info 160 all terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

privacy tools

- Private Browsing - InPrivate - Incognito

a bit consists of

0 or 1

8 binary digits is equal to

1 byte

a megabyte is how many bytes

1 million

a kilobyte is how many bytes

1000

Hexadecimal represents numbers using which base?

16

What is the base for hexadecimal numbers?

16

Expressed in decimal, the range for RGB colors is 0 to ________.

255

How many colors are used in the RGB system?

3

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A Trojan horse

File History

A Windows utility that automatically creates a duplicate of your libraries, desktop, contacts, and favorites and copies it to another storage device, such as an external hard drive.

Task Manager

A Windows utility that shows programs currently running and permits you to exit non responsive programs when you click End Task.

Wiki

A collaborative website that can be edited by anyone that can access it.

zombie

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.

Copyleft

A license that grants users the right to modify and redistribute the software

encryption virus

A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.

file compression

A process that reduces a file's size for storage or transmission purposes.

Basic Input/Output System (BIOS)

A program that manages the data between a computer's operating system and all the input and output devices attached to the computer; also responsible for loading the operating system (OS) from its permanent location on the hard drive to random access memory (RAM).

device driver

A software program that provides the instructions your computer needs to communicate with a device, such as a scanner.

Desktop Email Application

A type of email application, such as Microsoft Outlook, which is installed onto a computer.

System Restore

A utility in Windows that restores system settings to a specific previous date when everything was working properly.

boot sector virus

A virus that replicates itself into the master boot record of a flash drive or hard drive.

Which of the following is not an Internet protocol?

ARPANET

________ software helps small business owners manage their finances more efficiently.

Accounting

custom installation

Allowing user to decide which features of the software he wants to install in a computer's hard drive

Beta Software

An early version of a software program that is often provided free to users to test for bugs before the program is sold to consumers.

Which of the following optical storage devices holds the most high-definition video?

BD

Where can you create and maintain a blog for free?

Blogger.com

The main internal hard drive on a Windows computer is usually identified as the ________ drive

C:

________ is a type of memory that uses almost no power and is never erased.

CMOS

considered the brains of the computer

CPU

what is found on the motherboard

CPU, RAM, ROM, and cache

Wildcard

Characters to find words or phrases that contain specific letters or combination of letters.

pinning

Choosing which applications are tiles on the start menu

Accessibility Utilities

Designed for users with special needs

top-level domain

Domains (including .net, .org, .com, .mil. and the set .xx country codes) at the end of a domain name are the highest level of the domain name hierarchy.

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

File History

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

Which of the following best describes the transmission lines with the fastest speeds?

Internet backbone

Which is NOT a feature of security software?

Keystroke logging

Which of these File Explorer views would be best if you are looking for a specific picture?

Large Icons

real-time operating system (RTOS)

Machinery that performs a repetitive series of specific tasks in an exact amount of time

Pharming

Malicious code planted on your computer to gather information

Scareware

Malicious software of no benefit that is sold using scare tactics

When using File Explorer, the left-hand pane that shows the contents of the computer is called the ________ pane.

Navigation

Which of the following virus types changes its own code to avoid detection?

Polymorphic

open source software

Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.

multimedia software

Programs that include image, video, and audio editing software, animation software, and other specialty software required to produce computer games, animations, and movies.

When the POST is complete, the operating system is loaded into ________.

RAM

The BIOS is stored ________.

ROM chip

Files deleted from your Windows computer's hard drive are stored in the ________ until they are permanently deleted.

Recycle Bin

If your Windows 10 computer has trouble when booting, ________ attempts to diagnose and fix the system files.

Reset this PC

What is a specialty search engine?

Searches only sites deemed appropriate to an interest or industry

time bomb/logic bomb

Software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or both.

antivirus software

Software used to detect and eliminate computer viruses and other types of malware.

word processing software

Software used to prepare text documents such as letters, reports, flyers, brochures, and books.

simulation programs

Software, often used for training purposes, which allows the user to experience or control an event as if it is reality.

If you encounter a problem, the Windows ________ feature can take your system back in time to a point where it was working properly.

System Restore

preemptive multitasking

The OS processes the task assigned a higher priority before processing a task assigned a lower priority

file explorer

The file management tool in Windows 8 used to organize files.

quarantining

The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.

In the RGB system, when all three component colors are set to zero, what is the result?

The resulting color is pitch black.

multimedia software.

The software that allows you to edit digital images, videos, as well as digital audio is called

Ergonomics

The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.

How do metasearch engines work?

They search other search engines' results.

Which of the following statements is NOT true about identity theft?

Thieves can easily defeat 2-factor authentication.

Who built and operates the Global Positioning System?

U.S. Department of Defense

most common computer port

USB

Which of the following ports has the fastest data transfer rate?

USB 3.1

uncompressed audio file format

WAV

Ports

________ are the places that peripheral devices attach to the computer.

spreadsheet software

a computer program that allows you to insert numbers and formulas to compute amounts(microsoft exel, libreoffice)

Some spyware catches your private information by using

a keystroke logger.

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

virus signature

a portion of virus code that is unique to a particular computer virus

trojan horse

a program that appears desirable but actually contains something harmful

Videos can be embedded in a blog from all of these sources EXCEPT ________.

a tv

email virus

a virus transmitted by email that often uses the address book in the victims email system to distribute itself

a sensor found in certain smartphones

accelerometer

When booting a Windows 10 computer, the first step is ________.

activating the BIOS

An unusual advertisement on your computer screen that pops up is usually caused by ________.

adware or spyware

multiuser operating system (network operating system)

allows multiple users access to the computer at the same time

database software

an application that allows users to create, access, and manage a database

top mobile operating systems

android, windows, IOS

note taking software

application software that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page(one note, ever note)

personal information manager (PIM)

application software that includes appointment calendar, address book, and a notepad (microsoft outlook)

The width-to-height proportion of a monitor is known as what?

aspect ratio

bit is short for

binary digit

Someone who maliciously invades a computer system to steal or destroy information. is known as a(n) ________.

black-hat hacker

Viruses that load from USB drives left connected to computers when computers are turned on are known as

boot-sector viruses.

What is the navigation aid that shows users the path they have taken to get to a web page located within a website?

breadcrumb trail

B2B commerce

business to business

The decimal number 12 is represented in hexadecimal as ________.

c

Microsoft Outlook

calendars, tasks, emails

Once you encrypt your SD card, those files

cannot be read if the SD card is put in another phone.

Backing your work up to a(n) ________ is more secure than using an external hard drive.

cloud storage location

logical port blocking

completely refuses requests from the internet asking for access to specific ports

cookies

computer program, installed on hard drives, that provides identifying information

Adware

computer software that displays advertisements

has moving parts, so it is more prone to malfunction

conventional hard disk drive

What does the OS do?

coordinates and directs the flow of data and information

backups

copies of files that you can use to replace the originals if they're lost or damaged

Adobe Illustrator can be used to ________.

create technical drawings

the representation of a fact, figure, or idea

data

The most common occurrence of identity compromise is through ________.

data breaches of a company that stores your information

In everyday life, the most commonly used number system by people is ________.

decimal

Which of the following numbering systems is ordinarily used by people?

decimal

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a_______ attack.

denial-of-service

The ________ is the primary working area in Windows 10.

desktop

________ software allows users to design and layout complex documents such as brochures and newsletters.

desktop publishing

In which view are files and folders displayed in list form, with the additional file information displayed in columns alongside the file names?

details

When you are sorting files and folders in File Explorer, use ________ view to get the most interactive view available.

details

distros

different versions of linux

Adobe Premier is an example of ________.

digital video-editing software

Which component of a computing device drains the battery the fastest?

display screen

what can be both an input and output device

display screen

You would use Windows Action Center to check all of the following except ________.

display settings

taskbar

displays open and favorite applications for easy access

Attacks that are launched from multiple zombie computers at the same time are called ________.

distributed denial-of-service attacks (DDoS)

A metasearch engine like Dogpile eliminates ________ in its results.

duplicates

power-on self-test (POST)

ensures that essential peripheral devices are attached and operatal

Which of the following ports are used to connect a computer to a cable modem or to a network?

ethernet

You can increase the number of USB ports on your computer by adding a(n) ________.

expansion hub

In c:\cis\400\proj3.docx, the docx is a(n) ________.

extension

RAM is non-volatile storage.

false

packet filtering

filters out packets sent to logical ports

"quicken" is an example of what software

financial management

When installing new downloaded software, if the setup program doesn't automatically launch, you would ________.

find the setup files where you downloaded them and run setup.exe

Copyrighted software that certain program developers distribute for free is known as ________.

freeware

When you install all the most commonly used files and programs to your computer's hard drive, you have completed which kind of software installation?

full installation

The Android smartphone operating system was developed by ________.

google

an example of a web based OS is

google chrome

Operating systems that have windows and icons have which type of user interface?

graphical interface(GUI)

a collection of Tiles on the Start Menu

group

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

________ usually have the largest storage capacity of any storage device inside the computer.

hard drive

directory

hierarchical structure that includes files, folders, and drives

The list of results returned to you when you search for information on the web is called a list of ________.

hits

User Interface

how the user interacts with the computer

data that has been organized is called

information

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

inoculation

4 main functions of a computer

input, output, storage, processing

When a printer receives a command, it generates a unique signal to the OS, which is called a(n)

interrupt

A packet analyzer is called a sniffer because

it captures and reads data inside each packet.

Google is an example of a ________ search engine.

keyword

botnet

large group of software running on zombie computers

denial of service attack

legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie

The power-on self-test does all of the following EXCEPT ________.

load the operating system

Which type of software is not upgraded automatically?

locally installed

Firewalls work by closing ____ in your computer.

logical ports

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

logical ports

Phishing

luring ppl into revealing info

malware

malicious software

Which of the following is usually NOT listed in the software's system requirements?

monitor

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

network address translation (NAT)

are data and information interchangeable

no

is A flash drive is needed to read a flash memory card?

no

is The web is based on the WWW protocol?

no

identity theft

occurs when a thief steals personal info and poses as you

Pretexting

occurs when someone deceives by pretending to be someone else

Device drivers are

often bundled with the operating system.

Emptying the Recycle Bin should be done ________.

only after you have determined that you no longer need any of the files that you have deleted

________ is free software that is distributed with few licensing and copyright restrictions.

open source

LibreOffice is an example of which type of software?

open source software

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

packet filter

A(n) ________ is a program that analyzes the contents of data packets on a network.

packet sniffer

A firewall designed specifically for home networks is called a ________ firewall.

personal

The process of adding a Windows 10 app to the Start menu is known as

pinning

The most common output device for hard output is a

printer

Setting a system restore point should be done ________.

prior to installing new software

What web browser feature would be particularly useful when using public computers?

privacy browsing

turns data into information

proccessing

virus

program that attaches to a computer program and spread to others

macro

program that groups a series of commands into one

Start Menu

provides access to all applications

Blog posts are not publicly available until they are ________.

published

Inoculation

records key attributes ab your computer files and keeps stats in a safe place

bit

represented by 1 or 0

When installing new software on a Windows computer, it is a good idea to create a(n) ________ point so that if problems arise, you can return your system back to how it was before you started.

restore

If you inadvertently delete a needed file from your computer's Documents folder, in Windows, you can recover it by ________.

restoring it from the Recycle Bin

The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the

root directory

A ______ is a program that takes complete control of your computer without your knowledge.

rootkit

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as

scareware

A series of commands that are executed without your knowledge is a typical attribute of a(n) ____________ virus.

script

A specialty search engine is a(n) ________.

search engine that searches only sites that are relevant to a particular topic

Which feature in Google Chrome enables you to restrict search results by Size, Color, Type, Time, or Usage rights?

search tools

A metasearch engine is different than a regular search engine because it ________.

searches other search engines instead of individual websites

VPN (Virtual Private Network)

secure networks that are established using the public internet infrastructure

power control option that leads to a cold boot

shut down

Software that is hosted by the vendor and accessed online is called

software as a service

spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

exploit kits

software that runs on servers searching for vulnerabilities

inkjet printer

sprays ink onto paper

Which type of productivity software would you most likely use to do calculations and what-if analyses?

spreadsheet

tiles

square icons that appear on the Windows 10 Start Menu

optical storage devices

store and read data using light

The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software are called

system requirements

Which feature of a browser enables you to separate a browser tab into its own window?

tear off tabs

A GUI user interface is special because

there is a set of icons that represent the OS tasks.

The Better Business Bureau seal on a website indicates ________.

third-party verification

App Creation Software examples

thunkable, app inventor, unity, corona sdk

Logical ports are virtual, not physical, communications paths.

true

Windows Defender protects your computer from all of the following EXCEPT ________.

unexpected software updates

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

You should ________ to remove a software application from your computer.

use the Uninstall Program feature in the Control Panel

biometric authentication

uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

The OS can optimize RAM storage by using

virtual memory

Antivirus software looks for ____ to detect viruses in files.

virus signatures

What color is displayed if each color in the RGB system is saturated?

white

Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.

white-hat hacker

top 3 operating systems for personal computers

windows, macOS, linux

Which of the following are considered slightly different from viruses because they can run without user interaction?

worms

When you set up your blog, can you can turn off comments?

yes

All of the following are true of virus protection software packages EXCEPT ________.

you can only scan the entire computer each time you perform a scan

ShieldsUP and LeakTest are software programs you can use to test whether ________.

your firewall is working correctly


Set pelajaran terkait

Final exam semester 2 Junior English terms

View Set

Personal Health -- Ch. 6: Manage Stress

View Set

Chapter 7-Chapter Decision Making and Concept Selection

View Set