Scottie's Final

Ace your homework & exams now with Quizwiz!

The word "Apple" translated into its ASCII number equivalent is: (Remember, it is case sensitive)

065 112 112 108 101

Decimal to Binary-What is decimal 246 in Binary=

11110110

Binary to Decimal-What is Binary 11010010 in decimal?

210

Decimal to Hex- What is decimal 43 in Hexadecimal=

2B

Hex to Decimal- What is the decimal value for 0x13A=

314

A type of website that allows content to be edited or created by anyone. This allows content to stay up to date and (ideally) allows for errors to be found and corrected.

A "Wiki"

A type of computer that forwards data across a network

A Server

A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1

A bit

What is Wi-Fi?

A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

A group of computers and servers that are connected to each other.

A network

Computer programs that can block, detect, and remove viruses and other malware.

Antivirus Software

To guard against malware, you will need to have ________.

Antivirus Software

Extra copies of computer files that can be used to restore files that are lost or damaged.

Backups/backing up files

The amount of data that can pass through a network or part of a network per second.

Bandwidth

Transmission capacity measure by bit rate

Bandwidth

The number of bits per second a system can transmit.

Bitrate

CTRL+B

Bold

A group of computers that is networked together and used by hackers to steal information is called a ...

Botnet

Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn't be achieved with a single computer.

Botnet

CTRL+E

Center

A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.

Computer Virus

Microsoft Word, Google Chrome, iTunes, and Adobe Photoshop are examples of ___________.

Computer applications

If a Windows program has become unresponsive, which keys do you press to open the Task Manager?

Control, Alt, Delete

CTRL+C

Copy

Attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.

DDOS

A method of sending information using telephone or television cables

DSL/Cable

CTRL+X

Delete

The service that translates URLs to IP addresses

Domain Name Service (DNS)

A fictional virus modeled after the Stuxnet virus. Like Stuxnet, This is able to damage physical infrastructure

Doxnet

Is a system for sending and receiving electronic mail online.

Email

Prevents unauthorized people from reading data that is transmitted over your wireless network

Encryption

The process of using codes to make readable information unreadable. This information cannot be read until it is decrypted using a secret key.

Encryption

True or False: You cannot get a computer virus if you install antivirus software.

False

A cable that uses light to send information

Fiber-Optic Cable

Software designed to block malware from entering protected networks.

Firewall

What is hacking?

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.

Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.

Hacktivist

CTRL+A

Highlight all

CTRL+K

Hyperlink

A number assigned to any item that is connected to the Internet.

IP Address

What is this called: 125.0.0.1

IP Address

CTRL+M

Indent

Is a type of chat where you communicate with a specific person instead of an entire chat room.

Instant Message

Involves robbing people or companies of their ideas, inventions, and creative expression.

Intellectual Property Theft

CTRL+I

Italicize

A program that records every key struck on a keyboard and sends that information to an attacker.

Keylogger Malware

CTRL+L

Left align

Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.

Malware

RAM is like a computer's ______________, while a hard drive is like a computer's ______________

Memory; brain

The most popular operating system for personal computers is ________.

Microsoft Word

The main circuit board in a computer is called the ________.

Motherboard

The principle that all Internet traffic should be treated equally by Internet Service Providers.

Net neutrality

Is a piece of hardware that allows computers to communicate over a computer network

Network Card

Having multiple backups to ensure reliability during cases of high usage or failure

Network redundancy

CTRL+N

New

Is a system that allows users to communicate in real time. Unlike e-mail, all messages show up immediately in the same window, which makes conversations quicker and easier.

Online Chat

CTRL+O

Open

Windows, OS X, and Linux are examples of __________.

Operating systems

Small chunks of information that have been carefully formed from larger chunks of information

Packets

Small chunks of information that have been carefully formed from larger chunks of information.

Packets

CTRL+V

Paste

PDA is short for ________.

Personal Digital Assistant

Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.

Phishing

Peripherals that can be instantly recognized by your computer are known as ________.

Plug and play

You can subscribe to a series of audio or video files that will automatically be downloaded to your computer.

Podcast

CTRL+P

Print

A type of malware that holds victims' computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.

Ransomware

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called ...

Ransomware

CTRL+Y

Repeat typing

CTRL+R

Right align

This is the name of a wireless network. You may not want to use your actual name, but you can use a hobby or other interest (for example, rockclimbing1).

SSID (Service Set Identifier)

CTRL+S

Save

Is a computer that serves many different computers in a network by running specialized software and storing information.

Server

A non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

Social Engineering

A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.

Software Patch

A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.

Software Vulnerability

Unsolicited emails sent to many addresses. The purpose is to make money through advertising or identity theft

Spam

The cloud allows you to ________.

Store things on the internet rather than your computer's hard drive.

This is the largest computer network in the world, connecting millions of computers.

The Internet

What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")?

The S stands for "Secure". If the web address begins with https://, means your computer is talking to the website in a secure code that no one can eavesdrop on.

Codes have been used for thousands of years in order to:

To keep communications secret

Why do hackers hack?

To steal information, to make a statement and because they can

Instead of a mouse, many laptops use a(n) ________.

Touchpad

True or False: Applications can be downloaded from the Internet.

True

True or False: It is possible to connect peripherals to a laptop.

True

True or False: Some modems include a built-in router.

True

True or False: When something is saved to the cloud, it means it's stored on the Internet instead of on your computer's hard drive.

True

What does a computer allow you to do?

Type documents, send emails, browse the internet, store and retrieve data

What is the technical term for a website? www.ESPN.com?

URL

A mouse can connect to the computer with a ________ connection.

USB, PS/2, Bluetooth

CTRL+U

Underline

CTRL+Z

Undo Typing

Which of the following is a type of monitor port?

VGA port, Display Port, DVI port

This runs familiar software such as web browsers or email software, and it communicates with the server to get the information it requires.

Web server

A method of sending information using radio waves.

Wi-Fi

To navigate through different folders in Windows, you'll use ________ .

Windows Explorer

A binary question is defined as:

Yes/No or True/False questions are binary questions

Which of the following statements are true? a. The Internet gives us access to many resources we couldn't otherwise come in contact with. b. Information can always be trusted to be factual. c. Anything I send in my private email cannot be seen by others. d. Everything that you post online leaves a digital footprint. e. Websites must have my permission to post any personal information about me, like my phone number, address or birthday.

a. The Internet gives us access to many resources we couldn't otherwise come in contact with, d. Everything that you post online leaves a digital footprint

You are in the middle of working on a document and your computer freezes. Which of the following keystroke combinations will bring up the Task Manager on a PC so that you can force the program to quit? a. [CTRL+ALT+DELETE] b. [ALT+SHIFT+CTRL] c. [SHIFT+ENTER] d. [CTRL+SHIFT+TAB]

a. [CTRL+ALT+DELETE]

Which of the following are unethical and/or illegal behaviors? a. plagiarizing b. texting c. hacking d. cyberbullying

a. plagiarizing, c. hacking, d. cyberbullying

"Spamming" is very poor netiquette and means: a. posting or emailing unsolicited advertising messages to a wide audience b. sending in lines of nonsensical garbage in a chat conversation c. posting pictures of meat-byproducts on your desktop d. posting a message that contains graphic descriptions of something really gross

a. posting or emailing unsolicited advertising messages to a wide audience

Which of the following are risky behaviors online? a. sharing your password with a good friend b. posting a picture of your cat c. video chatting with your grandparents d. sharing a friend's poem with his permission e. posting a photo of you standing in front of your school

a. sharing your password with a good friend, e. posting a photo of you standing in front of your school

Which of the following is an example of effective online searching? a. Do a random keyword search on a search engine of your choice. Then, quickly browse through all the results listed and find the ones you think have the most useful information. b. Formulate research questions, list possible sources of information, identify keywords, and begin your search. c. Visit chat rooms and find out what others are saying about your topic. d. Post a question about your topic on a message board and read all the responses.

b. Formulate research questions, list possible sources of information, identify keywords, and begin your search.

Why shouldn't you post personal information in your blog? a. You should. Blogs are supposed to be personal. b. Personal information can be used to harm you. c. People won't read your blog if they know who you are. d. The best blogs are written anonymously.

b. Personal information can be used to harm you.

A computer which links several PCs together in a network is called a _____. a. Minicomputer b. Server c. Client d. main frame

b. Server

Which of the following is the best indicator that a Website is reliable? a. The author of the site tells you the information is reliable. b. The author of the site provides contact information and his or her credentials. c. The author links to his or her favorite Websites. d. The author clearly states that the site has been proofread.

b. The author of the site provides contact information and his or her credentials.

You need to combine and modify some pictures for a project you're working on. Which of the following application types would be best suited to the task? a. presentation b. graphics c. multimedia d. spreadsheet e. word processing

b. graphics

Use ________________ when conducting an Internet search to ensure that your keywords appear in your search results in the order specified. a. capital letters b. quotation marks c. complete sentences d. dashes

b. quotation marks

Time it takes for a bit to travel from its sender to its receiver.

bit rate

A website that is usually updated frequently, often with news articles or random thoughts.

blog

Which one of the following is NOT an example of an extension in a URL? a. .gov b. .org c. .npr d. .com

c. .npr

This measures the computer's CPU speed: a. Gigabytes b. Bytes c. Hertz d. RAM

c. Hertz

What operating system do we use in the computer lab? a. Linux b. iOS c. Microsoft Windows d. Microsoft Office

c. Microsoft Windows

The main circuit board where all critical components of the computer are plugged in is the: a. Power Supply b. Peripherals c. Motherboard d. Hard drive

c. Motherboard

Which of these is an example of remote data storage? a. Saving a digital photo to a computer's hard drive. b. Saving a digital photo to a flash drive. c. Saving a digital photo to the cloud. d. Saving a digital photo to a CD.

c. Saving a digital photo to the cloud.

You and your classmates each researched a different environmental issue. Your teacher has asked you to organize the information to share with students all over the world. Which of the following is the best solution? a. Take everyone's report and copy and paste the text into one email so you can send it to anyone who contacts you. b. Create a slideshow presentation with information about each environmental issue and put it on a flash drive. c. Set up a blog or wiki and dedicate one page to each environmental issue, and then publish it to the Web. d. Create a group podcast in which each classmate talks about his or her environmental issue and then save it to the desktop.

c. Set up a blog or wiki and dedicate one page to each environmental issue, and then publish it to the Web.

What does CPU stand for? a. core processing unit b. computer processing unit c. central processing unit

c. central processing unit

Which of the following statements about search engines is true? a. A search engine does not discriminate between good and bad sites. b. A search engine displays all Web pages that contain your keywords and may list thousands of unordered results. c. Some of the first page results are reserved for paying customers. d. All of the above

d. All of the above

Critically evaluating content on the Web is important because... a. Web authors are always less professional. b. Web authors are always biased. c. Printed information is always more accurate than information found on the Web. d. Anyone can publish on the Web. There's no guarantee that what you're reading is objective and has gone through standard fact-checking and editorial reviews.

d. Anyone can publish on the Web. There's no guarantee that what you're reading is objective and has gone through standard fact-checking and editorial reviews.

What does a network enable computers to do? a. solve complicated mathematical problems b. communicate with other computers c. take commands from users d. all of the above

d. all of the above

As part of your science fair report, you've been asked to measure, record, and graph the effects of sugar on plant growth. What application would be best to record and graph the data collected? a. online database b. word processor c. draw/paint program d. spreadsheet

d. spreadsheet

What does a firewall do? a. Prevents outsiders from connecting to your computer over the internet. b. Makes sure that any peripherals you plug into your computer don't damage it. c. Removes viruses from your computer. d. Blocks pop-ups when browsing. e. All of the above

e. All of the above

Which of the following is not a computer input device? a. monitor b. keyboard c. mouse d. digital camera e. scanner

e. scanner


Related study sets

Health Assessment Exam 3 Questions

View Set

INTRO Exam 2: Cultural competence

View Set

MO life and health missed questions

View Set