chapter 5+6

Ace your homework & exams now with Quizwiz!

What is a security breach?

. A case of unauthorized computer access

Microsoft Word can be used to create and edit formatted text. That formatted text is normally saved in which kind of file to enable subsequent editing of that formatted text by Microsoft Word?

.doc or .docx

Most DoS attacks end within _____.

1 - 2 days

Suppose a song is 200 seconds, that a digital recording sampled the audio 50,000 times per second, and each sample is stored in 1 byte. How many bytes are needed to digitally store a song?

10,000,000

Given the following uncompressed text, which is a more reasonable LZ dictionary? "Mark Smith, 100 Main St., Smithville"

1: Ma, 2: Smith

Video consists of a series of still pictures (frames) that should be shown at a rate of at least _____ frames per second so that humans don't notice the individual pictures and instead see smooth video.

25

The following is what type of internet scam? "I need your assistance in transferring the sum of $10M USD to an overseas bank account. You will have 40% of the sum if you agree to help."

419 scam (or Nigerian scam)

Spam makes up approximately ____% of all Internet email traffic.

50

If cell A1 contains 55 and cell B1 contains 11, which entry into cell C1 results in 66?

= A1 + B1

Which most properly uses the SUM function to sum the values in cells A1 through A4?

=SUM(A1:A4)

Which of the following is NOT an example of a security breach?

A user posting an inappropriate message

Which website is most likely not to be trusted by a browser?

A website with an expired digital certificate

An audio recording app stores audio in a file consisting of _____.

Analog audio converted to digital values (numbers)

_____ is a program that looks for known viruses and strives to disable found viruses.

Antivirus software

Which is LEAST likely to have a built-in option to save as pdf or print to pdf?

Audio player app

Alice posts a public key that matches a private key only she knows. How does Bob encrypt a message that only Alice can read?

Bob encrypts the message using the public key provided by Alice.

DoS attacks are typically carried out by which of the following?

Botnets

If cell C1 has a formula that correctly computes the sum of cells A1 and B1, and A1 contains 55 and B1 contains 11, then C1 will be 66. What happens if A1's content is then changed to 20?

C1 immediately changes to 31

A spreadsheet's columns and rows are labeled with letters and numbers. Which represents the cell 5 rows down and 3 columns to the right?

C5

In the U.S., the _____ law allows unsolicited marketing email but requires such email to have an unsubscribe mechanism.

CAN-SPAM

Which of the following can improve account security?

Changing passwords frequently Using different passwords for different sites Signing out whenever leaving a computer unattended

Which of the following is NOT a way of improving online account security?

Choosing a password like a pet's name or a birthday.

Which is NOT a common use of spreadsheets?

Creating formatted text, like a resume that nicely shows a person's education/experience

Which of the following would be the best password?

D1n0tg$%ss

A _____ attack is achieved by submitting huge numbers of access requests simultaneously to one website, which overloads that site's web server.

Denial of service DOS

Among the following, which is most likely to spread a computer virus?

Downloading music and videos from free file sharing sites.

A presenter wishes to have the audience see only a first text item, and wants to press return to make a second item also appear, and press return again to have a third item also appear. Which animation feature is most appropriate?

Fade in

Which statement about the use of firewalls is correct?

Firewalls selectively block communication to and from a computer.

Which certificate authority issued the digital certificate below?

GlobalSign Organization Validation CA - SHA256 - G2

_____ is a free, web-based word processing program.

Google Docs

Which of the following is the use of computer networks to promote a social or political cause?

Hacktivism

Which antivirus software strategy is most appropriate if a file is infected with an unknown virus with similarities to known viruses?

Heuristic analysis

What is a weakness of heuristic analysis?

Heuristic analysis can falsely identify uninfected files as being infected.

A(n) _____ compression algorithm creates dictionary entries for patterns that are repeated in the file.

LZ

Which video format rose in popularity in part due to being part of HTML5 and thus playable in nearly any web browser?

MP4

_____ uses one key to convert a message into an unreadable form, and then a second mathematically related key to convert the message back into readable form.

Public-key cryptography

Which are the two key benefits of compressing an image file?

Smaller files, faster transfers

_____ is a type of malware that collects information from a computer without the user's knowledge.

Spyware

Who purchases the digital certificate for a website?

The owner of the website

Which of the following methods is used in a hybrid public-key/symmetric-key approach to establish a secure communication between a server and a user's web browser?

The server creates a public/private key and shares the public key with the web browser. The web browser generates a new shared private key, then encrypts the shared key using the public key.

Which of the following describes a phishing scam?

Tricking an email recipient into providing valuable information by posing as a legitimate organization.

Which of the following is a method that requires a user to enter a temporary code, typically available on the user's phone, after signing in with a username and password?

Two-step verification

Which of the following statements is true?

Unsolicited marketing emails must have an unsubscribe mechanism, with some exceptions, which must be honored within 10 days.

The intersection of a row and column in a spreadsheet is called a(n) _____.

a cell

Which type of website is most likely to have the real purpose of spreading viruses?

a free games site

A malicious security breach, such as accessing and posting sensitive data, is sometimes called _____.

a hack

In a presentation app, a slide master is _____.

a template slide with a particular starting configuration of text and other items

Encrypted email messages can be viewed by _____ .

a user with the appropriate decryption keys

A _____ is a type of malware that spreads itself without using a host file.

a worm

Font size is usually in units of pts (short for points). 12 pt font is common in documents like a letter or resume. One point is 1/72 of _____.

an inch

Lossy compression provides more compression than lossless compression, and is appropriate for _____.

audio files

MP3 is a common compression technique for _____.

audio files

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

botnet

A given Huffman dictionary is 01: a, 001: b, and 000: c. What do these bits represent (decoding from left to right)? 00000000101

ccba

A zip file can group multiple files into one file, and commonly may also include _____ of those files.

compressing

A _____ breaks into computer systems for malicious purposes, such as to steal or destroy data.

cracker

Most video compression works by only storing the _____ each image and the previous image.

differences between

_____ Management refers to additional features added to media files and players to restrict how it can be played, in order to prevent unauthorized copying.

digital rights

A DOS attack using multiple computers is known as a _____ DOS attack.

distributed

Which is most likely a presentation file?

filename.pptx

Arial, Times New Roman, and Courier New are types of _____.

fonts

A word processor is primarily intended for enabling a user to create _____.

formatted text

In a spreadsheet, a(n) _____ can be used to compute a cell's value based on other cells' values.

formula

Each individual image in a video is known as a _____.

frame

A(n) _____ refers to particular text style features, such as the shape and spacing of text characters.

front

In a spreadsheet, a(n) _____ like AVERAGE is a pre-built set of instructions for performing a calculation.

function

Which of the following websites is likely used to carry out secure transmissions?

https://www.amazon.com

Which of the following is NOT a common kind of text formatting?

image

JPEG is a common compression technique for _____.

image files

The Audacity app _____.

is primarily used to create and edit digital audio files

_____ compression means that some data can be "thrown away" during the compression process.

lossy

An Internet scam may trick a user into downloading an executable file, such as a supposed package delivery label, which then installs _____ .

malware

Good passwords _____ .

mix letters, numbers, and special characters

PDF stands for _____ Document Format.

portable

After a computer is infected with a virus, the user usually realizes within how long?

possibly never

A presentation app's core functionality typically supports both creating a presentation as well as _____ the presentation.

presenting

A computer virus is most likely to _____ .

quietly use the computer for illicit tasks

Which antivirus software action is preferred if an infected file is valuable?

repair

Three lines of text each start at different left positions and each ends exactly at the right margin. Such text is known as:

right aligned

Audio recording apps go through a process called _____ thousands of times per second to convert audio to numbers that can be stored in an audio file.

sampling

A _____ is a weakness in a computer system that may lead to a security breach.

security hole

Times New Roman has tiny lines at the tips of letters, creating an appearance of old-style writing with a fountain pen. Those tiny lines are called _____.

serif

_____ is unsolicited mass-sent email.

spam

A keystroke logger may record all keys pressed by a user without the user's knowledge. A keystroke logger is an example of what type of malware?

spyware

Video files could be huge, so compression is used. The main idea of video compression is _____ .

storing only the difference between one frame and the next

Video can be stored on a device, and then played at another time. Alternatively, video can be sent to a device and played immediately, without being stored, an approach known as _____ .

streaming

A denial of service attack (DoS) attack is achieved by _____ .

submitting huge numbers of access requests simultaneously to overload a particular site's web server

In _____ the sender and receiver use the same key for encryption and decryption.

symmetric-key cryptography

A spreadsheet cell contains "B1 + B2". What type of value is this?

text

Presentation apps contain a library of _____ consisting of predefined color palettes, backgrounds, and text formatting.

themes

A _____ is software that a user installs believing to be legitimate, but it actually has a malicious purpose.

trojan (Trojan horse)

Which is NOT a key item that a presentation app helps a user create, for display on slides?

video

MPEG is a common compression technique for _____.

video files

A _____ is malicious code that attaches itself to a host program and is activated when the program is ran.

virus


Related study sets

Biology 2 - How Plants use Glucose

View Set

Scientists (History of the Atom)

View Set

Basic Statistics Behavioral Science Ch 12, 13, 14

View Set

Chapter 5: *Place Pictures in Quizlet

View Set