

When is a flat database sufficient to use when organizing data?

Identity Theft

When someone uses your personal information to pose as you, this is

Bastion Host

Which is not a key component of a typical client/server network?

UTP

Which network cable type is most susceptible to signal interference?

Sharing Software Licenses

Which of the follow would NOT be a benefit of networking computers?

Syntax, keywords, and operators

Which of the following are the common to all programming languages

Visualization

Which of the following data-mining techniques is used to create charts and dashboards

It uses strands of pure glass or plastic

Which of the following describes fiber-optic broadband?

Requires a wireless ISP

Which of the following does not describe mobile broadband?

The number of pixels in the camera lens

Which of the following does not determine the quality of a digital image?

Real-time processing

Which of the following is a method of inputting data into a transaction processing system while the transaction is taking place?

Intranet

Which of the following is a private network set up by a business thats used to exclusively by a select group of employees and suppliers?

Sharing of peripherals

Which of the following is an advantage of installing a client/server network in a business?

ePub

Which of the following is an open electronic publishing format?

Imprint

Which of the following is not a category of intellectual property?

PDF

Which of the following is not a digital video file format?

Database name

Which of the following is not considered metadata?

identity

Which of the following is not one of the factors used in multi-factor authentication?

WPA2

Which of the following is the most secure security protocol used with routers?

-Mobile Hotspot -4G LTE Internet Access, -3G Internet Access, ALL OF THE ABOVE

Which of the following is used to access the internet when Wi-fi is not available?

Query

Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?

Create unique software solutions for specialized problems

You need to know how to program to


Set pelajaran terkait

Intro to Bus Final Exam Practice

View Set

Ch 20: Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations

View Set

Chapter 39: Management of Patients with Oral and Esophageal Disorders

View Set

BASIC VEHICLE TECHNOLOGIES 2: COMFORT

View Set