Final CSC
A ________ is a network composed of a group of clients and servers under the control of one central security database.
Domain
_______ is an example of asynchronous communication.
________ is the largest online image-sharing site in the world.
Flickr
A ________ could be used to retrieve all the phone numbers from a student database.
Query
Which of the following is NOT a SQL relational keyword?
Quit
You can subscribe to _______ feeds to stay up-to-date on podcast and news feeds.
RSS
A ________ contains the information for a single entity in the database
Record
Which of the following is an example of a social news site?
A company releasing a new product could use a Facebook Page to promote its release.
True
One way to access email is to read it online through a webmail interface.
True
Twitter is an example of a mircroblogging site.
True
Two wireless devices that are directly connected to each other form an ad hoc network
True
A GIS can be used by local municipalities to ________.
Design Emergency Routes
A data ________ defines the fields in a database and the type of data that each field contains.
Dictionary
Microsoft Excel is an example of a DBMS.
False
In a database, title, author, publication date, and ISBN are examples of ________.
Fields
A ________ can be set by an employer to prevent you from accessing eBay.
Firewall
Data in a ________ database are stored in data cubes.
Multidimensional
The science and telecommunications industries would most likely use the ________ database type.
Object Oriented
Another name for a bot is a zombie
True
Bluetooth technology connects peripherals wirelessly at short ranges.
True
The HTTP protocol requests and delivers webpages.
True
Adware does NOT affect your computer's performance.
False
Ethernet standards and equipment for your home LAN are different than those used in a business.
False
Spyware is easy to remove from your computer
False
Which is a type of data that can be stored in an object-oriented database?
Images, Audio or Video
In a database, a ________ stores data in rows and columns.
Table
Cyber criminals can be difficult to catch because many of the attacks originate outside the United States
True
If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal.
True
In a network, a file can be an example of a resource.
True
In a virtual world, you can select an avatar as a virtual body.
True
One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.
True
One of the advantages of using a wired network connection rather than a wireless network connection is speed.
True
One way to display the data in a table is by creating a report.
True
Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
True
Search engine optimization (SEO) is used to make a website easier to find
True
Social networks have changed TV watching from a passive experience to an active, social experience.
True
The National Missing Person DNA database is part of the CODIS system
True
The cyberbullying of one adult by another adult, using a computer is known as ________.
True
When designing a database, you should have separate fields for a person's first and last names.
True
When information is duplicated in multiple places, it is known as data redundancy.
True
Windows Defender is antimalware software built-in to Microsoft operating systems.
True
Worms spread over network connections without any help from users.
True
You should be wary about entering your credit card number into a website whose URL does not begin with https.
True
Data travels in both directions in a ring topology.
False
The unauthorized use of your neighbor's wireless network is called trolling.
False
A ________ appears to be a legitimate program, but is actually something malicious.
Trojan Horse
The subject line of an email message helps the recipient know what the message is going to be about.
True
When one business provides services for another, it is a type of e-commerce called______.
B2B
When you buy a textbook from Amazon.com, you are participating in ________e-commerce.
B2C
A database controller (DBC) is a person who oversees database systems.
False
Asynchronous communication happens in real-time with two or more people online at the same time.
False
The ________ was created to make it easier for victims to report cybercrimes.
Internet Crime Complaint Center
In an office acceptable use policy (AUP), which of the following might be prohibited?
Logging in to Ebay
Fiber networks use optical network terminals to connect to the Internet.
True
Firewalls can be implemented by hardware and/or software.
True
The physical layout of a LAN is called its topology.
True
To secure your wireless network at home, you should ________.
Use wireless encryption with a difficult passphrase
Which is NOT a CODIS index?
Victims
______ is the largest online video-hosting site in the world.
Youtube
Which would be the strongest password?
p@550?d
Wi-Fi networks used in homes and public hotspots use the ________.
IEEE 802.11 Standards
A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.
Layers
The collection of websites that enable users to create user-generated content, connect, network, and share is called social______.
Media
A captcha is a series of distorted letters and numbers that are difficult for automated software to read but relatively easy for humans to read.
True
A firewall can be implemented using hardware or software
True
A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.
True
A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
True
A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
True
A social bookmarking site allows you to share your bookmarks with others online.
True
A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.
True
All computers in a P2P network belong to a workgroup.
True
Cyber-harassment is defined as cyberbullying between adults.
True
Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
True
Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.
True
Emojis are small images that represent facial expressions, common objects, and people and animals.
True
Encryption converts plain text into ciphertext
True
In a bus topology, data travels along a single cable that is terminated at both ends.
True
Once a computer is infected, a virus can use an email program to send out copies of itself.
True
Phishing and pharming attempts are successful because they appear to be from legitimate websites.
True
Standards ensure that equipment made by different companies work together.
True
WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.
True
______ is one of the most popular C2C websites.
eBay
Which cybercrime is considered to be a form of harassment?
Cyber-Stalking
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
Cyber-Terrorism
By default, Windows computers are set to obtain an IP address automatically, using ________.
DHCP
A data warehouse is used to discover relationships among data items.
False
Network resources refer only to hardware and files.
False
PAN stands for Public Area Network.
False
Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.
False
The only authority responsible for investigating cybercrime in the United States is the FBI.
False
The only program you need to fully protect your computer is a good antivirus program.
False
An Excel spreadsheet is an example of a(n) ________ database.
Flat
In a one-to-one relationship, both tables use the same ________ to link two records.
Primary Key
The rules for communication between network devices are called ________.
Protocols
A ________ connects two or more networks together.
Router
_____ technology is used for sending email messages.
Store-and-foward
Which would make the best primary key in a table?
Student ID
A ________ is a device that connects multiple devices on a LAN.
Switch
Which of the following statements about P2P networks is FALSE?
The service and security are centralized
The Integrated Automated Fingerprint Identification System is considered to be a biometric database.
True
The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
True
The geographic information system combines layers of geographically referenced information about Earth's surface
True
The primary key field uniquely identifies a record in a table.
True
In a WLAN, devices are connected by ________.
WIFI
All the information someone can find out about you by the web is called your______.
Digital Footprint
A decision support system is made up of a knowledge base and an inference engine.
False
A viral video is on that can infect your computer with malware.
False
A workgroup and a homegroup refer to the same network feature.
False
The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.
False
Using a report to enter data into a database decreases the frequency of data entry errors.
False
When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
Https
What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?
Human Genome Project
Most home routers also include a built-in ________.
Switch
A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program
True
A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment
True
A firewall can be used to shield your computer from direct access to the Internet.
True
A hotfix resolves individual software problems as they are discovered.
True
A hybrid network in which several LANs are connected together can be called a Campus Area Network.
True
A peer-to-peer network can connect a Linux computer and a Windows PC.
True
The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.
True
The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.
True
VoIP uses the Internet to transmit calls instead of phone lines or cellular towers.
True
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
VPN
Moving through a neighborhood trying to locate open wireless access points is called ________.
Wardriving
A router is a form of security because it ________
Acts like a firewall
When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
Administrator
A ________ changes your home page and redirects you to other websites
Browser highjacker
__________ e-commerce allows anyone to sell or trade items online.
C2C
A distorted series of letters and numbers, called a ______ is used to ensure that you are a human and not a computer.
Captcha
A ________ network is one that has at least one computer that provides centralized management, resources, and security.
Client Server
A(n) ________ improves over time by learning from its interactions.
Cognitive Computing System
Wikis are designed for______, which is allowing people to contribute more than just posting a response.
Collaboration
An email claiming that you have won a lottery might be an example of ________.
Computer Fraud
A DBMS will define a data type for you by evaluating the data currently entered into the fields.
False
A black-hat hacker attempts to find security holes in a system to prevent future hacking.
False
________ make data entry easier because they can be set up to match the layout of a paper document.
Forms
Hacking to make a political statement is called ________.
Hacktivism
The #symbol used by Twitter is called a(n)______.
Hashtag
Which is NOT an advantage of data normalization?
Increases database development time
A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.
Inference Engine
A database is a collection of ________ that has been organized in a meaningful way.
Information
Which of the following is a method of synchronous online communication?
Instant Messaging
_______ allows you to communicate with one person at a time.
Instant Messaging
Microsoft Office is an example of a(n) ________.
Office Support System
In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.
One to many
________ allows the user to selectively extract data from different viewpoints.
Online Analytical Processing (OLAP)
A ________ network is a network in which all computers are considered equal.
P2P
Podcasts allow time________, so you can listen on your own schedule.
Shifting
An email ________ is a block of text that is automatically put at the end of your messages.
Signature Line
Antivirus software uses ________ to search for known viruses.
Signature checking
Using social media sites to sell services is called_______.
Social Media Marketing (SMM)
When you are sending one email to everyone in your address book, you should use the _______ field to keep their addresses private.
Bcc
When you trust the collective opinion of a crowd of people rather than an expert, it is known as________.
Crowdsourcing
One of the most important reasons for Ethernet standards is it ________.
Assures equipment from different manufacturers is compatible
______ communication allows you to send a message that the receiver can access later.
Asynchronous
The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.
Atomicity
In virtual community, you can communicate with other people by using a(n)__________.
Avatar
________ is the application of information technology to the field of biology.
Bioinformatics
Network speeds are measured in ________ per second.
Bits
________ hackers hack into systems to steal or vandalize.
Black-hat
A _____ is similar to an online journal, in which you can write about anything you want to share.
Blog
To connect peripherals at short ranges, you would use the ________ wireless technology.
Bluetooth
You can use a social______ site to save and share your favorites online.
Bookmarking
________ raises money from multiple small investors rather than a few large ones.
Crowdfunding
The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
Computer Fraud and Abuse
Which of the following is NOT a common LAN topology?
Hierarchicial
P2P networks are normally found in ________.
Homes
Which statement about a logic bomb is FALSE?
It can spread to other machines
Asynchronous online communication lets you send a message that the receiver can access later.
True
For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.
LAN
_____ is a social network that is designed for business connections.
To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.
Lookup
An expert system is a computer programmed to ________.
Make decisions in real-life situations
A Facebook _______ is used to promote an organization, a product, or a service.
Page
_____ recommends music to you based on your listening preferences.
Pandora
Another name for the actual attack caused by a virus is a ________.
Payload
Each computer is considered equal in a ________ network.
Peer to Peer
________ redirects you to a phony website by hijacking a domain name.
Pharming
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
Phishing
When you decide to use your neighbor's open wireless network without permission, you are ________.
Piggybacking
The ________ database is the most popular type used by businesses.
Relational
To print data or display it in an easy-to-read format, a ________ can be used.
Report
If your computer has a ________, someone else can gain access to it undetected.
Rootkit
A ________ is a device that connects two or more networks together.
Router
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
Router
Which device on a network performs network address translation?
Router
______ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.
SEO
When you set up your wireless router, you should change the ________, which is also called the wireless network name.
SSID
You should use a(n) ________ account for everyday computing on a computer running Windows.
Standard
A moderated chat room ensures that ______.
That all content is screened.
Which statement about cookies is FALSE?
They cannot collect information you do not want to share
Antispyware software prevents adware software from installing itself on your computer.
True
Which of the following is NOT used to transmit signals on an Ethernet network?
Topology
A data ________ rule would prevent a user from entering text in a date/time field.
Validation
The difference between a virus and a worm is a ________.
Virus needs a host file, a worm does not.
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
WAN
The tools that allow users to create content and have changed the way people communicate and collaborate on the web are known as:
Web 2.0
When a company pays people to hack into its own system, it calls in ________ hackers.
White-hat