CGS 2060 MIDTERM
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
Cookie
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
Cube
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
Cyberattack
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
Cyberbullying
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
Cybercrime
How is the screensize of a laptop computer measured?
DIAGONALLY
The Internet service that tends to provide the most consistent speeds is _____.
DSL
Which of the following would be considered a cybercrime?
Data Manipulation
SAGE was developed by the US Department of ___ .
Defense
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DoS attack
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a _____ .
Tablet
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C
A ___ name identifies a server site on the Internet.
domain
Which transmission media has the largest bandwidth?
fiber optic
An unsolicited email message is called _____.
spam
Which of the following represent the highest amount of storage?
terabyte
"Full HD" resolution is expressed as:
1920 x 1080
Most new laptop computers come with how much storage?
256 GB - 1 TB
When you buy a new laptop, how much RAM should it come with?
4-8GB
Blu-rays provide approximately ___ of storage space.
700 MB
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
CONTENT
Emailing a file to yourself is an example of using ___ storage.
Cloud
Sage was developed during the _____ war.
Cold war
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
File Transfer
A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .
File Transfer Protocol
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
Filters
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
Firewall
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
Graphical
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
Hacktivism
A switch distinguishes between various devices within a network by their __ addresses.
IP
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
Individual users
Adding software to a digital device, or adding hardware components to a digital device is called _____ .
Installing
Which of these browsers was developed by Microsoft?
Internet Explorer
All of the following are common ports that are included with laptop computers except
MIDI port
Windows OS is owned and maintained by _____ .
Microsoft
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
The word modem stands for ____.
Modulator-demodulator
What manages hardware and software, supports the computer's basic functions, and runs programs?
Operating system
A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .
SSID
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .
Safari
A kilobyte is equal to approximately one _____ bytes.
Thousand
A terabyte equals approximately one _____ bytes?
Thousand
The World Wide Web was created through a collaboration led by ___ .
Tim Berners-Lee
The highest level in the domain name hierarchy is known as the ___ .
Top Level Domain
Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.
Touchscreens
URL stands for ___ Resource Locator.
Uniform
Software that infects a computer and is created using computer code is called a computer _____.
Virus
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .
WPA
In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
The original wireless network privacy and protection standard for Wi-Fi was known as ___ .
WPA2
The standard for wireless network privacy and protection is known as ___ .
WPA2
Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.
WiFi hotspot
WWW stands for ___ ___ ___ .
World Wide Web
A computer controlled by a hacker is called a _____.
Zombie
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
What 3 items are needed to install a home WiFi network?
an Internet signal a modem a router
The capacity of a particular transmission medium is called its _____.
bandwidth
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth
A group of compromised computers controlled by a hacker is called a _____.
botnet
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
A security system separating 2 networks or even computers on the same network is called a ___ .
firewall
Which of the following is a strength of the Linux platform?
free to download and use
Which of the following represents the least amount of storage?
gigahertz
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.
internet
ISP stands for:
internet service provider
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ____ computer.
laptop
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
macro virus
A megabyte equals approximately one _____ bytes?
million
Fiber optic cable is _____ expensive than coaxial cable to install.
more
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.
multi-band
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
optical drives
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
packet sniffer
The BitTorrent protocol is often called ___ file sharing.
peer-to-poor
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
A gigabyte equals approximately one _____ bytes.
thousand
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm
Select the domain name
www.cnet.com
A digital device that accepts input, processes and stores the input, and provides output is a ____ .
Computers
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.
Control Panel
Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.
Packet
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
Persistent
A request for an electronic "echo" or response from another computer or server is called a ____.
Ping
Software that can be added to a browser to increase its functionality are called ___ .
Plug-ins
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
Projective capacitive
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
Router
A URL identifies a particular __ address on the World Wide Web.
computer
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyberattacker