CGS 2060 final SG

Ace your homework & exams now with Quizwiz!

Select the advantages of using a database instead of a traditional filing system.

-A database can hold larger amounts of data -A database can provide better data integrity

Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).

-Allow cookies. -Delete cookies. -Block cookies.

Select the cell phone manufacturers.

-Blackberry -Xiaomi -Huawei

Select the common Internet transmission media.

-Coaxial cable -Telephone wire -Cell phone radio waves

Cyberattacks include

-DDoS attacks -identity theft

Select the following statements that are true regarding filters.

-Filters limit the material browsers fetch. -Parents often use search engine filters to restrict offensive images from being displayed on computer monitors. -Filter settings are often accessed through a browser's preferences

Which of these devices are manufactured by Samsung?

-Galaxy -Note

Which of these operating systems is based on Linux and used on smartphones

Android

If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.

CTRL

Sage was developed during the _____ war.

Cold

The Internet service that tends to provide the most consistent speeds is _____.

DSL

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.

Data Administration

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

Distributed

A collection of related records in a database is referred to as a _____.

Table

Select the domain name.

mheducation.com

The word modem stands for ____.

modulator-demodulator

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .

players

Contact your ISP if your actual Internet speed is _____ than advertised.

slower

An unsolicited email message is called _____.

spam

Software that infects a computer and is created using computer code is called a computer _____.

virus

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

wifi hotspot

Select what's true about the privacy risks with cookies.

-Websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior.

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

-What field name will the data fall under -What data type will be included

Identify what's true about script kiddies.

-amateur computer hackers with little programming expertise -illegally gain access to computer systems using programs (scripts) that others have written

You can change your Firefox settings to allow you to

-approve cookie storage requests. -deny cookie storage requests. -delete stored cookies automatically when you start Firefox.

There are a variety of cookie settings that can be adjusted in Google Chrome including

-blocking/allowing cookies by default. -deleting cookies. -making exceptions for cookies from specific websites or domains.

Select what's true regarding dual band routers.

-can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals in the 5.0 GHz frequency range -minimizes the impact of interference from microwave ovens and car alarms

Select the characteristics of a router.

-connects networks -provides hardware firewall protection -usually incorporates a switch

Identify common symptoms of a computer virus.

-documents won't save -computer runs extremely slowly -programs launch on their own

Rootkits allow a remote user to do which of the following.

-install rogue files -create backdoor programs -delete files

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

-keystrokes. -passwords. -confidential information.

Select the advantages of a 3G phone

-more energy efficient - battery lasts longer -less expensive

Select the statements that are true regarding Cellular Internet service.

-uses cell phone radio waves to transmit and receive Internet signals -Many providers offer data packages that may place limits on uploading and downloading. -Many smartphones can send and receive WiFi signal, allowing them to become hotspots.

Select the statements that are true regarding Satellite Internet service.

-uses microwaves to deliver service -provides broadband service virtually anywhere -Customers usually purchase a data plan that limits uploading and downloading.

Select the statements that are true regarding DSL Internet service.

-uses telephone wires as transmission wires -Internet signals tend to be very consistent

Common types of malware include______ .

-viruses -worms -Trojan horses

Which of the following file extensions is commonly used for term papers and other word processing tasks?

.docx

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

.exe

Which of the following file extensions is commonly used for drawings?

.gif

Select the common video file formats.

.mov .avi

Select the common audio file formats.

.mp3 .mp4 (M4A) .wav

Select the common word processing file extensions.

.odf .docx

1) Modem 2) Router 3) MAC address 4) Switch

2) connects two networks 3) identifies a device within a network 1) converts analog signals into digital signals and digital signals into analog signals. 4) connects devices within a network

1)The distribution of computer applications over the Internet. Commonly referred to as web apps. 2) A programming environment used to develop, test, and disseminate web apps via the Internet. 3) An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.

3) IaaS 2) PaaS 1) SaaS

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

File Explorer

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transfer Protocol

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .

HDX

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Management

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

Manipulation

Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .

OneDrive

Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .

Organize

To search a database for information, create a ___ .

Query

The type of database that uses common fields to create links between tables is called a ___ database.

Relational

A link between tables in a relational database that defines how the data is related is called a _____.

Relationship

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

Safari

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan horse

To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .

View

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

WPA

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

Which might be a choice for Internet service in your area?

cable Internet

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

cube

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

Which of the following would be considered a cybercrime?

data manipulation

SAGE was developed by the US Department of ___ .

defense

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

digital - analog converters

A ___ name identifies a server site on the Internet.

domain

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double-click

Which transmission media has the largest bandwidth?

fiber optic

A URL identifies a particular __ address on the World Wide Web.

file

A security system separating 2 networks or even computers on the same network is called a ___ .

firewall

In order to keep your files organized, it's a good idea to create ___ and place your files in them.

folders

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

individual users

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

large

Fiber optic cable is _____ expensive than coaxial cable to install.

more

The BitTorrent protocol is often called ___ file sharing.

peer-to-peer

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.

right-click

An easy way to rename a folder in Windows is to ___ -click on the folder and then click Rename.

right-click

The device that connects 2 networks is a _____.

router

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

script kiddies

ISP stands for:

Internet Service Provider

The World Wide Web was created through a collaboration led by ___ .

Tim Berners-Lee

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

Which of the following should be considered when choosing an ISP?

-How many users will be logged on my network at the same time? -Will user's be streaming data? -What ISP choices are available in my area?

Which of the following are true regarding IP addresses?

-IP stands for Internet Protocol. -In most home networks IP addresses are assigned by the Internet Service Provider. -If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.

Which of the following are ways to prevent computer virus infections.

-Install the latest antivirus software and update frequently. -Downloaded content from the web should only be from trusted sites. -Limit your web surfing to trusted sites.

Select what's true about packet sniffers.

-Legitimate sniffers are used for routine examination and problem detection. -Unauthorized sniffers are used to steal information.

Check all the activities that would be considered uploading a file to the Internet.

-Posting a photo on social media. -Placing an ad on Craigslist. -Posting a YouTube video.

Which of the following are common email viruses.

-Ransomware -keystroke logging Trojan

Select the sites that offer Internet speed test services.

-Speedtest.net -TestMy.net

Select what's true about passwords.

-Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. -Regularly check your accounts to ensure they have not been tampered with.

Select the major U.S. cell phone providers.

-Verizon -ATT -T-Mobile -Sprint


Related study sets

Quiz 1: The Cell and the Microscope

View Set

business of tourism and hospitality

View Set

Life Insurance Exam Simulation Missed Questions

View Set

Anatomy: Mastering A&P Chapter 18

View Set

Mental Health Final Questions Videbeck update

View Set

Infant and Child test 3 attachment

View Set