Practice Test Three – Flashcards with Answers
Unlock all answers in this set
Unlock answersquestion
Which of the following is NOT true about peer-to-peer networks? In a P2P network, each device can share its resources with every other device, and there is no centralized authority. P2P networks are only found in homes or small businesses. Computers in a P2P network belong to a workgroup. A P2P network uses the networking functions built into desktop or mobile operating systems, and therefore does not require a network operating system.
answer
P2P networks are only found in homes or small businesses.
question
________ is the protocol that converts a domain name such as ebay.com to an IP address.
answer
DNS
question
By using password-stealing software, ________capture what is typed on a keyboard, and phishing and pharming scams, criminals can easily obtain enough personal information to wreak havoc on an individual.
answer
keyloggers
question
A(n) ________ account is used for making changes, installing software, configuring settings, and completing other tasks.
answer
administrator
question
________ is when a social network user clicks a link and enables malware to post unwanted links on their page.
answer
Clickjacking
question
A ________ is two or more computers that share resources.
answer
computer network
question
Which of the following is NOT true about securing a network? In a network, the network configuration determines what is shared and who is granted access to it. In a home network, the hardware firewall is established by protocols. A firewall prevents unauthorized access to a network. In a network, the first layer of defense is the hardware at the access point to the network.
answer
In a home network, the hardware firewall is established by protocols.
question
In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login.
answer
Client-server
question
Server ________ is when multiple versions of server software runs on the same computer.
answer
Virtualization
question
Members of a ________ automatically share their picture, music, and video libraries and their printers with each other without any additional configuration.
answer
homegroup
question
________ hack into systems for malicious purposes, such as theft or vandalism.
answer
Black-hats
question
A ________ blocks unauthorized access to a network.
answer
firewall
question
To share resources with Macs, Linux, or older computers not running Windows 7 or 8, you must use a ________.
answer
workgroup
question
The ________ enables multiple client devices to communicate with the server and each other, to share resources, to run applications, and to send messages.
answer
network operating system
question
________ hackers are security experts that are paid to hack systems to find security holes for the purpose of preventing future hacking.
answer
Gray-hat
question
A(n) ________ account is used for everyday computing.
answer
standard
question
________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation.
answer
Hackers
question
________ scans files on your computer to search for known viruses.
answer
Antivirus software
question
Whenever you visit a site and click the Remember me or Keep me logged in button, the website puts ________ on your computer.
answer
A cookie
question
A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________.
answer
wireless adapter
question
A ________ is spyware that changes your home page and redirects you to other websites.
answer
Browser hijacker
question
In a ________ topology, the nodes are all connected using a single cable.
answer
Bus
question
________ redirects you to a phony website.
answer
Pharming
question
Malicious ________ can use CPU cycles and Internet bandwidth and, as a result, can reduce your computer's performance and slow down your browsing dramatically.
answer
adware
question
A ________ attacks when certain conditions are met, such as when an employee's name is being removed from a database.
answer
logic bomb
question
Mass, unsolicited email messages is called ________.
answer
Spamming
question
________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network.
answer
Phishing
question
________ define the rules for communication between devices.
answer
Protocols
question
________ is a form of malware that secretly gathers personal information about you.
answer
Spyware
question
A ________ is a network that has all connected devices located in the same physical location.
answer
LAN
question
T/F: In a client-server network, users log in to the network instead of their local computers and are granted access to resources based on that login.
answer
True
question
T/F: A browser hijacker is spyware that changes your home page and redirects you to other websites.
answer
False
question
T/F: Network hardware is what enables devices to connect to each other, but the domain controller enables them to communicate.
answer
False
question
T/F: Routers make up the backbone of the Internet and are responsible for sending the data packets along the correct route to their destination.
answer
True
question
T/F: The U.S. Cyber Command reported that the Pentagon systems are attacked 500,000 times an hour.
answer
False
question
T/F: Your personal information, such as credit card numbers, is stored in a cookie.
answer
False
question
T/F: A wireless LAN has a very limited range of only about 10 to 100 meters, roughly 30 to 300 feet.
answer
False
question
T/F: A home LAN uses the same network standards and equipment as those used in larger business networks.
answer
False
question
T/F: Servers range from very small to massive enterprise-level systems that serve hundreds of thousands of clients.
answer
False
question
T/F: Cellular networks use encryption to ensure the data is secure as it travels through the public network.
answer
False
question
T/F: A firewall blocks unauthorized access to a network.
answer
True
question
T/F: A Trojan horse is a program that appears to be a legitimate program but is actually malicious.
answer
True
question
T/F: Computers running Windows 7 or later can belong to a workgroup.
answer
True
question
T/F: Each device that connects to a network must have some type of network adapter.
answer
True
question
T/F: Sending mass, unsolicited email messages is called spamming.
answer
True
question
T/F: Identity theft occurs when someone uses your name, Social Security number, or bank or credit card number fraudulently.
answer
True
question
T/F: Devices on a LAN are connected by using nodes.
answer
False
question
T/F: WiFi networks found in homes and public hotspots use the IEEE 201.88 standards.
answer
False
question
T/F: Computer networks save both time and money and make it easier to work, which increases productivity.
answer
True
question
T/F: Phishing redirects you to a phony website.
answer
False
question
________ is the delivery of applications over the Internet.
answer
Saas
question
A ________ is a 256-color graphic file format that uses lossless compression and is best for simple images with large areas of solid color.
answer
GIF
question
________ means that the source code is published and made available to the public, enabling anyone to copy, modify, and redistribute it without paying fees.
answer
Open source
question
You should always read the ________, which is the contract between the software user and the software publisher.
answer
site license
question
A ________ license grants a license to use one or more copies of the software, but ownership of those copies remains with the software publisher.
answer
proprietary software
question
________ refers to applications and services that are accessed over the Internet.
answer
Cloud computing
question
All of the following are standard features of word processors EXCEPT ________. JPG TIF BMP GIF
answer
BMP
question
The most commonly used productivity software used in business is a(n) ________.
answer
office application suite
question
________ help you work more efficiently and effectively on both personal and business-related documents.
answer
Productivity programs
question
All of the following are one of the four basic models for software distribution EXCEPT ________. charityware shareware freeware retail software
answer
Charityware
question
Microsoft Office, Adobe Photoshop, and TurboTax are all types of ________.
answer
retail software
question
A ________ license allows multiple installations of software using the same product key.
answer
Per-set
question
________ dimensional spreadsheets can have multiple worksheets that are linked together.
answer
Three-
question
A ________ is a graphic format that can store up to 16.7 million colors.
answer
JPG
question
Personal ________ software can be used to keep track of your bank accounts, monitor investments, create and stick to a budget, and file income taxes.
answer
Finance
question
A ________ is a single point on a display screen.
answer
Pixel
question
Which of the following is NOT true about determining system requirements? System requirements pertain to the minimum hardware and software specifications required to run a software application. For most software you buy in a store, you will need a DVD drive to perform the installation. You can verify that you have enough free space in Windows 8 by opening Internet Explorer. On a Windows computer, one of the easiest ways to obtain the system information you need is to open the System Control Panel window.
answer
You can verify that you have enough free space in Windows 8 by opening Internet Explorer.
question
Microsoft PowerPoint and Keynote are examples of ________.
answer
presentation applications
question
Microsoft SharePoint, KnowledgeTree, and Alfresco are examples of ________.
answer
document management systems
question
________ formats rely on compression, low frame rates, and small image size to deliver your video over the Internet.
answer
Streaming video
question
________ is the Adobe application that creates an environment in which you develop webpages visually or directly in code.
answer
Dreamweaver
question
Which of the following is NOT true about video game applications? (1 point) The average age of a video game player is 32 to 35 years old, 20 percent are over 50, and about 40 percent are female. Video game sales, which includes mobile apps, games for video game systems, and computer games, reached $16.6 billion in the United States in 2011. Games and simulations are no more than just first-person actors in which you play the game from the perspective of the game character. Game software typically requires a lot of processing, memory, and video power to run well.
answer
Games and simulations are no more than just first-person actors in which you play the game from the perspective of the game character.
question
A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features.
answer
Service pack
question
A ________ enables you to create electronic worksheets composed of rows and columns.
answer
Spreadsheet application
question
________ means that an organization uses servers in the cloud instead of purchasing and maintaining the servers on site.
answer
Iaas
question
The default file type used by Apple's iTunes software is ________.
answer
AAC
question
A(n) ________ file is about one-tenth the size of a CD file.
answer
MP3
question
Which of the following is NOT true about spreadsheets? (1 point) In a spreadsheet, the intersection of a row and a column is called a cell. By using a spreadsheet application, you can create tables to represent data visually. Spreadsheets are quite useful for managing business expenses, payroll, and billing. Spreadsheets organize data so that it can be sorted, filtered, and rearranged, making them useful for things that do not involve calculations at all.
answer
By using a spreadsheet application, you can create tables to represent data visually.
question
When software publishers release updates, these updates can address security holes or ________.
answer
bugs
question
A ________ is an application with which you can create, edit, and format text documents.
answer
word processor
question
T/F: The process of software installation may require you to enter guest credentials.
answer
False
question
T/F: Machinima is a creative use of streaming video.
answer
False
question
T/F: The most popular general-purpose applications are productivity programs, which help you work more efficiently and effectively on both personal and business-related documents.
answer
True
question
T/F: A database is an organized collection of facts about people, events, things, or ideas related to a specific topic or purpose.
answer
True
question
T/F: The Portable Apps platform is closed source, however the apps are free.
answer
False
question
T/F: Mobile apps that extend the functionality of mobile devices should be downloaded only from trusted sources.
answer
True
question
T/F: Page description languages describe image elements as geometric objects, such as lines and arcs, and consist of commands given by the program and carried out by the printer to re-create the computer image precisely on a printed page.
answer
True
question
T/F: QuickTime is a video file format developed by Microsoft Corporation.
answer
False
question
T/F: Finance software enables you to complete your income tax returns yourself on your computer or online.
answer
False
question
T/F: When you see a movie at a theater, you are actually looking at still images shown at a frame rate that is high enough to trick the eye into seeing continuous motion.
answer
True
question
T/F: The most commonly used accounting software used in business is an office application suite, such as Microsoft Office.
answer
False
question
T/F: A budget spreadsheet that has a worksheet for each quarter and an annual summary worksheet is an example of a quasi-dimensional spreadsheet.
answer
False
question
T/F: Cloud computing is another term for the Internet.
answer
False
question
T/F: DRM is a technology applied to digital media files such as music, ebooks, and videos to impose restrictions on the use of these files.
answer
True
question
T/F: Before you purchase new software you should first document your system so that you can compare it to the system requirements.
answer
True
question
T/F: Open source means that the source code is published and made available to the public, enabling anyone to copy, modify, and redistribute it without paying fees.
answer
True
question
T/F: Video game sales, which include mobile apps, games for video game systems, and computer games, reached $16.6 billion in the United States in 2011.
answer
True
question
T/F: Codecs are compression algorithms that reduce the size of digital media files.
answer
True
question
T/F: A commonly used SaaS service is off-site backup services.
answer
False
question
T/F: A bug is a flaw in a program.
answer
True