Exam 3 Review 2016

Unlock all answers in this set

Unlock answers
question
Database
answer
a collection of information stored on computer disks
question
Database software
answer
application software (like word processing ad spreadsheet software) designed to maintain databases (collections of information)
question
Field type
answer
The Electronic File Cabinet: Database Basics The type of information a field can hold is determined by its:
question
Data type or Field Data type
answer
Field type is sometimes called:
question
text or numeric
answer
data type can be
question
data, GPA, account balance
answer
numeric data type:
question
Name, Major, Outstanding Arrest Warrants
answer
Text data type:
question
Form views and list views
answer
Database programs provide you with more than one way to view data:
question
Form views
answer
show one record at a time
question
List Views
answer
displays several records in lists similar to the way a spreadsheet displays data
question
record
answer
The Electronic File Cabinet: Database Basics the information relating to one person, product, or event
question
field
answer
each discrete piece of information in a record is a ___
question
SQL
answer
Most modern database management programs support a standard language for programming complex queries called
question
Structured Query Language
answer
What does SQL stand for?
question
SQL
answer
-Available for many database management systems -Programmers and sophisticated users don't need to learn new languages when they work with new systems -Graphical user interfaces allow point-and-click queries ---Insulates users from the complexities of the query language
question
data mining
answer
The discovery and extraction of hidden predictive information from large databases is:
question
statistical methods and artificial intelligence technology
answer
Data mining uses
question
trends and patterns in data that would have been overlooked by normal database queries
answer
Statistical methods and artificial intelligence technology locates:
question
4
answer
What amendment in the constitution of the US states that The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
question
computer network
answer
any system of two or more computers that are linked together
question
reducing costs; increasing efficiency and production; work together
answer
How is networking important? -People share computer hardware, thus ____ ____ -People share data and software programs, thus ____ ____ ____ ____ -People ____ ____ in ways that are otherwise difficult or impossible
question
local area network (LAN)
answer
computers are physically close to each other, usually in the same building
question
wireless network
answer
In a ____ ____each node has a tiny radio (or, less commonly, infrared) transmitter connected to its network port
question
Sends and receives data through the air
answer
A wireless network ____ ____ ____ ____ ____ ____ ____ rather than through cables
question
building or cluster of buildings
answer
In a wireless network, Computers are linked within a
question
individual node on the network
answer
In a wireless network, each computer and peripheral is an
question
LANs and WANs
answer
Communication frequently happens between
question
Bandwidth
answer
the quantity of information that can pass through a communications medium in a given amount of time
question
Bridges and gateways
answer
hardware devices that can pass messages between networks
question
obey different software protocols
answer
Bridges and gateways often translate messages so they can be understood by networks that
question
Router
answer
hardware devices or software programs that route messages as they travel between networks
question
Mesh networks
answer
an alternative to traditional networks, creates individual nodes for communication.
question
small, temporary communication systems
answer
Mesh networks are used to set up:
question
emergency personnel use at fire scenes to coordinate actions
answer
What's an example of a mesh network?
question
Broadband connection
answer
a connection with much greater bandwidth than modems have
question
DSL
answer
uses standard phone lines and is provided by phone companies in many areas
question
cable television networks in many areas
answer
Cable modems provide fast network connections through
question
radio waves
answer
High-speed wireless connections can connect computers to networks using ____ ____ rather than wires
question
Satellite dishes
answer
can deliver fast computer network connections as well as television programs
question
fiber optic cables
answer
DSL and cable modems have nowhere near the bandwidth of the:
question
fiber optic cables
answer
replacing copper wires in the worldwide telephone network
question
rapidly and reliably transmit masses of multimedia data at the same time that it's handling voice messages
answer
A fiber optic network can
question
Voice mail
answer
a messaging system with the ability to store, organize, and forward messages; An example of a growing trend toward computer telephony integration (CTI)
question
computer telephony integration (CTI)
answer
the linking of computers and telephones to gain productivity
question
computer telephony integration
answer
What does CTI stand for?
question
Voice Over Internet Protocol
answer
What does VOIP stand for?
question
VOIP
answer
Sending voice signals through the Internet, bypassing the phone companies (and their charges) altogether
question
wiretapping
answer
VOIP is not as legally secure against
question
Private browsing
answer
available on most web browsers, disables your browser history to keep it private from others with access to that computer This does NOT delete any records kept by other networks you are connected to
question
TOR Browser
answer
much more private browsing, connects to an anonymizing network that doesn't reveal your true IP address to any site you connect to -Can be slow, is not completely invulnerable to dedicated investigation
question
An IP address
answer
is not a person
question
additional verification
answer
If a legal offense is tied to a particular IP address, ____ ____ is necessary to prove what person committed that offense
question
Advanced Research Projects Agency NETwork
answer
What does ARPANET stand for?
question
ARPANET
answer
the predecessor to the Internet
question
visionary computer scientists
answer
The Advanced Research Projects Agency NETwork (ARPANET) is the predecessor to the Internet: Developed at the request of the Department of Defense by a team of
question
1969
answer
When was ARPANET launched?
question
peer-to-peer networking philosophy and protocols
answer
The Advanced Research Projects Agency NETwork (ARPANET) is the predecessor to the Internet: Its ________ ____ ____ ____ ____ were copied in other networks in the 1980s
question
1990
answer
The Advanced Research Projects Agency NETwork (ARPANET) is the predecessor to the Internet: Disbanded in 1990, having fulfilled its research mission, but its technology spawned the Internet
question
Transmission Control Protocol/Internet Protocol
answer
TCP/IP
question
TCP/IP
answer
Allows cross-network communication At the heart of the Internet
question
TCP
answer
breaks messages into packets
question
travel from network to network
answer
Each message TCP breaks into packets has all the information needed to
question
routers
answer
TCP breaks messages into packets -host system called ____ determine how to route transmissions
question
IP
answer
the address for the packets
question
unique IP address
answer
Each Internet host computer has a
question
four; 0 and 255
answer
Each address is comprised of ____ sets of numbers between __ ____ __ separated by periods, such as 128.114.113.19
question
DNS
answer
The host is named using
question
domain name system
answer
What does DNS stand for?
question
DNS
answer
translates IP addresses into a string of names
question
Internet addresses
answer
Has led to legal fights over rights to certain domain names
question
Cyber-squatting
answer
grabbing domain names to resell later
question
educational sites
answer
Top-level domains include: .edu
question
commercial sites
answer
Top-level domains include: .com
question
government sites
answer
Top-level domains include: .gov
question
military sites
answer
Top-level domains include: .mil
question
nonprofit organizations
answer
Top-level domains include: .org
question
pull technology
answer
The Web was built with ____ ____ -Browsers on client computers "pull" information from server machines -Browser asks for information
question
push technology
answer
information is delivered automatically to the client computer -New product descriptions -Automatic software upgrades -Updated news
question
RSS Feeds
answer
-Open standard for subscription feeds -Instead of regularly visiting a dozen web pages. Look for the Feed Icon: -Google Reader abandoned July 1, 2013 -Feedly still works
question
Peer-to-Peer (P2P) Computing
answer
Users share music, movies, and other files without going through a central directory
question
Grid Computing
answer
Anyone can plug in from anywhere and rent processing power and software from anywhere on the Net Example: SETI@Home, Folding@Home
question
Spoofing
answer
Common types of computer crime: presenting a false identity to trick others into divulging passwords and other private information
question
Identity theft
answer
Common types of computer crime: the use of computers and other tools to steal whole identities
question
Phishing
answer
Common types of computer crime: users "fish" for sensitive information under false pretenses Take this online quiz! What's your birthday? Your mother's maiden name?
question
Online fraud
answer
Common types of computer crime: -Most related to online auctions - while auctions are statistically safe, check user feedback -Also, spam-based work-at-home schemes - selling "business opportunities" that cost money to get involved in
question
Malware
answer
malicious software, or any type of intentionally invasive, unwanted software.
question
Trojan horse
answer
Malware can include: ____ ____ performs a useful task while also running undesired, unrequested, or actively harmful routines
question
Virus
answer
Malware can include: -spreads by making copies of itself from program to program or disk to disk -Can corrupt data, damage systems, spread malware/spyware - or often do nothing at all, created only as an intellectual challenge. --Examples: Macro viruses and email viruses
question
Antivirus
answer
____ programs are designed to search for viruses, notify users when they're found, and remove them from infected disks or files
question
McAfee, Norton Anti-Virus
answer
Common commercial software:
question
Commercial anti-virus software
answer
tends to be bloated, consuming unnecessary system resources. Can be very hard to completely uninstall.
question
Recommended Freeware anti-virus
answer
AVG Free, Avast!, MS Security Essentials (Windows 7), or MS Defender (Windows 8)
question
Malwarebytes
answer
Good all-purpose scanning program
question
ransomware
answer
Beware of ____ or any anti-virus program suggested via pop-up ad
question
combat new viruses as they appear
answer
Programs need to be frequently revised to:
question
Spyware
answer
is technology that collects information from computer users without their knowledge or consent
question
Tracking software or Spybot
answer
Spyware is also called
question
Internet
answer
Spyware information is gathered and shared with outsiders via ___ -Your keystrokes could be monitored -Web sites which you visit are recorded -Snapshots of your screen are taken -Cause pop-ups to appear
question
61%; drive-by downloads
answer
____% of PC users have spyware on their computers -In _______ ____ just visiting a Web site can cause a download (Mozilla Firefox is somewhat more secure than Internet Explorer)
question
Hacker
answer
____ (or cracker) refers to people who break into computer systems
question
Webjackers
answer
____ hijack Web pages and redirect users to other sites
question
Denial of Service (DOS) attacks
answer
____________ bombard servers and Web sites with traffic that shuts down networks
question
Token ID; smart card
answer
Depending on the security system, you might be granted access to a computer based on: _____-- Something you have A key, an ID card with a photo, or a ____ ____ containing digitally encoded identification in a built-in memory chip
question
smart card
answer
contains digitally encoded identification in a built-in memory chip
question
Passcode ID
answer
Depending on the security system, you might be granted access to a computer based on: ______:- Something you know A password, an ID number, a lock combination, or a piece of personal history, such as your mother's maiden name
question
Signature ID
answer
Depending on the security system, you might be granted access to a computer based on: - Something you do Your signature or your typing speed and error patterns
question
Biometric ID
answer
Depending on the security system, you might be granted access to a computer based on: ___: Something about you
question
biometrics
answer
Biometric ID - something about you A voice print, fingerprint, retinal scan, facial feature scan, or other measurement of individual body characteristics; these measurements are collectively called _____
question
passwords
answer
most common tool for restricting access to a computer system effective ___: -Not real words -Not names -Changed frequently -Kept secret -A combination of letters and numbers -Not shared across multiple accounts
question
dictionary attack
answer
Choosing a real word or name for your password leaves it susceptible to a
question
dictionary attack
answer
a comparison of your password to every word in the dictionary, which can be accomplished quickly
question
Keyloggers
answer
Beware of _____ - usually running on other people's computers Keyloggers log all keystrokes -Often USB devices placed between external keyboards and desktop computers. -Keylogger hardware often can't be detected by software
question
encryption software
answer
Making a message secure from outsiders requires
question
key
answer
Encryption software scrambles the sent message using a
question
different key
answer
A ____ ____ is needed to unscramble the received message
question
creates, encrypts, and sends
answer
the sender __________________ the message
question
transmitted through the network
answer
the encrypted message is
question
received and decrypted
answer
After the sender creates, encrptys, and send the message, the encrypted message id transmitted through the network. Then, the message is ___________________.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New