CGS Final

Ace your homework & exams now with Quizwiz!

relationship

A link between tables in a relational database that defines how the data is related is called a _____.

0-1

A smartphone emits approximately ___ watts of microwaves.

300 hours

According to youtube approximately how much video is uploaded to its site every minute

settings

After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.

right click

An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.

dictionary

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

700 MB

CDs provide approximately _______ of data storage space

microwaves

Cell phones send and receive extremely weak ___ signals to and from cell towers.

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

internet service provider

ISP stands for

restore

If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .

3G

If you just need a phone for calling and texting, a ___ phone can save you money.

prepaid

If you just need a phone for emergencies, you might consider a ___ phone.

Keep software updated, particularly antivirus software. Physically secure computers to minimize risk of theft. Backup your data regularly

If you own a small business, what can you do to ensure your computers and data is kept secure?

roaming

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___

field

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

folders

In order to keep your files organized, it's a good idea to create ___ and place your files in them.

A database can hold larger amounts of data A database can provide better data integrity

Select the advantages of using a database instead of a traditional filing system.

developed by Apple for Apple products used on iPhones and iPads comes with Siri, iTunes, iBooks, etc.

Select the characteristics of the IOS.

.mov, .avi

Select the common video file formats.

reduce the bandwidth needed to transmit a file reduce storage space requirements

Select the reasons for compressing a file.

Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS

Select the usual tasks of information systems (IS) program managers.

Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database

Select what's true about object-oriented databases

logical

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

Tim Berners-Lee

The World Wide Web was created through a collaboration led by

True

The amount of RAM a computer comes with or the ability to expand its RAM is an important consideration when buying a new device

True

The android OS is owned and maintained by google

top level domain

The highest level in the domain name hierarchy is known as the

data

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

signal

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

Right-click a folder in the folders list. Click New and then click Folder. On the command bar, click New folder. Right-click any blank area in the Contents pane. Click New and then click Folder.

There are several ways to create a new folder in Windows. Which of these would work?

On the command bar, click Organize and then click Rename. Right-click a folder and click Rename. Click the folder icon and press F2 to activate the edit mode.

There are several ways to rename a folder in Windows. Which of these would work?

view

To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .

forms

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

players

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

Query

To search a database for information, create a ___ .

gigabytes

Typical SSD capacities for tablet computers or smartphones are measured in

double-click

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

application

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

gif

Which of the following file extensions is commonly used for drawings?

.docx

Which of the following file extensions is commonly used for term papers and other word processing tasks?

file explorer

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

save as

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

webcam

a camera that takes photos or streams video into a computer or over the internet is called a

true

a computer platform is commonly referred to as an operating system or OS

worm

a destructive program that replicates itself throughout a single computer or across a network is called a

wire-wire

a form of email fraud where criminal change the account where money is being transferred is called a _______ scam

zip

a lossless compression format

cyberterrorist

a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

cookie

a small text file or information created by websites you visit that your web browser stores on your hard disk is called a

MAC

a switch distinguishes between various devices within a network by their ________ addresses

pharming

a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called

In Outlook express, you can create a new message and drag and drop the phishing email into the new message. address the message to [email protected] and send it In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected].

according to US-CERT if you receive a phishing message you should contact them using which of the following methods

post vacation photos to show your friends where you travelled

all of the following are best practices when using linkedin except

high frequency RFID can transmit signals further than 1500 feet

all of the following are true about RFID except

script kiddies

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs that others have written are called

DDos

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack

Mbps

broadband is measured in

you have several devices online at the same time you need relatively high-speed internet service you want wi-fi in your home

choose the reasons for purchasing broadband internet service

viruses, worms, trojan horses

common types of malware include

persistent

cookies stored on a computers hard drive and used to collect and store information about user preferences, password and username information, IP address, and or data on web surfing behavior are called _______ cookies

identity theft, DDos attacks

cyberattacks include

From and/or subject lines

determines if the email will be opened

JPEG, PNG

image compression formats

below

inkjet printers are often sold _____ their production cost

True

many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos

magnetic hard drives

most desktop computers use ______ to store data

SSD

most tablets and phones use________ as their main storage device

white hat hackers

non malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called

trojan horse

often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a

data is only available when you're online

one disadvantage of cloud storage is that

user preferences

persistent cookies store information about

close

professionally ends the message

lossless

reduces space required by reducing redundancy within files

lossy

reduces space required by removing less valuable data

listening to pandora, watching a youtube video, watching a movie on Netflix

select examples of streaming

usb drive has shorter access time usb drive is more durable usb drive is more accurate

select the advantages of using a USB instead of a DVD

redundancy, availability

select the advantages of using cloud storage

pet identification, package tracking, inventory tracking

select the current uses for RFID tags

legitimate sniffers are used for routine examination and problem detection, unauthorized sniffers are used to steal information

select what is true about packet sniffers

salutation

sets the tone of the message

10

snaps on snapchat can be viewed up to _____ seconds depending on what the user chooses and then disappears

body

succinctly discusses the purpose of the message

hacktivism

the act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called

bandwidth

the capacity of a particular transmission medium is called its

router

the device that connects 2 networks is a

cyberattack

the malicious use of computer code to modify the normal operations of a computer or network is called a

bit

the smallest unit of data storage is a

WPA

the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as

the main governmental organization that oversees internet privacy is the federal _____ commission

trade

thumb drives, flash drives

what are some commonly used names for USB drives

EDI

what technology allows for the electronic communication of business oriented transactions and information between people and organizations

software piracy

when copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called

be brief and direct state only what you witnessed

when reporting a computer ethics violation of a co-worker to your employer, its important to

Ransomware, keystroke logging trojan

which of the following are common email viruses

most widely used OS for smartphones and tablets

which of the following is a strength of the android platform

free to download and use

which of the following is a strength of the linux platform

cyberstalking and online predators are a real problem on facebook

which of the following statements about facebook is true

data manipulation

which of the following would be considered a cybercrime

true

you must individually adjust cookie settings in every browser you use


Related study sets

Business Ethics Vocabulary-Chapter 1

View Set

ECON 100B - Externalities and Public Goods

View Set

NWMSU Management: Chapter 6 Review

View Set

OXFORD SCHOOL: IT English - Lesson Notes - Lernset #25 (English-German) - Kostenlos Englisch üben und lernen am Computer oder am Handy!

View Set

Animal Biology LAB EXAM #1 Review

View Set

Milady Chapter 9 Nail Structure and Growth

View Set

APCSP Midterm (Previous Tests and Check Your Understandings)

View Set

Ch20: Antimicrobial Drugs, Antibiotics, Microbiology Definitions, Ch 10 Antimicrobial Treatment, Chapter 20, Microbiology Chapter 12 and 13, Microbiology Ch. 9 (p. 248 - 255), Micro Chapter 10, Microbiology Chapter 11 Physical and Chemical control of...

View Set

Mortgage Education Chapter 8 study flash cards (8 of 8)

View Set

3.5 Arithmetic and Geometric Sequences

View Set