CIS111 Final Review

Unlock all answers in this set

Unlock answers
question
________ is the maximum speed at which data can be transferred between two nodes.
answer
bandwidth
question
A network that spans a large physical distance is called a ________.
answer
WAN
question
Normal telephone cable is a type of ________.
answer
twisted-pair cable
question
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
answer
network adapter
question
On a network, a(n) ________ helps prevent data packets from colliding with each other.
answer
switch
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
answer
routers and switches
question
To transfer data packets between two or more networks, a ________ is used.
answer
router
question
Data are sent through a network in bundles called ________.
answer
packets
question
Using a network without the network owner's permission is known as ________.
answer
piggybacking
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
answer
MAC
question
The operating system of a cell phone is stored in ________.
answer
ROM
question
A(n) ________ chip converts sound waves from a voice into digital signal.
answer
analog-to-digital converter
question
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
answer
digital signal processor chip
question
A ________ is a geographical area with a base transceiver station at its center.
answer
cell
question
Which is true of SMS messages?
answer
They can only contain a limited number of characters.
question
You can send messages that include photos and videos between mobile devices using ________ technology.
answer
multimedia message service (MMS)
question
The distance between two near field communication (NFC) devices is limited to about ________.
answer
1.5 inches
question
________ allows only limited use of media that have been legally purchased.
answer
digital rights management
question
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
answer
sampling rate
question
Which of the following digital image formats compresses the image file?
answer
JPEG
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
________ viruses are often transmitted by a flash drive left in a USB port.
answer
Boot-sector
question
A(n) ________ takes advantage of file transport methods to spread on its own.
answer
worm
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
polymorphic
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
white-hat
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
answer
rootkit
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
CAPTCHA is ________.
answer
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
question
Adware and spyware are referred to collectively as ________.
answer
grayware
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
answer
pharming
question
What is the first step of the system development life cycle (SDLC)?
answer
problem and opportunity indentification
question
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
answer
algorithm
question
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
answer
control structures
question
A loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
answer
test condition
question
________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks.
answer
top-down design
question
Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them.
answer
classes
question
An example of a first-generation language is ________.
answer
machine language
question
The capability of moving a completed programming solution easily from one type of computer to another is known as ________.
answer
portability
question
The process that converts program code into machine language is called ________.
answer
compilation
question
________ is the set of instructions that programmers have written in a higher-level language.
answer
source code
question
Division by zero is a ________ error that is caught when the program executes.
answer
runtime
question
A small Java-based program is called a ________.
answer
java applet
question
Special symbols called tags are used in which of the following languages?
answer
HTML/XHTML
question
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________.
answer
redundancy
question
In a database, the term ________ is synonymous with a category of information.
answer
field, row, table, record***
question
In a database, a group of related records is referred to as a(n) ________.
answer
table
question
In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field.
answer
long text
question
You can set a ________, which is automatically displayed in a field unless the user enters something different.
answer
default value
question
________ is used to ensure that data is organized most efficiently.
answer
normalization, range checking, consistency checking, validation
question
________ databases are the most commonly used electronic databases.
answer
relational
question
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
answer
referential integrity
question
A(n) ________ check determines whether a required field such as LastName was filled in.
answer
completeness
question
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
answer
select query
question
________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize.
answer
exporting
question
Big data analytics is usually associated with ________ services.
answer
data warehouse
question
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
answer
real-time
question
In a ________ network, each node connected to the network communicates directly with every other node.
answer
peer-to-peer
question
A ________ uses the Internet communications infrastructure to build a secure and private network.
answer
VPN
question
A(n) ________ server is a server that stores and manages files for network users.
answer
file
question
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
answer
spooler
question
Which of the following is the most commonly used client/server network topology?
answer
star
question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
answer
jam
question
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
answer
bandwidth
question
________ is the standard communications protocol used on most client/server networks.
answer
ethernet
question
The physical address assigned each network adapter is called its ________.
answer
media access control (MAC)
question
A(n) ________ address is the address that external entities use when communicating with your network.
answer
IP
question
A ________ sends data from one collision domain to another.
answer
bridge
question
A ________ sends data between two networks.
answer
router
question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
answer
brute force attack
question
The main path of the Internet along which data travels the fastest is known as the Internet ________.
answer
backbone
question
High-speed ________ communication lines use fiber-optics.
answer
OC
question
The main suite of protocols used on the Internet is ________.
answer
TCP/IP
question
is an example of an HTML ________.
answer
tag
question
________ defines the content in terms of the data that is being described rather than how it is to be displayed.
answer
XML
question
________ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user.
answer
CGI
question
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
answer
applet
question
The ________ defines items on a web page such as graphics, tables, and headers as objects.
answer
DOM
question
Which protocol is used when sending files as attachments by e-mail?
answer
Multipurpose Internet Mail Extensions (MIME)
question
In public-key encryption, the two keys—one for coding and one for decoding—are known as ________.
answer
a key pair
question
Which of the following is an example of an instant messaging service?
answer
yahoo messenger
question
________ permits two or more people to communicate over the Internet in real time.
answer
instant messaging
question
Strong encryption now requires ________-bit keys.
answer
256
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New