IS EXAM 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When you visit certain Web sites, spyware may be automatically downloaded. This is called a a. botnet. b. spybot. c. logic bomb. d. drive-by download

d. drive-by download

The World Wide Web was introduced in ________. a. 1969 b. 1984 c. 1991 d. 2000

c. 1991

Unauthorized access to computer systems is called a. a virus. b. spoofing. c. phishing. d. hacking.

d. hacking.

Yahoo!, MSN, and AOL/Netscape are examples of ________. Selected Answer: a. servers b. ISPs c. Web directories d. portals

d. portals

Yahoo!, MSN, and AOL/Netscape are examples of ________. a. servers b. ISPs c. Web directories d. portals

d. portals

With the TCP protocol, a message is sent on the Internet broken into ________. a. addresses b. packets c. URLs d. clusters

b. packets

The top-level domains for countries consist of two letters. a. True b. False

a.true

Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar to a T1. a. upstream b. downstream c. asynchronous d. upload

b. downstrea

One example of a synchronous method of communication is a. blogs. b. instant messaging. c. forums. d. email.

b. instant messaging

________ is software that can be used to encrypt data. a. Malware b. Decrypting software c. PGP d. Forensic software

c. PGP

Cybersquatters are: a. People who do athletics on the Internet b.Hackers who steal information on cyberspace c.People who buy popular domain names to sell them later for a profit d.Identity thieves

c. People who buy popular domain names to sell them later for a profit

Software programs that close potential security breaches in an operating system or application are known as a. security breach fixes. b. refresh patches. c. security repairs. d. security patches.

d. security patches.

If you want to secure an email message, use a(n) a. decrypter. b. encryption key. c. encryption software package. d. cryptosystem.

d. cryptosystem.

f you want to secure an email message, use a(n) a. decrypter. b. encryption key. c. encryption software package. d. cryptosystem.

d. cryptosystem.

Theft of computers is most common for desktop computers. a. True b. False

b. False

XML is used to write small programs called applets. a. True b. False

b. False

_______ is another term for millions of bits. a. Kilobits b. Megabits c. Terabits d. Gigabits

b. Megabits

A worldwide public newsgroup available on the Internet is a. TCP/IP. b. Usenet. c. Listserv. d. Blogger.

b. Usenet.

After an HTML document is completed, it needs to be uploaded onto a ________ server before it's visible on the Web. a. FTP b. Web c. Email d. File

b. Web

________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area. a. 3G b. WiMAX c. Bluetooth d. Infrared

b. WiMAX

RSS-reading applications which periodically visit Web sites, examine the feeds, and display new content are known as ________ a. blogs b. aggregators c. plug-ins d. cookies

b. aggregators

The most effictive type of backup for recovering data after a fire would be a(n) _________ backup. a.incremental b.bootable c.off-site d.archive

b. bootable

A virus that attaches itself to documents that contain macros is called a(n) Selected Answer: a. email virus. b. macro virus. c. Trojan horse. d. time bomb.

b. macro virus.

A(n) ________ converts a message from digital to analog or from analog to digital. a. hub b. modem c. switch d. port

b. modem

What is the most common tool used to restrict access to a computer system? a. biometrics b. passwords c. computer keys d. access-control software

b. passwords

A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site. a. spamming b. phishing c. VPN d. MMORPG

b. phishing

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a a. Trojan horse. b. virus. c. worm. d. botnet.

b. virus.

The most effictive type of backup for recovering data after a fire would be a(n) _________ backup. incremental bootable off-site archive

bootable

________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true broadband speed. a. 4G b. DSL c. 3G d. Wi-Fi

c. 3G

T3 connections transmit data at this speed a. 1 Mbps. b. 1.5 Mbps. c. 45 Mbps. d. 1 Gbps.

c. 45 Mbps.

________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time. a. Attenuation b. Megahertz c. Bandwidth d. Ethernet

c. Bandwidth

A personal area network is possible because of the wireless technology known as a. USB. b. FireWire. c. Bluetooth. d. PDA.

c. Bluetooth.

Which of the following statements about Web page authoring is FALSE? a. Web pages can be written without any special Web authoring tool. b. Microsoft Expression Web is an example of a Web authoring tool. c. Programs such as Microsoft Word cannot be used to author Web pages. d. Web authoring tools generate the underlying HTML code for a Web page.

c. Programs such as Microsoft Word cannot be used to author Web pages.

Which statement is NOT true regarding antivirus programs? a. They are designed to search for and remove viruses. b. They will notify users when a virus is found. c. They always detect every virus on a PC. d. They must be updated to remain effective.

c. They always detect every virus on a PC.

Which statement is NOT true regarding antivirus programs? a. They are designed to search for and remove viruses. b. They will notify users when a virus is found. c. They always detect every virus on a PC. d. They must be updated to remain effective.

c. They always detect every virus on a PC.

Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1 gigabit per second. a. node b. local area c. backbone d. mesh

c. backbone

Internet connections that work through the same network of coaxial cables that deliver television signals work through a ________ modem. a. fax b. satellite c. cable d. POTS

c. cable

A(n) ________ cable uses light waves to transmit multimedia and voice data. a. copper b. twisted-pair c. fiber-optic d. coaxial

c. fiber-optic

The most basic computer network can be described as a. a minimum of five computers linked together. b. the Internet. c. two or more computers that are linked together. d. the use of satellites linking computers together.

c. two or more computers that are linked together.

Every host computer on the Internet has a(n) ________. a. similar IP address b. unique 15-digit number c. unique IP address d. DNS

c. unique IP address

In the email address [email protected], "bowles" is the ________. a. password b. server name c. user name d. client computer

c. user name

A ________ stores data and software that can then be shared by several users. a. file server b. firewall c. thread d. client

a. file server

The protocol used to transfer Web pages is ________. a. http b. ftp c. smtp d. dns

a. http

An autonomous system can assume almost complete responsibility for a task and minimizes risk because of its absolute reliability. True False

False

The Web was built with push technology. True False

False

A programmed attack that destroys data files if a programmer is ever terminated is an example of what kind of Trojan horse? a. logic bomb b. Code Red c. Melissa d. spybot

a. logic bomb

A ________ is a hardware device that connects a computer to a telephone line. a. modem b. router c. network card d. hub

a. modem

What is a coaxial cable made of? Mostly copper Glass fibers Mostly copper and aluminum Mostly plastic

Mostly copper and aluminum

What is a coaxial cable made of? Mostly copper Glass fibers Mostly copper and aluminum Mostly plastic

Mostly copper and aluminum

Which department of the U.S. government developed the initial stages of the Internet? a. Department of Commerce b. Department of Defense c. CIA d. Judicial Department

b. Department of Defense

Which key of the computer cannot be shared with other computers? Public key Private key

Private key

What is the major light principle fiberoptic cables are based on? Total reflection Deviation Brightness Color

Total reflection

"Cracker" is the correct term for the term "hacker" we use today. True False

True

Bill Gates was the original developer of the World Wide Web. a. True b. False

b. False

Computer forensics is a form of computer crime. a. True b. False

b. False

Networks that use electrical lines are sometimes called ________. Selected Answer: a. power-line networks b. electrical-line networks c. twisted pair networks d. power-line paired networks

a. power-line networks

The first part of a URL refers to the ________ that must be used to access information, for example http. a. protocol b. user name c. host d. domain

a. protocol

When radio or TV broadcasts are streaming at the same time they are happening, it is called a. real-time. b. plug-in. c. 3-D. d. RealOne.

a. real-time.

Nonprofit organizations' URLs typically end with .net. a. True b. False

b. False

When a business can legally copy software to all of the computers they own, the company has a ________ license. a. site b. company c. pirate d. sharing

a. site

RAID is a collection of Internet-based disks that serve to back up a hard drive. a. True b. False

b. False

Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack. a. social engineering b. hacking c. identity theft d. trojan horse

a. social engineering

This IP address doesn't change every day: a. static IP address. b. dynamic IP address. c. unique IP address. d. common name and number

a. static IP address.

Computer crime often goes unreported because businesses fear negative publicity. a. true b. false

a. true

In 2000 the U.S. government found Microsoft guilty of operating a monopoly. a. true b. false

a. true

The latest version of the Internet Protocol is IPv9. Answers: a. True b. False

b. False

A(n) ________ server maintains look-up tables that map domain names to IP addresses. a. DNS b. Web c. DHCP d. Ethernet

a. DNS

The system of satellites used to determine any position on the Earth is known as a. GPS. b. LAN. c. Wi-Fi. d. MAN.

a. GPS.

A DSL connection can share signals with a telephone line. Selected Answer: a. True b. False

a. True

Adobe Flash and Microsoft Silverlight both can be used to create media-rich Web components. a. True b. False

a. True

All e-mail addresses consist of a user name, followed by the @ sign, followed by a host address. a. True b. False

a. True

The digital divide separates people in the world with access to technology and digital information from those who do not. a. True b. False

a. True

To register a business name and create a unique URL, a business pays a fee that goes to ________. a. a domain name registry company b. the Department of Commerce c. Google d. Microsoft

a. a domain name registry company

A(n) ________ signal is represented by a continuous wave. a. analog b. digital c. bandwidth d. network

a. analog

In the Web address www.bbc.co.uk, "uk" is a(n) ________. a. country code b. protocol c. domain name d. file path

a. country code

The scrambling of code in an email message can be done using a. cryptography. b. programming. c. auditing. d. decryption

a. cryptography.

The name for harassment on the Internet is a. cyberstalking. b. cyberpersecution. c. cyberdenigration. d. cyberhounding.

a. cyberstalking

T1 and T3 connections are considered ________ connections. a. direct b. dial-up

a. direct

In 1999, the Melissa virus was a widely publicized a. email virus. b. worm. c. Trojan horse. d. time bomb.

a. email virus.

T1 connections transmit data at this speed: a. 1 Mbps. b. 1.5 Mbps. c. 45 Mbps. d. 1 Gbps.

b. 1.5 Mbps.

Which of the following is a legal IP address? a. 124.14.19 b. 144.12.18.8 c. 13.15.188.12.4 d. 123.44.1.14.1.55

b. 144.12.18.8

In what decade was ARPANET developed? a. 1950s b. 1960s c. 1970s d. 1980s

b. 1960s

The World Wide Web is a distributed browsing and searching system originally developed at ________. a. CSPAN b. CERN c. POTS d. Microsoft

b. CERN

Web authoring software includes all of the following EXCEPT ________. a. Microsoft Expression Web b. Adobe Dreamweaver c. Apple's iWeb d. Adobe Acrobat

d. Adobe Acrobat

In the 1970s, Xerox developed ________, which continues to be a popular networking architecture. Selected Answer: Incorrectc. extranet Answers: a. Wi-Fi b. the Internet c. extranet d. Ethernet

d. Ethernet

Unlike the Web protocol, the ________ protocol is designed solely to allow files to be transferred from a server to a client. a. HTTP b. HTTPS c. SMTP d. FTP

d. FTP

All of the following statements are true EXCEPT a. Wireless networks are convenient for people on the move. b. Wireless networks are easier to install because they don't require drilling or digging. c. Wireless networks use radio transmitters. d. Wireless networks are faster than wired networks.

d. Wireless networks are faster than wired networks.

URLs uniquely identify ________. a. a Web site b. an email address c. a computer d. a Web page

d. a Web page

Using Internet applications differs from using PC applications because the Internet is based on a ________ model. Answers: a. login b. distributed server c. digital server d. client/server

d. client/server

The following are all examples of broadband access EXCEPT ________. a. DSL b. cable c. satellite d. dial-up

d. dial-up

A ________ helps block unauthorized access to a computer. a. bridge b. VPN c. WEP d. firewall

d. firewall

According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds

d. two-thirds

According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds

d. two-thirds

Bluetooth technology can reach a range of 10 meters. Selected Answer: a. true b. False

true


Set pelajaran terkait

Transcription the first stage of gene expression

View Set

Human Resource Management Test 1

View Set

Inductive and Deductive Reasoning and logical fallacies

View Set

MICROSCOPY • OPERATION OF A BRIGHTFIELD MICROSCOPE

View Set

MyLab concept of Acid-Base Balance/Metabolic Acidosis/ Metabolic Alkalosis/ Respiratory Acidosis/ Respiratory Alkalosis NCLEX-style Questions

View Set

Survivorship Curves, Life History Traits, Population Growth Models

View Set

Chapter 58: Care of Patients with Liver Problems

View Set

Accounting Chapter 2.1 (Cost Behavior Patterns)

View Set