chapter 8, 9, modules 3, 5

Ace your homework & exams now with Quizwiz!

Eyestrain, headaches, dry eyes, blurry vision, and double vision are symptoms of ____ syndrome.

computer vision

Many businesses use which of the following to limit employees' web access?

content filtering

Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?

pairing

A PIN or ____ is used to get into accounts through an ATM.

personal identification number

What is the term for the smallest element in an electronic image?

pixel

Which of the following is an affordable and lightweight digital camera with lenses built into it and a screen that displays an approximation of the image to be photographed?

point-and-shoot

Which of the following is appropriate for an employee using a business's social network?

post content that reflects the business's professional image

​A system that lets people exchange short messages while they're online is called a ____ messaging system.

real-time

Possible causes of data loss include all of the following, except ____:

regular backups

Which of the following is not a determinant of the category in which a computer best fits?

resolution

​The email server determines the best route for the message, which often involves sending the message to a series of network devices called ____.

routers

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

script kiddie

What is the term for a website that uses encryption techniques to protect its data?

secure site

With which of the following do users choose which folders and files to include in a backup?

selective backup

Short text messages sent via a text message service are typically fewer than how many characters?

300

How long can digital certificates be valid?

two years

What is the term for an ultrathin laptop that uses the Windows operating system?

ultrabook

Which of the following occurs when the electrical supply or voltage drops, often defined as more than five percent below the normal volts?

undervoltage

A(n) ____ is an alphanumeric series of characters that you create to identify yourself online.

username

____ can lurk undetected in your system, infect it, and spread when you distribute infected files.​

viruses

A(n) ____ is an online educational web conference.

webinar

Computers and devices that communicate using radio waves across a medium distance of 100 to 900 feet use ____.​

wi-fi

When someone taps into your unprotected Wi-Fi network, it is called ____.​

wi-fi piggybacking

Which of the following gets its name from an Hawaiian phrase meaning quick?

wikis

____ can intercept and analyze data transmitted over any network, and it is a risk that can breach what otherwise might have been considered secured data.

wireless sniffing

___ spread by automatically sending themselves to everyone in your address book.​

worms

Which of the following privacy measures adds security by requiring two distinct items for verification?

-Two-step authentication -Two-factor verification -Two-factor authentication

Discarded computers, cell phones, and other electronics are considered ____.

-electronic trash -e-trash -e-waste

Privacy can be protected by ____.

-increasing the privacy settings on your social network accounts -deleting old online accounts -blocking third-party cookies from untrustworthy sites

Protect your mobile device from unauthorized use by ____.

-locking the device when not in use -refraining from installing apps from unknown sources

For most posts, you can decide whether the post is visible ______.

-to only people within your friends' networks -to the public -to only your friends and friends of friends

____ disguise themselves as useful programs or apps but do damage when you run them;

-trojan horses and rootkits

How many peripheral devices can you connect with a USB port?

127

____ can infect your computer or compromise your identity.

-Going to an unsecured website -None of the above -Opening an email attachment

When creating a blog, you should create a(n) _______ where you describe yourself, listing any relevant information.

About Page

Which of the following companies does not manufacture computers that use the Windows operating system?

Apple

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

CAPTCHA

Which of the following is a four- or five-digit number assigned to a specific content or mobile service provider, for example, to vote for a television program contestant or donate to a charity?

CSC

​A good example of a strong password is ____.

DumFDP076

A ____ protects your system from intruders.

firewall

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

ENERGY STAR

Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?

Electronic Communication Privacy Act

Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?

IP

____ is a network protocol that defines how to route data across a network.​

TCP/IP

Which of the following is a device that plugs in a USB port on the computer or mobile device and contains multiple USB ports?

USB hub

Which of the following provides the mobile user with a secure connection to the company network server?

VPN

Internet telephone, which refers to voice communications over the Internet, is another name for ______ .

VolP

____ software identifies malware that tries to install on your computer or device.

antivirus

What is another name for public key encryption?

asymmetric key encryption

Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

back door

Which of the following terms refers to making a copy of a file?

backing up

Cloud storage systems have ____ at various online locations that provide additional protection.​

backups

One example of content management software is _______ .

blogware

A message ____ is an online discussion site where people participate in a conversation by posting messages.​

board

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

copyright

The numeric score that affects your future ability to obtain credit is your ____.​

credit score

The effects of a(n) ____ can include physical damage and a general disruption of regular activities.

cyberattack

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

cyberextortionist

Do not use social networks to monitor or keep track of a member's activities or whereabouts, which could be considered ____.​

cyberstalking

____ is the premeditated disruption of computers and networks.

cyberterrorism

A ____ is a unit of data collected as a package so it can be transmitted in a network path.

data packet

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

digital

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

digital security risk

In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?

distributed

​To communicate with a friend while you're on the go or send messages to family members, you can use ____.

email

A(n) _______ is an image that expresses an idea or concept, such as a picture of clapping hands to mean congratulations.

emoji

A(n) ____ is a symbol for an emotional gesture, such as a smile or frown, that you create using keyboard characters.​

emoticon

Which of the following types of computers targets a specific audience and offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games?

gaming desktop

____, or environmentally friendly, computing and recycling can reduce the environmental impact of electronic waste and ultimately reduce costs.

green

Using a social networking site, you can form a ____, which is a collection of people who share a particular background or interest.​

group

People who break into computers and networks are ____?​

hackers

Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer?

high blood pressure

A secure website has ____ at the beginning of the URL.

https:/

Which browsing mode will not save your browsing history, temporary Internet files, form data, cookies, usernames, or passwords?

inprivate

Which of the following categories are the rights to which creators are entitled for their work?

intellectual property

Webmail uses the ____ protocol, which leaves messages on the server so you can read them using any device.

internet access message protocol (IMAP)

​____ hard drives are especially prone to failure.

magnetic

A ____ allows users to publish short messages, usually between 100 and 200 characters, for others to read.​

microblog

Which of the following is a portable, personal computer designed to fit on your lap?

notebook

What is another name for a standby UPS?

offline UPS

Which of the following kinds of UPS runs off a battery?

online UPS

When posting information online, you must always protect your _______, which is information about you that others can find on the Internet.

online reputation

On a secure website, a ____ icon may appear in the address bar.

pad-lock

The main computer in an email system is an email ____.​

server

____ on the Internet make up "the cloud."

servers

To use a social network safely, which of the following could create problems?

setting the Check In feature to let people know where you are

A _______ has many features of a computer, including Internet access and an operating system that can run apps.

smartphone

Which of the following is an example of a mobile device?

smartphone

_______ is a messaging app that allows you to limit how long the content will be available.

snapchat

A(n) ______ is a website that links people via the Internet to form an online community.

social network

Junk email, is also known as ____.​

spam

Malware includes all but which of the following?

spam

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

spoofing

____ secretly collects user data, such as web surfing habits.

spyware

Which of the following are capable of processing many trillions of instructions in a single second?

supercomputers

Which of the following are the fastest, most powerful computers — and the most expensive?

supercomputers

Real-time messaging systems, such as IM, are primarily ____ communications, which means that everyone who is communicating must be online at the same time.

synchronous

A communications ____ sends electronic data from a source to a destination.

system

An email ____ consists of the computers and software that provide email services.​

system

A(n) ____ is a key term associated with a blog post.​

tag

A _______ includes the original message and all the replies.

thread

Which of the following is built into an upright cabinet that stands alone?

tower server


Related study sets

Exam Review BGSU MGMT 3600 CH 1-6

View Set

Real Estate "Contracts" Test JULY '20

View Set

Chapter 18: Disorders of Blood Flow and Blood Pressure

View Set

Harry Potter and the Goblet of Fire, Chapter 19

View Set

110 Content Development (NAVEDTRA 130, 131, 136)

View Set