Comp. Lit. Exam (75) – Flashcards
Unlock all answers in this set
Unlock answersquestion
Bing, Google, and Yahoo! are all examples of web ____________________.
answer
search engines
question
A thesaurus can be used to look up a(n) _____, or a word similar in meaning to a given word.
answer
synonym
question
Because technology changes, you must keep up with the changes to remain digitally ____________________.
answer
literate
question
Storage devices like the hard disk shown in the accompanying figure often function as a source of input because they transfer items from storage to memory.
answer
true
question
The term, payload, as it pertains to computer crime, is defined as _____________.
answer
the destructive event or prank the program is intended to deliver
question
All mobile browsers support the use of plug-ins.
answer
false
question
A ____ symbol is another name for a dot symbol.
answer
bullet
question
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following?
answer
resources
question
A note reference mark signals that an explanatory note exists at the bottom of the page as a(n) ____, as shown in the accompanying figure.
answer
footnote
question
A web ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
answer
search engine
question
What term is used to describe the process of restricting access to certain material on the web?
answer
content filtering
question
Which of the following does your company use to track your time and attendance?
answer
hand geometry system
question
An entertainment website contains content that describes a cause, opinion, or idea.
answer
false
question
By default, the Normal style inserts a vertical space equal to ____ line(s) between each line of text.
answer
1.08
question
A megabyte is equal to approximately one billion characters.
answer
false
question
According to netiquette, Internet users should assume which of the following?
answer
the use of all capital letters is the equivalent of shouting
question
Using the technology shown in the accompanying figure, others connected to the same server see what a user has typed.
answer
true
question
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
answer
a worm
question
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal?
answer
an IT code of conduct
question
A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented.
answer
true
question
Similar to an editorial section in a newspaper, websites like the kind shown in the accompanying figure reflect the interests, opinions, and personalities of the author.
answer
true
question
Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure?
answer
notebook computer
question
An Internet connection is not necessary for participating in e-commerce.
answer
false
question
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer?
answer
chat
question
Larger corporate, government, and Internet applications may use powerful, expensive servers (an example of which is shown in the accompanying figure) to support their daily operation
answer
true
question
Which of the following statements is not a safeguard against the failure of hardware?
answer
device-tracking app
question
Although you can use a dialog box to indent paragraphs, Word provides a quicker way through the ____.
answer
horizontal ruler
question
Servers like the one in the accompanying figure typically support only one computer at a time.
answer
false
question
A letterhead should contain all of the following EXCEPT ____.
answer
the company's objective
question
Which of the following statements is not true about biometric devices?
answer
Biometric devices are an unreliable method of identification and notification.
question
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
answer
compaction
question
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
answer
information theft
question
Which of the following does your new smartphone use to unlock the device?
answer
face recognition
question
All social networking sites have a specialized audience.
answer
false
question
A tag name is an identifier that links a(n) ____ to a source.
answer
citation
question
Breakthroughs in surgery, medicine, and treatments seldom result from scientists' use of computers.
answer
false
question
All of the following are guidelines about the appearance of letterhead elements EXCEPT ____.
answer
make the font size of your name the same size as the rest of the text in the letterhead
question
A blog is an informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order.
answer
true
question
Which of the following does your financial institution use to reduce fraud?
answer
signature verification system
question
Business documents can include all of the following EXCEPT ____.
answer
personal letter
question
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
answer
spoofing
question
As an alternative to using the Color button on the PICTURE TOOLS FORMAT tab to display the Color gallery, you can right-click the graphic, click ____ on the shortcut menu, click the Picture button, expand the PICTURE COLOR section, and select the desired options.
answer
format picture
question
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
answer
a digital signature
question
According to the MLA style, the _____ is a list of sources that are referenced directly in a research paper.
answer
work cited page
question
Which of the following terms is used to describe a small text file that a web server stores on your computer?
answer
a cookie
question
Automatic page breaks are determined by ____.
answer
all of the above
question
A hot spot is a wireless network that provides Internet connections to mobile computers and devices.
answer
true
question
A game console is small enough to fit in one hand, making it more portable than the handheld game device.
answer
false
question
As wikis have grown in number, size, and popularity, many educators and librarians have shunned the sites as valid sources of research.
answer
true
question
Which of the following statements is not true about intellectual property rights?
answer
The term fair use refers to the rights which creators are entitled for their work.
question
The term, zombie, is _____________.
answer
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
question
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following?
answer
resources
question
The term, botnet, means _____________.
answer
a group of compromised computers connected to a network that attacks other networks
question
An effective business document should ____.
answer
all of the above
question
Which of the following is the least likely motive for a DDoS?
answer
spoofing
question
Bing, Google, and Yahoo! are all examples of web ____________________.
answer
search engine
question
The major differences between server computers like the one in the accompanying figure and client computers are that the client typically has more power, more storage space, and expanded communications capabilities.
answer
false
question
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music.
answer
false
question
By default, the Normal style places ____ points of blank space after each paragraph.
answer
8
question
the difference between a wiki and a site like the one in the accompanying figure is that users cannot modify original posts on an wiki.
answer
false
question
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children?
answer
hand geometry system
question
Most websites of the kind shown in the accompanying figure require payment for services.
answer
false
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
authoring ActiveX scripts
question
In order to safeguard your personal information, which of the following is recommended?
answer
Clear your history file when you are finished browsing.
question
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media?
answer
network
question
To select a ____ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow.
answer
cell
question
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
answer
cracker
question
All of the following are vertical alignment options EXCEPT ____.
answer
middle
question
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service?
answer
voice verification system
question
Which of the following does a new federal laboratory use in its high security areas?
answer
iris recognition system
question
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
answer
digital forensics
question
All social networking sites require friends to confirm a friendship.
answer
false
question
USB flash drives and memory cards usually hold more than hard disks like the kind shown in the accompanying figure.
answer
false
question
When using the MLA style, position in-text parenthetical references either at the _____, as shown in the accompanying figure.
answer
bottom of the page as footnotes or at the end of the paper as endnotes
question
Which of the following best describes the term, cybercrime?
answer
online or Internet-based illegal acts