CIT 105 EXAM 3 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
answer
Kickstarter
question
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
answer
Digital Convergence
question
What is iOS?
answer
An operating system for mobile devices
question
The operating system of a cell phone is stored in ________.
answer
ROM
question
The primary input devices for smartphones are ________.
answer
microphone and touch pad
question
Google ________ is an online store that delivers software for Android devices.
answer
Play
question
A(n) ________ chip converts sound waves from a voice into digital signal.
answer
Analog-to-digital converter
question
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
answer
digital signal processor chip
question
A(n) ________ converts your voice's sound waves into digital signals.
answer
Analog-to-digital converter chip
question
Which of the following uses radio waves to transmit data signals over short distances?
answer
Bluetooth
question
Many mobile devices include a micro ________ port.
answer
USB
question
Text messaging is also called ________.
answer
short message service (SMS)
question
SMS messages are limited to a maximum of ________ characters.
answer
160
question
You can send messages that include photos and videos between mobile devices using ________ technology.
answer
multimedia message service (MMS)
question
An Internet connectivity plan is also known as a ________ plan.
answer
data
question
All of the following are advantages of VoIP EXCEPT ________.
answer
excellent reliability during internet or power outages
question
________ is a very well-known free VoIP provider.
answer
Skype
question
The global positioning system is a network of 21 ________ plus 3 working spares.
answer
satellites
question
A main difference between the tablet and the smartphone is the ________.
answer
screen size
question
Which of the following mobile devices is the lightest?
answer
Smartphone
question
The distance between two near field communication (NFC) devices is limited to about ________.
answer
1.5 inches
question
In the United States, e-books account for about ________ of all book sales.
answer
20% to 30%
question
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
answer
E-text
question
Your mobile device files can be synchronized using ________.
answer
a cloud service
question
A portable media player can play files with all of the following file extensions EXCEPT ________.
answer
.accdb
question
________ allows only limited use of media that have been legally purchased.
answer
digital rights management
question
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
answer
sampling rate
question
Which of the following digital image formats compresses the image file?
answer
JPEG
question
Which of the following is NOT a video file extension?
answer
.jpg
question
A(n) ________ cable carries all audio and video information from devices to a connected TV.
answer
HDMI
question
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
answer
theft of services
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations
question
Creating and distributing ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
Which of the following is NOT a virus category?
answer
pharming
question
All of the following are ways that can infect your computer with a virus EXCEPT ________.
answer
installing a manufacturer's printer driver
question
________ viruses are often transmitted by a flash drive left in a USB port.
answer
Boot-sector
question
Which type of virus was the famous Michelangelo virus?
answer
A time bomb
question
A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
A(n) ________ takes advantage of file transport methods to spread on its own.
answer
worm
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
answer
launch a denial of service (DoS) attack on your computer
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
answer
rootkit
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
answer
a firewall
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
Rules for creating passwords include all of the following EXCEPT ________.
answer
use a dictionary to find a lengthy word that is easy to remember
question
CAPTCHA stands for ________.
answer
Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
Adware and spyware are referred to collectively as ________.
answer
Grayware
question
________ is a program that gathers information about your surfing habits without your knowledge.
answer
Spyware
question
Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
answer
pharming
question
Using your computer for non-work activities while you are being paid to work is known as ________.
answer
cyberloafing
question
A ________ is a group of related data that can be stored, sorted, organized, and queried.
answer
database
question
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________.
answer
redundancy
question
Data ________ ensures that the data contained in a database is accurate and reliable.
answer
integrity
question
Data ________ helps to ensure data integrity by maintaining information in only one place.
answer
centralization
question
In a database, the term ________ is synonymous with a category of information.
answer
field
question
In a database, a group of related records is referred to as a(n) ________.
answer
table
question
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field.
answer
long text
question
You can set a ________, which is automatically displayed in a field unless the user enters something different.
answer
default value
question
Which of the following is NOT a likely primary key?
answer
date of birth
question
________ is used to ensure that data is organized most efficiently.
answer
normalization
question
________ databases are the most frequently used electronic databases.
answer
relational
question
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
answer
one-to-one
question
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
answer
referential integrity
question
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
answer
unstructured
question
Data in a multidimensional database is organized in a ________ format.
answer
cube
question
A ________ check would be used to restrict the fines for speeding violations from $50 to $250.
answer
range
question
A(n) ________ check determines whether a required field such as LastName was filled in.
answer
completeness
question
A ________ check compares the values of data in two or more fields to see whether those values are reasonable.
answer
consistency
question
You would use a ________ to temporarily display records of residents of the city of Boston.
answer
filter
question
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
answer
query
question
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
answer
select query
question
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
answer
relational algebra
question
________ involves putting data into an electronic file in a format that another application can recognize.
answer
exporting
question
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.
answer
warehouse
question
Data staging consists of all of the following steps, EXCEPT ________.
answer
mining the data
question
A(n) ________ is designed to improve communications and help employees complete their routine tasks.
answer
office support system (OSS)
question
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
answer
real-time
question
Management information systems (MIS) provide reports called ________ reports, which show conditions that are unusual or need attention from users of the system.
answer
exception
question
The Siri personal assistant application on Apple's iPhone 5s is an example of a ________.
answer
natural language processing (NLP) system
question
________ is the branch of computer science that attempts to create computers that think like humans.
answer
Artificial intelligence
question
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
answer
network
question
A ________ network can contain servers as well as individual computers.
answer
client/server
question
In a ________ network, each node connected to the network communicates directly with every other node.
answer
peer-to-peer
question
The computers in a lab on a floor of a building would be connected using a ________.
answer
LAN
question
A ________ uses the Internet communications infrastructure to build a secure and private network.
answer
VPN
question
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
answer
authentication
question
A(n) ________ server is a server that stores and manages files for network users.
answer
file
question
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
answer
spooler
question
Which of the following is NOT a common network topology?
answer
cluster
question
A ________ is a set of rules for how information and communication are exchanged.
answer
protocol
question
Ring networks use the ________ method to avoid data collisions.
answer
token
question
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
answer
terminator
question
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
answer
bus
question
Which of the following is the most commonly used client/server network topology?
answer
star
question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
answer
jam
question
A ________ topology uses more than one topology when building a network.
answer
hybrid
question
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
answer
bandwidth
question
Which of the following is NOT a factor to consider when selecting network cabling?
answer
cable diameter
question
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
answer
fiber-optic
question
For business networks, which of the following is NOT a main cable type?
answer
duplex
question
Most home networks use ________ cable, which is most susceptible to interference.
answer
unshielded twister pair
question
________ is the standard communications protocol used on most client/server networks.
answer
Ethernet
question
The physical address assigned each network adapter is called its ________.
answer
media access control (MAC)
question
A(n) ________ address is the address that external entities use when communicating with your network.
answer
IP
question
A ________ sends data from one collision domain to another.
answer
bridge
question
A ________ sends data between two networks.
answer
router
question
A ________ keeps your computer safe by determining who is trying to access it.
answer
firewall
question
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
answer
screening
question
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
answer
bastion host
question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
answer
brute force attack