CGS2060 Final Exam FSU Winston

Ace your homework & exams now with Quizwiz!

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

.exe

Which of the following file extensions is commonly used for drawings?

.gif

If you just need a phone for calling and texting, a ___ phone can save you money.

3G

Select the advantages of using a database instead of a traditional filing system.

A database can hold larger amounts of data A database can provide better data integrity

o remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.

CTRL + X

Cyberattacks include

DDoS attacks identity theft

Select what's true about session cookies.

Determine the start and end of a session. Analyze and measure traffic on a web page. Determine the web browser being used.

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

Which of the following are ways to prevent computer virus infections.

Downloaded content from the web should only be from trusted sites. Limit your web surfing to trusted sites. install antivirus software

Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .

OneDrive

You own a pet care center. what fields might you enter when you create a table for dogs that you care for?

Owner's last name Pet's name Owner's address

Which of the following are common email viruses.

Ransomware keystroke logging Trojan

There are several ways to create a new folder in Windows. Which of these would work?

Right-click On the command bar Right-click

Select what's true about passwords.

Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. Regularly check your accounts to ensure they have not been tampered with.

Match the following regarding file compression: Zip Lossless Lossy

Zip - a lossless compression format Lossless - reduces space required by reducing redundancy within files Lossy - reduces space required by removing less valuable data

Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge).

allow delete block

Identify what's true about script kiddies.

amateur computer hackers with little programming expertise illegally gain access to computer systems using programs (scripts) that others have written

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

application

Select the functions of a Mobile Switching Station.

assigns frequencies to your calls sends your call to the receiver's MSS changes the cell and base station your transmissions go through as you travel

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

If you believe you have fallen victim to a phishing scam you should

contact the institution the message was allegedly sent from. contact US-CERT.

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

field

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

filters

in order to keep your files organized, it's a good idea to create ___ and place your files in them.

folders

When you need to link 2 tables in a database that don't have a field in common, one solution is to create a _____ in one table that links to the primary key in the other table.

foreign key

Which of these devices are manufactured by Samsung?

galaxy note

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

graphical

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

individual users

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

internet

Apple's mobile device with the largest display is the ___ .

ipad pro

In order to sync your iPhone to your MacBook you must first open the ___ app.

itunes

Select the characteristics of fiber optic lines.

made of 1 or thousands of fibers high-speed transmission

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

management

Changing the appearance of your folder can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .

organize

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

players

Select the reasons for compressing a file.

reduce the bandwidth needed to transmit a file reduce storage space requirements

The type of database that uses common fields to create links between tables is called a ___ database.

relational

Select the characteristics of a OneDrive account

requires a Microsoft Email account provides free cloud storage can serve as extra storage space

If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .

restore

An easy way to rename a folder in Windows is to ___ -click on the folder and then click Rename.

right click

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

roaming

The device that connects 2 networks is a _____.

router

The two major concerns regarding cloud storage are reliability and ___ .

security

Select the methods of placing a file in the recycle bin.

select the item and press the Delete key right-click the item and select Delete drag the item to the Recycle Bin

Select the characteristics of a Base Transceiver Station

connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

cube

Before you can start tethering, verify that it's included in your cell phone's ___ plan

data

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .

database

Identify common symptoms of a computer virus.

documents won't save computer runs extremely slowly programs launch on their own

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

drag

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

An unsolicited email message is called _____.

spam

our college has a database with a Students table. Which of the following could be a primary key in the table?

student number social security number

Choose the Samsung Galaxy tablet options.

tab series note series

A collection of related records in a database is referred to as a _____.

table

You must individually adjust cookie settings in every browser you use. true or false

true

Persistent cookies store information about

user preferences

Select the characteristics of a modem.

usually provided by the ISP converts analog signals into digital signals converts digital signals into analog signals

To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .

view

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

zombie


Related study sets

Accounting Exam 2 Multiple Choice Practice

View Set

Adult Med Surg - Elsevier - HESI

View Set

Texas Real Estate Principals 1 FInal

View Set