CSIT 101 Set 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
A Kindle eBook reader is an example of a(n) ______ computer.
answer
special-purpose
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
answer
zombie
question
A _____ provides content that is accessible on the World Wide Web.
answer
web server
question
A _____ is an example of a computer assigned to a special task.
answer
kiosk
question
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.
answer
analyze large amounts of data
question
A common form of authentication is a ____.
answer
password
question
A company called ____ provides digital certifications for web transactions.
answer
VeriSign
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
question
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world.
answer
violent, interactive simulated games
question
A game console relies on a fast _____ to handle the lively animations in a video game.
answer
microprocessor
question
A popular encryption method used to protect data that travels over a wireless network is ____.
answer
WPA
question
A popular term used to identify devices such as the iPad is _____.
answer
tablet PC
question
A printer requires a ____ installed on the computer in order to operate.
answer
device driver
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
question
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy.
answer
transparent
question
A(n) ____ view of data is the way a user thinks about data.
answer
logical
question
AI applications are ways in which AI methodologies are applied to ____ and provide services.
answer
solve problems
question
All of the following are examples of malware EXCEPT ____.
answer
updates
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
answer
libel
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
phishing
question
An icon on your desktop is a component of a ____ interface.
answer
graphical user
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
An industrial operating system works with a large computer system requiring a(n) ____.
answer
server
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
question
An online B2B transaction uses a(n) _____ network to exchange information on the web.
answer
EDI
question
Carpal tunnel syndrome can cause ____.
answer
a numb sensation in the wrists and hands
question
Cloud computing is not possible without _____.
answer
an Internet connection
question
Compulsive online gambling and pornography are examples of ____.
answer
computer addiction
question
Controlling the amount of ____ we receive in our email Inbox is one way to control information overload.
answer
spam
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
Each person's digital shadow is ____.
answer
the digital information generated about a person by organizations
question
Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications.
answer
servers
question
Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible.
answer
networks
question
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
answer
special-purpose
question
Embedded systems can be found in all of the following EXCEPT _____.
answer
cloud computers
question
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
answer
web empowerment
question
Full transparency is a scenario in which surveillance and information are ____.
answer
easily available to every law-abiding member of a society
question
Geographical technology advances to cell phones such as user location and _____ software have improved augmented reality.
answer
directional
question
Google Wallet software utilizes smart phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items.
answer
RFID
question
IT Access for Everyone is an initiative for increasing access to digital technology for ____.
answer
developing nations
question
If a behavior is considered ethical, this most likely suggests it is ____.
answer
morally right
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
question
In general, governmental computer ethics involves two main types of responsibilities: ____ and ____.
answer
protection, empowerment
question
In the United States, the ____ oversees the handling of Internet traffic.
answer
FCC
question
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.
answer
Privacy Act of 1974
question
In the past 10 years, the digital divide in the United States has ____.
answer
shrunk
question
Interactive media are most prominent in the _____ industry.
answer
entertainment
question
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
answer
open-source
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
answer
high-precision
question
Net Nanny is an example of ____.
answer
content-filtering software
question
Of the following, ____ contains the most information about citizens of the United States.
answer
LexisNexis
question
Of the following, ____ is considered the most invasive.
answer
network behavioral targeting
question
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings.
answer
recognize
question
One of the biggest roadblocks to ecash and ewallet technologies is _____.
answer
fear
question
One thing to consider when choosing a mobile device is _____.
answer
battery life
question
One use for a(n) ____ is to search a database for information pertaining to a specific query.
answer
intelligent agent
question
Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet.
answer
hacktivists
question
Performing a system ____ utility rearranges your files on disk in an orderly fashion, resulting in faster access.
answer
defragmentation
question
Personal computer ethics involves ____.
answer
all of the above
question
Personal ethics deals with ____. (Choose the best answer.)
answer
the choices and behaviors made by individuals
question
Programs such as ____ support energy conservation for electronic devices.
answer
ENERGY STAR
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phising
question
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
answer
disasters
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
answer
an intelligent agent
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
question
Some netiquette rules to consider when using social media include all of the following EXCEPT ____.
answer
freely tag friends in your photos
question
Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____.
answer
typing
question
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
answer
pattern
question
Studying the way people use the web—what sites they visit, what products they buy, etc.—is an example of ____.
answer
one-to-one marketing
question
The Children's Online Privacy Protection Act prohibits businesses from collecting data on children under the age of ____.
answer
13
question
The FCC ordered ____ to stop throttling BitTorrent Internet traffic.
answer
Comcast
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
answer
US-CERT
question
The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.
answer
desktop
question
The _____ was one of the first game controllers to use a player's motions and gestures as input.
answer
Wii
question
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
answer
accessibility
question
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
answer
censorship
question
The first known flash mob happened ____.
answer
at Macy's in New York City
question
The idea of digital etiquette came into being ____.
answer
with the advent of chat rooms and electronic mail
question
The introduction of _____ on cell phones was the first step toward realizing augmented reality.
answer
geographic positioning systems
question
The law that requires telecommunications manufacturers and service providers to make their products and services accessible to people with disabilities, if readily achievable, is ____.
answer
the U.S. Telecommunications Act of 1996
question
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
answer
satellite imagery
question
Through the use of ____, one physical server can run several server operating systems.
answer
virtual servers
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
question
Twitter is a ____ site.
answer
microblogging
question
Typical _____ computing providers deliver common software online that is accessed from another web service or browser.
answer
cloud
question
Users can interact in a virtual reality environment through the use of _____.
answer
avatars
question
Users multiple computers, such as a desktop, notebook, and smartphone are well acquainted with the process of _____ files.
answer
synchronizing
question
When a smart phone goes into ____ mode, pressing a button immediately turns it back on.
answer
sleep
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
question
When you combine a system's hardware configuration and operating system, it is sometimes called the computer's ____.
answer
platform
question
Which is not part of the boot process?
answer
Load application software into memory
question
Which of the following is an example of a repetitive stress injury?
answer
carpal tunnel syndrome
question
Which of the following is another name for ecash?
answer
emoney
question
Which of the following is one realistic way to promote Internet security?
answer
Select strong passwords and change them regularly.
question
Why are LEDs used in green computing?
answer
They reduce the energy used in displays.
question
Windows cleaners maintain the ____ for more effective system operation.
answer
registry
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
____ can tell more about a person than all other kinds of electronic surveillance.
answer
Data mining
question
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
answer
Ubiquitous
question
____ computing refers to the ability to access information at any time and in any place.
answer
Pervasive
question
____ is a form of traffic shaping.
answer
Throttling
question
____ is an example of following good ergonomic practices.
answer
Adjusting the angle of a keyboard for comfort
question
____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.
answer
Mobile
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
question
____ supports network neutrality.
answer
Google
question
_____ make up a large portion of the interactive media market.
answer
Video games
question
_____ media refers to digital media that involve user interaction for education, training, or entertainment.
answer
Interactive
question
_____ virtual reality refers to a user experience where you may feel like you are actually part of the experience generated by the computer.
answer
Immersive
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New