Final CSC

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A ________ is a network composed of a group of clients and servers under the control of one central security database.

Domain

_______ is an example of asynchronous communication.

Email

________ is the largest online image-sharing site in the world.

Flickr

A ________ could be used to retrieve all the phone numbers from a student database.

Query

Which of the following is NOT a SQL relational keyword?

Quit

You can subscribe to _______ feeds to stay up-to-date on podcast and news feeds.

RSS

A ________ contains the information for a single entity in the database

Record

Which of the following is an example of a social news site?

Reddit

A company releasing a new product could use a Facebook Page to promote its release.

True

One way to access email is to read it online through a webmail interface.

True

Twitter is an example of a mircroblogging site.

True

Two wireless devices that are directly connected to each other form an ad hoc network

True

A GIS can be used by local municipalities to ________.

Design Emergency Routes

A data ________ defines the fields in a database and the type of data that each field contains.

Dictionary

Microsoft Excel is an example of a DBMS.

False

In a database, title, author, publication date, and ISBN are examples of ________.

Fields

A ________ can be set by an employer to prevent you from accessing eBay.

Firewall

Data in a ________ database are stored in data cubes.

Multidimensional

The science and telecommunications industries would most likely use the ________ database type.

Object Oriented

Another name for a bot is a zombie

True

Bluetooth technology connects peripherals wirelessly at short ranges.

True

The HTTP protocol requests and delivers webpages.

True

Adware does NOT affect your computer's performance.

False

Ethernet standards and equipment for your home LAN are different than those used in a business.

False

Spyware is easy to remove from your computer

False

Which is a type of data that can be stored in an object-oriented database?

Images, Audio or Video

In a database, a ________ stores data in rows and columns.

Table

Cyber criminals can be difficult to catch because many of the attacks originate outside the United States

True

If you are shopping at a website that is not well-known, you can protect your credit card information by using a third-party payment site such as PayPal.

True

In a network, a file can be an example of a resource.

True

In a virtual world, you can select an avatar as a virtual body.

True

One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain.

True

One of the advantages of using a wired network connection rather than a wireless network connection is speed.

True

One way to display the data in a table is by creating a report.

True

Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

True

Search engine optimization (SEO) is used to make a website easier to find

True

Social networks have changed TV watching from a passive experience to an active, social experience.

True

The National Missing Person DNA database is part of the CODIS system

True

The cyberbullying of one adult by another adult, using a computer is known as ________.

True

When designing a database, you should have separate fields for a person's first and last names.

True

When information is duplicated in multiple places, it is known as data redundancy.

True

Windows Defender is antimalware software built-in to Microsoft operating systems.

True

Worms spread over network connections without any help from users.

True

You should be wary about entering your credit card number into a website whose URL does not begin with https.

True

Data travels in both directions in a ring topology.

False

The unauthorized use of your neighbor's wireless network is called trolling.

False

A ________ appears to be a legitimate program, but is actually something malicious.

Trojan Horse

The subject line of an email message helps the recipient know what the message is going to be about.

True

When one business provides services for another, it is a type of e-commerce called______.

B2B

When you buy a textbook from Amazon.com, you are participating in ________e-commerce.

B2C

A database controller (DBC) is a person who oversees database systems.

False

Asynchronous communication happens in real-time with two or more people online at the same time.

False

The ________ was created to make it easier for victims to report cybercrimes.

Internet Crime Complaint Center

In an office acceptable use policy (AUP), which of the following might be prohibited?

Logging in to Ebay

Fiber networks use optical network terminals to connect to the Internet.

True

Firewalls can be implemented by hardware and/or software.

True

The physical layout of a LAN is called its topology.

True

To secure your wireless network at home, you should ________.

Use wireless encryption with a difficult passphrase

Which is NOT a CODIS index?

Victims

______ is the largest online video-hosting site in the world.

Youtube

Which would be the strongest password?

p@550?d

Wi-Fi networks used in homes and public hotspots use the ________.

IEEE 802.11 Standards

A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.

Layers

The collection of websites that enable users to create user-generated content, connect, network, and share is called social______.

Media

A captcha is a series of distorted letters and numbers that are difficult for automated software to read but relatively easy for humans to read.

True

A firewall can be implemented using hardware or software

True

A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.

True

A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.

True

A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

True

A social bookmarking site allows you to share your bookmarks with others online.

True

A star topology allows nodes to be easily added, removed, or moved, without disrupting the network.

True

All computers in a P2P network belong to a workgroup.

True

Cyber-harassment is defined as cyberbullying between adults.

True

Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.

True

Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.

True

Emojis are small images that represent facial expressions, common objects, and people and animals.

True

Encryption converts plain text into ciphertext

True

In a bus topology, data travels along a single cable that is terminated at both ends.

True

Once a computer is infected, a virus can use an email program to send out copies of itself.

True

Phishing and pharming attempts are successful because they appear to be from legitimate websites.

True

Standards ensure that equipment made by different companies work together.

True

WPS is a way to automatically configure devices to connect to a network by using a button, a personal identification number, or a USB key.

True

______ is one of the most popular C2C websites.

eBay

Which cybercrime is considered to be a form of harassment?

Cyber-Stalking

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

Cyber-Terrorism

By default, Windows computers are set to obtain an IP address automatically, using ________.

DHCP

A data warehouse is used to discover relationships among data items.

False

Network resources refer only to hardware and files.

False

PAN stands for Public Area Network.

False

Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.

False

The only authority responsible for investigating cybercrime in the United States is the FBI.

False

The only program you need to fully protect your computer is a good antivirus program.

False

An Excel spreadsheet is an example of a(n) ________ database.

Flat

In a one-to-one relationship, both tables use the same ________ to link two records.

Primary Key

The rules for communication between network devices are called ________.

Protocols

A ________ connects two or more networks together.

Router

_____ technology is used for sending email messages.

Store-and-foward

Which would make the best primary key in a table?

Student ID

A ________ is a device that connects multiple devices on a LAN.

Switch

Which of the following statements about P2P networks is FALSE?

The service and security are centralized

The Integrated Automated Fingerprint Identification System is considered to be a biometric database.

True

The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

True

The geographic information system combines layers of geographically referenced information about Earth's surface

True

The primary key field uniquely identifies a record in a table.

True

In a WLAN, devices are connected by ________.

WIFI

All the information someone can find out about you by the web is called your______.

Digital Footprint

A decision support system is made up of a knowledge base and an inference engine.

False

A viral video is on that can infect your computer with malware.

False

A workgroup and a homegroup refer to the same network feature.

False

The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.

False

Using a report to enter data into a database decreases the frequency of data entry errors.

False

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.

Https

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?

Human Genome Project

Most home routers also include a built-in ________.

Switch

A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program

True

A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment

True

A firewall can be used to shield your computer from direct access to the Internet.

True

A hotfix resolves individual software problems as they are discovered.

True

A hybrid network in which several LANs are connected together can be called a Campus Area Network.

True

A peer-to-peer network can connect a Linux computer and a Windows PC.

True

The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots.

True

The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.

True

VoIP uses the Internet to transmit calls instead of phone lines or cellular towers.

True

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

VPN

Moving through a neighborhood trying to locate open wireless access points is called ________.

Wardriving

A router is a form of security because it ________

Acts like a firewall

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

Administrator

A ________ changes your home page and redirects you to other websites

Browser highjacker

__________ e-commerce allows anyone to sell or trade items online.

C2C

A distorted series of letters and numbers, called a ______ is used to ensure that you are a human and not a computer.

Captcha

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

Client Server

A(n) ________ improves over time by learning from its interactions.

Cognitive Computing System

Wikis are designed for______, which is allowing people to contribute more than just posting a response.

Collaboration

An email claiming that you have won a lottery might be an example of ________.

Computer Fraud

A DBMS will define a data type for you by evaluating the data currently entered into the fields.

False

A black-hat hacker attempts to find security holes in a system to prevent future hacking.

False

________ make data entry easier because they can be set up to match the layout of a paper document.

Forms

Hacking to make a political statement is called ________.

Hacktivism

The #symbol used by Twitter is called a(n)______.

Hashtag

Which is NOT an advantage of data normalization?

Increases database development time

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.

Inference Engine

A database is a collection of ________ that has been organized in a meaningful way.

Information

Which of the following is a method of synchronous online communication?

Instant Messaging

_______ allows you to communicate with one person at a time.

Instant Messaging

Microsoft Office is an example of a(n) ________.

Office Support System

In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.

One to many

________ allows the user to selectively extract data from different viewpoints.

Online Analytical Processing (OLAP)

A ________ network is a network in which all computers are considered equal.

P2P

Podcasts allow time________, so you can listen on your own schedule.

Shifting

An email ________ is a block of text that is automatically put at the end of your messages.

Signature Line

Antivirus software uses ________ to search for known viruses.

Signature checking

Using social media sites to sell services is called_______.

Social Media Marketing (SMM)

When you are sending one email to everyone in your address book, you should use the _______ field to keep their addresses private.

Bcc

When you trust the collective opinion of a crowd of people rather than an expert, it is known as________.

Crowdsourcing

One of the most important reasons for Ethernet standards is it ________.

Assures equipment from different manufacturers is compatible

______ communication allows you to send a message that the receiver can access later.

Asynchronous

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.

Atomicity

In virtual community, you can communicate with other people by using a(n)__________.

Avatar

________ is the application of information technology to the field of biology.

Bioinformatics

Network speeds are measured in ________ per second.

Bits

________ hackers hack into systems to steal or vandalize.

Black-hat

A _____ is similar to an online journal, in which you can write about anything you want to share.

Blog

To connect peripherals at short ranges, you would use the ________ wireless technology.

Bluetooth

You can use a social______ site to save and share your favorites online.

Bookmarking

________ raises money from multiple small investors rather than a few large ones.

Crowdfunding

The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.

Computer Fraud and Abuse

Which of the following is NOT a common LAN topology?

Hierarchicial

P2P networks are normally found in ________.

Homes

Which statement about a logic bomb is FALSE?

It can spread to other machines

Asynchronous online communication lets you send a message that the receiver can access later.

True

For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

LAN

_____ is a social network that is designed for business connections.

LinkedIn

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.

Lookup

An expert system is a computer programmed to ________.

Make decisions in real-life situations

A Facebook _______ is used to promote an organization, a product, or a service.

Page

_____ recommends music to you based on your listening preferences.

Pandora

Another name for the actual attack caused by a virus is a ________.

Payload

Each computer is considered equal in a ________ network.

Peer to Peer

________ redirects you to a phony website by hijacking a domain name.

Pharming

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

Phishing

When you decide to use your neighbor's open wireless network without permission, you are ________.

Piggybacking

The ________ database is the most popular type used by businesses.

Relational

To print data or display it in an easy-to-read format, a ________ can be used.

Report

If your computer has a ________, someone else can gain access to it undetected.

Rootkit

A ________ is a device that connects two or more networks together.

Router

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

Router

Which device on a network performs network address translation?

Router

______ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.

SEO

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

You should use a(n) ________ account for everyday computing on a computer running Windows.

Standard

A moderated chat room ensures that ______.

That all content is screened.

Which statement about cookies is FALSE?

They cannot collect information you do not want to share

Antispyware software prevents adware software from installing itself on your computer.

True

Which of the following is NOT used to transmit signals on an Ethernet network?

Topology

A data ________ rule would prevent a user from entering text in a date/time field.

Validation

The difference between a virus and a worm is a ________.

Virus needs a host file, a worm does not.

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

WAN

The tools that allow users to create content and have changed the way people communicate and collaborate on the web are known as:

Web 2.0

When a company pays people to hack into its own system, it calls in ________ hackers.

White-hat


Set pelajaran terkait

Chemical reactions study guide chapter 12

View Set

Introduction to Nutrition Chapter 3

View Set

Chapter 11 - Section 3 - The Plantation South

View Set