Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The ___ of a network is the logical layout of the cables and devices that connect the nodes of the network

topology

False statement regarding employee monitoring

most types of employee monitoring and internet restrictions at the workplace are illegal

___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises

scalable

Type of malware that's attached to a host file and has the ability to replicate, or copy, itself

virus

The act of alerting the public about harmful activities that are being hidden by an organization is called

whistleblowing

Type of malware that consists of a fully-contained program that self-replicates and spreads through computers and networks

worm

copyright protections last for ___ years after the death of the author

70

Module

a collection of macros located in VBE

Most of the ___ responsibilities are carried out by private companies, such as when YouTube removed a video that violates their terms of service

censorship

The name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs

copyright

A ___ is any step you take to ward off a threat

countermeasure

Which device can guard connected equipment against large power spikes or surges that may infrequently occur?

surge protector

Code Window

the window in VBE that displays the VBC for a macro

What is NOT one of the specifications of Wi-Fi technology?

802.11z

___ is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices

Ethernet

The ___ of a website or forum contains common questions and their responses

FAQ

A(n) __ uniquely identifies every network-connected device in the world

MAC address

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information

MIS

Type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system

Trojan horse

One popular of a machine's ability to think is known as the ___ test

Turing

A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails

UPS

Method

an action that can be performed on an object (copy, delete, save, close, etc.)

Property

an attribute of an object in Excel that defines/changes one of its characteristics (name, size, color, formula, value, or location). All objects have properties

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used

attribution

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as

automation

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time

bandwidth

Term that refers to the technology gap between different social and economic classes

digital divide

Local Window

displays variables and how they change as a macro is run. Useful when debugging

Comments

documentation located in the VBC to help clarify the purpose and meaning of the macro. Provide information about the macro without effecting the code.

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat

dust

Object

element of Excel Application (worksheet, cell, range of cells, entire workbook). Code is written to manipulate an object by performing an action on that object (through a method) or changing a characteristic of an object (through a property)

___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make

ethics

A(n) __ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.

expert

The name given to the limited set of circumstances where others can use portions of the copyrighted material without first obtaining permission

fair use

Systems known as ___ are able to continue their operation even when problems are present

fault-tolerant

Project Explorer Window

located on the left side of the VBE. Allows access to macros

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee

logs

Data ___ is the discovery of new patterns or relationships between data

mining

Machines that communicate over a network must follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly.

protocols

Visual Basic Editor(VBE)

provides advanced editting capabilities including automatic syntax checking, tips and quick information, color coded programs for readability, etc.

The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for internet connectivity

routers

The scam referred to as ___ typically comes in the form of an alert message that claims to be from the FBI or your security software

scareware

The ___ mode on a computer will place it in a low-power state when it is not being used

sleep

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs

social engineering

___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems

software engineers

Type of malware that is designed to report activity on your computer to another party

spywar

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company

telecommuting

syntax

the set of rules specifying how you must enter VBC. You must follow the syntax precisely or the macro will not run

Term that refers to the large volumes of data that are constantly being generated by our devices and digital transactions

Big Data

Large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks

Botnets

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current?

Fiber-optic

____ allow users to communicate and share information between computers and various devices

Networks

Company that does NOT allow digital movie rentals

Pandora

Which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

Switch

Entity that passed the GDPR, which forces online companies to adhere to a list of guidelines related to the collection, use, storage, and removal of personal data

The European Union

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n)

VPN

Visual Basic for Applications (VBA)

a programming language you can use to create macros

Which browser feature will delete your history, cache, and cookies the moment you close the special window

private browsing

For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them

prosthetics

Many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware

file-sharing

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes

hacker

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account

two-factor authentication

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests

DDoS

___ refers to the technology that protects copyrighted material, such as copy protection and authenticity checks

DRM

False statement about recycling and reducing waste

Most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems

A government agency that has the capability to monitor the internet and mobile activities of individuals

NSA

A(n) ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area

WAN

Displays a form of artificial intelligence with its astounding capabilities to understand complex questions and quickly find the answers using large databases of information

Watson

What are the three strategies used to authenticate individuals?

What you have, what you know, who you are

Variable

a named storage location in VBE that contains data you can retrieve and modify while the macro is being executed. Variables are created and defined (DIM) within the code. Once you create a variable and give it a value, you ca assign the value to an object

macros

a series of commands, actions, and functions that can be stored and initiated whenever you perform a particular task

A document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources

acceptable use policy

All nodes connect to a wireless ___ in order to communicate wirelessly

access point

The use of living organisms to manufacture new products or improve existing ones is called

biotechnology

___, which refers to repeated hostile behaviour with intent to harm another, has led to many teenagers seeking therapy or even committing suicide

cyberbulllying

___ robots are those that are created to imitate the appearance or capabilities of humans

humanoid

The creation or manipulation of matter at the smallest possible scale is known as

nanotechnology

An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as

neural network

Networks use media to carry data from one ___, or connection point, to another

node

general syntax for VBC

object . property = expression

Today, our ___ behaviour can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe

online

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party

outsourcing

___ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device

packets

Strategy involving luring individuals into entering personal information into a website that is controlled by a hacker

phishing

Acquiring or exchanging copies of protected digital creations without payments to or permission from their creator is known as

piracy

Used by many online companies to describe what information is collected from users and what is done with that information

privacy policy

Visual Basic Commands

the steps of the macro that define the macro's functionality. VB commands are referred to as "macro code". We use objects, properties, methods, and variables to create commands


Set pelajaran terkait

DRUGS, PHARMACOLOGICAL Therapy, IV Therapy

View Set

Adverse Effects of Blood Transfusion

View Set

Vocabulary Workshop Level E, Unit 6-10,

View Set

DECA Hospitality and Tourism Cluster - Performance Indicators (DETAILED)

View Set

Policy Provisions, Options and Riders

View Set