ITEC FINAL
Consisting of a network of 500 sensors used to collect data to improve quality of life, The array of Things in the city of ___ feeds data such as pollution levels and traffic patterns to an open site on the internet.
Chicago
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
The internet service that tends to provide the most consistent speeds is
DSL
A separate processor (computer) in your computer that enhances your video is called the ___ .
Graphic Processor (GPU)
Which of the following is NOT true about the privacy risks with cookies.
Hackers can use cookies to launch attacks on your computers.
A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a _____.
LAN
Which of the following is NOT example of management information systems (MIS) _____
MBA
The Da Vinci robot, named after the famous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow ___ to perform intricate procedures.
surgeons
copyright protection varies from nation to nation
true
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
Which of the following is a strength of the Windows platform?
wide availability of software options
The protocol for wireless networks is called ___ .
wifi
Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.
wifi hotspots
A computer controlled by a hacker is called a _____.
zombie
Data flows between different parts of the computer via _____ .
Buses
The DMCA was to create an updated version of ___ laws to deal with the issues of regulating digital material.
Copyright
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
ERP
Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas
ICARUS
Which of the following is NOT the examples of uploading files.
printing a document
A virtual _____ network (VPN) creates a secure connection between 2 computers.
private
Which of the following statements that are NOT true regarding switches
the primary function of a switch is to connect 2 networks
Which of the following statements that are NOT true regarding cable Internet service.
uses same twisted pair line
Software that infects a computer and is created using computer code is called a computer _____.
virus
When talking about business decision making, the acronym BDA stands for _____.
Big Data Analytics
A short-range wireless transmission protocol is known as _____ .
Bluetooth
A _____ is a group of two or more devices/computers connected together to allow for the exchange and information and for the sharing of resources such as printers.
Network
What manages hardware and software, supports the computer's basic functions, and runs programs?
OS
Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.
Overclocking
Unlike circuit switching, data transfer with ___ doesn't rely on a dedicated physical path.
Packet Switching
Software comes in various categories. One category is system software, which provides the instructions that hardware needs to operate (iOS, Android, Windows, etc.). Another category is game software (League of Legends, Hearthstone, Angry Birds, etc.). Another category of software includes applications such as Office 365, iWork, QuickBooks, Googledocs, etc. This software is referred to as ___ software.
Productivity
A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.
Quantum
The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___
RAM
The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .
ROM
Joe's boss said she wanted to host a synchronous online video conference. Joe knows that synchronous means that ___ .
The conference will take place in real time
URL stands for ___ Resource Locator.
Uniform
One advantage of using a web-based Email service, such as Gmail, is that ___ .
Users can access it from nearly any Internet-connected device.
When two or more LANs have been connected using a public network a _____ is created.
WAN
In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
Which of the following is NOT needed to install a home WiFi network?
a bluetooth device
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system.
authentication
Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.
bit
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.
control
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
Which of the following statements about Facebook is true?
cyberstalking and oline predators are real problem
Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.
diabetes
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.
dual band
_____ software is designed to track and record the use of network and hardware resources in the workplace by employees.
employee-monitoring
Which transmission media has the largest bandwidth?
fiber optic
A security system separating 2 networks or even computers on the same network is called a ___ .
firewall
Which of the following is a strength of a Linux platform?
free to download and use
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
holographic
All of the following are true about Instagram except
instagram charges fee to download
__ consists of human knowledge and ideas that the law protects against unauthorized use by others.
intellectual property
isp stands for
internet service provider
Which of the following are NOT ways to prevent computer virus infections.
leaving thumb drives and dvds in your computer when you restart it
Be careful to only open emails from senders you know and trust. ____ may be contained in email messages
malware
Select what is NOT true regarding applets.
not included with the operating system
Which of the following is NOT characteristics of a modem.
often transmits bluetooth signals
A computer platform is commonly referred to as a _____ system or OS.
operating system
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system, OS
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
Software that can be added to a browser to increase its functionality are called ___ .
plugins
Which of the following is NOT considered cybercrimes?
pop-up advertising
All of the following are best practices when using LinkedIn except
post vacation photos to show friends where youve travelled
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .
radiologists
Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ .
self-driving trucks
Data from the hard drive reaches the CPU ___ than data from the RAM.
slower
An unsolicited email message is called _____.
spam
Which of the following is NOT common types of malware ______ .
spam