Flashcards About cis – College Essay

Unlock all answers in this set

Unlock answers
question
the internet is
answer
a large network of networks
question
a web site that allows anyone to add or edit content is called a
answer
wiki
question
the text version of a web sites internet address is called the
answer
url
question
the world wide web was invented by
answer
tim berners-lee at CERN
question
webcasts differ from podcasts in that webcasts
answer
are not updated automatically
question
in the url http://prenalhall.com, the portion labled .com is the
answer
top level domain
question
a key word or term that is assigned to a piece of information such as a web page, digital image, or video and describes the site so that it can be found again by browsing or searching
answer
tag
question
the internet backbone refers to
answer
the main pathway of high-speed communications lines through which all the internet traffic flows
question
the agency that first began funding the internet was called the
answer
advanced research projects agency network
question
the s in https stands for
answer
secure socket layer
question
a list of pages within a web site that you have visited and that usually appears at the top of a page is reffered to as a
answer
breadcrum trail
question
search engines have which three parts
answer
a spider, an indexer, and a search engine software
question
the internet and the world wide web are the same thing
answer
false
question
the internet is the largest computer network in the world
answer
true
question
the primary use for the internet is searching
answer
false
question
the web is simply a means of accessing information over the internet
answer
true
question
there are virtually no privacy risks in using todays newest social networking sites
answer
false
question
security is not much of a concern when working on a wireless network
answer
false
question
when shopping on the web, it is better to pay for your purchases with a debit card rather than a credit card
answer
false
question
the internet protocol used to upload and download files is http
answer
false
question
when evaluating a website, testing the relevancy of a site means checking to see if the information in the site is current
answer
true
question
the # sign ca nbe used as a wildcard when conducting searches with most search engines
answer
false
question
most public wifi hot spots are secured
answer
false
question
the ________ is a world wide computer network
answer
internet
question
a _________ is a clip of audio or video that is broadcast over the internet using compressed files
answer
podcast
question
specially coded text that can be clicked on to access another web page is referred to as a
answer
hyperlink
question
rather than passing documents back and forth, businesses are starting to use ________ as means of collaboration
answer
wikis
question
a popular collaborative online encyclopedia
answer
wikipedia
question
______ is anything that involves one or more forms of media in addition to text
answer
multimedia
question
a browsers _______ list shows all the web sites and pages that you have visited over a period of time
answer
history
question
if you want to share your internet connection with more than one computer you will need a
answer
router
question
_____ is an ongoing project sponsored by over 300 universities to develop new internet technologies
answer
internet2
question
according to the fbi, how much identity theft begins with emial?
answer
two thirds
question
of the following which is not a way to protect yourself from identity theft
answer
make all online purchases with a debit card
question
a virus taht is programmed to destroy pc files on a specific date is known as what kind of virus?
answer
time bomb
question
which statement is not true reguarding antivirus programs
answer
they always detect every virus on a pc
question
hardware or software designed to guard against unauthorized access to a computer network is known as a
answer
firewall
question
the majority of computer crimes are committed by
answer
company employees
question
the name for harrassment over the internet is
answer
cyberstalking
question
using deception to get individuals to reveal sensistive information is also known as a ______ attack
answer
social engineering
question
a program that masquerades as a useful program, but is really a destructive program is a
answer
trojan horse
question
which type of virus uses computer hosts to reprodue itself
answer
worm
question
whta is the name of an application program that gathers users information and sends it to someone through the internet
answer
spybot
question
when you visit certain websites, spyware may be automatically downloaded, this is called a
answer
drive-by download
question
a programmed attack that destroys data files if a programmer is ever terminated is an example of what tiem of trojan horse
answer
logic bomb
question
_______ is the measurement of things such as fingerprints and retinal scans used for security access
answer
biometrics
question
what is the most common tool used to restrict access to a computer system
answer
passwords
question
the scrambling of code in an email message ca nbe done using
answer
cryptography
question
an intentionally disruptive program that spreads either from program to program or from disk to disk is known as a
answer
virus
question
security procedures eliminate all risks to computers
answer
false
question
smart cards and biometrics are two ways companies may add physical security to computer systesm
answer
true
question
software that allows different levels of security per user is know as access control software
answer
true
question
a public key is only available to the user originating a message
answer
false
question
the most widely used data recovery techniques is making regular backups
answer
true
question
information can be recovered from a hard drive even after the file has been deleted
answer
true
question
computer crime often goes unreported because businesses fear negative pubilicity
answer
true
question
an email message claiming your facebook account has been hacked and you need to click on a link to restore your account is an example of a
answer
phishing
question
when you use a disk or usb jump drive in several different computers on the same day, you are taking the chance of contracting a
answer
virus
question
______ programs search for and eliminate viruses
answer
antivirus
question
a security _____ is a software program that closes possible security breaches in the operating system
answer
patch
question
an encryption _________ is the secret numerical code a user will utilize to encrypt a message
answer
key
question
most _________ allow you to connect wireless and wired computers together
answer
wireless router
question
which of the following is not an example of a WAN
answer
LANs connected in a single building
question
the most common type of home network is a
answer
p2p
question
sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network
answer
routers and switches
question
a computer network is defined as tow or more computers connected with ______ so that they can communicate with each other
answer
software and hardware
question
one way to increase security on a network is by installing a
answer
firewall
question
WPA stands for
answer
wifi protected access
question
throughput, the actual speed of data transfer that is achieved in a network is ususally
answer
less than or equal to the data transfer rate
question
a wireless network uses which of the following as its transmission medium
answer
radio waves
question
a client computer is the computer on which users accomplish specific tasks
answer
true
question
the internet is an example of a client/server network
answer
true
question
p2p networks are more commonly used in small businesses that in homes
answer
false
question
a single computer can function as both a client and a server, but performance will be degraded
answer
true
question
limiting your signal range does not help increase wireless network security
answer
false
question
wireless networks are more vulnerable to attack than wired networks
answer
ture
question
WEP is a stronger form of security than WAP
answer
false
question
a firewall can come in either software or hardware form
answer
true
question
many cities in the united states are now deploying __________ to provide internet access to residents and tourists
answer
MANs
question
a _______ network is one in which each computer can communicate directly with each other, instead of having a seperate device exercise central control over the entire network
answer
P2P
question
________ transfer data between two or more networks
answer
routers
question
_______ is a method of translating data into code
answer
encryption
question
________ refers to the act of connecting to a wireless connection without the permission of the owner
answer
piggybacking
question
_________ is the actual speed of a data transfer that is achieved on a network
answer
throughput
question
the 802.11 wireless standard is also know as
answer
wifi
question
public places where you can wirelessly connect to the internet are known as
answer
hotspots
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New