Computer last test – Flashcards
Unlock all answers in this set
Unlock answersquestion
            The Internet is managed centrally by the United States government, as it was primarily developed in this country.
answer
        False
question
            ___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.
answer
        Cookies
question
            PayPal and Google Wallet are both examples of online payment services that allow you to pay for goods online and transfer money to other individuals.
answer
        true
question
            One of the most powerful features of Google Maps is Street View, which shows you almost any part of a map as if you were driving through that street.
answer
        true
question
            Many companies and specialty websites offer ___, or discussion boards, where individuals can ask questions and reply to each other.
answer
        forums
question
            In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.
answer
        pay-per-click
question
            The seeds of the Internet were planted in 1969 with ___, which connected computers at four universities in the western United States.
answer
        ARPANET
question
            Browser ___, such as Adobe Flash Player, are separate programs that allow your web browser to play several types of multimedia content.
answer
        plug-ins
question
            A(n) ___ is a web page or small website that contains a series of chronological posts and comments.
answer
        blog
question
            ___ is not always considered to be a reliable site because you cannot be certain that the information you are reading comes from a credible source.
answer
        Wikipedia
question
            Any email address placed in the ___ will be invisible to the recipients of your message.
answer
        bcc
question
            ___ is the act of having an online, text-based conversation with one or more individuals that occurs in real time.
answer
        Instant messaging
question
            The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.
answer
        P2P
question
            3G, 4G, and LTE are all terms that refer to mobile Internet connectivity.
answer
        true
question
            In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
answer
        LinkedIn
question
            Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity.
answer
        false
question
            ___ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.
answer
        Search engines
question
            Twitter restricts posts, or tweets, to a maximum of 180 characters.
answer
        False
question
            "192.168.1.101" is an example of an IPv4 address.
answer
        True
question
            DSL technology is currently faster than cable or fiber-optics.
answer
        False
question
            The ___ is a global system of linked, hypertext documents.
answer
        World Wide Web
question
            If you want to include a file with your email message, it should be placed it in the __ area.
answer
        attachments
question
            If you visit a website or page that you would like to remember for the future, you can add it to your browser's bookmarks or favorites.
answer
        True
question
            Social news sites, such as ___, encourage users to share links to news and other interesting content they find on the Web.
answer
        Reddit
question
            Twitter popularized a system that uses the ___ symbol to mark keywords or topics in a message.
answer
        hashtag
question
            Which of the following is NOT a web browser?
answer
        Bing
question
            ___, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.
answer
        VoIP
question
            The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
answer
        broadband
question
            A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.
answer
        Domain Name
question
            Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the Internet.
answer
        URL
question
            If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
answer
        WAN
question
            Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
answer
        hacker
question
            A wireless ___ is the device to which all nodes connect in order to communicate wirelessly.
answer
        access point
question
            ___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
answer
        Botnets
question
            ___ involves luring individuals into entering personal information into a website controlled by the hacker.
answer
        Phishing
question
            Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
answer
        packets
question
            Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services
answer
        true
question
            A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
answer
        fiber-optic
question
            Which of the following is NOT one of the specifications of Wi-Fi technology?
answer
        802.11x
question
            Any step you take to ward off a threat is called a:
answer
        countermeasure
question
            When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.
answer
        UPS
question
            A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
answer
        switch
question
            A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
answer
        Trojan horse
question
            ___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
answer
        Strong
question
            Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
answer
        VPN
question
            ___ is a type of malware which is designed to report activity on your computer to another party.
answer
        Spyware
question
            Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
answer
        Ethernet
question
            The network that connects the computers in a school's study center or library is considered a LAN.
answer
        true
question
            For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
answer
        bandwidth
question
            Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
answer
        true
question
            Large organizations often use a ___ library for backups and archives of their data.
answer
        tape
question
            A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
answer
        virus
question
            Social engineering is a form of hacking that has a social or political agenda behind it.
answer
        false
question
            The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
answer
        true
question
            The ___ lock can make it difficult for thieves to steal a laptop.
answer
        Kensington
question
            The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
answer
        scareware
question
            A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
answer
        surge protector
question
            Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
answer
        Who you know
question
            A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
answer
        worm
question
            A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
answer
        DDoS
question
            Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
answer
        Ad-supported streaming
question
            Most population centers now have a municipal or private program that encourages the recycling of old and broken computers and peripherals.
answer
        true
question
            Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
answer
        fair use
question
            Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
answer
        true
question
            ___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
answer
        Private browsing
question
            ___ refers to the technology gap that exists between different social and economic classes.
answer
        Digital divide
question
            ___ occurs when computers or machines can perform the work that was once done by a human.
answer
        Automation
question
            Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.
answer
        DRM
question
            Creative works such as books, songs, and photographs are protected by copyright law.
answer
        true
question
            ___ is the process of working for a company without being physically present at the company's office.
answer
        Telecommuting
question
            The sleep mode on a computer generally saves more electricity than hibernate mode.
answer
        false
question
            The term ___ refers to the set of online behaviors that are considered polite and proper.
answer
        netiquette
question
            Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.
answer
        privacy policy
question
            Many websites have a(n) ___ area that should be checked for common questions and their responses.
answer
        FAQ
question
            ___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
answer
        Biotechnology
question
            Copyright protection lasts 20 years after the date of publication or release.
answer
        false
question
            Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
answer
        true
question
            For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
answer
        true
question
            Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.
answer
        NSA
question
            ___ involves the creation or manipulation of matter at the smallest possible scale.
answer
        Nanotechnology
question
            ___ is the act of alerting the public about harmful activities that are being hidden by an organization.
answer
        Whistleblowing
question
            ___ are files that record activities and events on a computer.
answer
        Logs
question
            ___ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
answer
        Watson
question
            Many teenagers have had to seek therapy because of cyberbullying, and in a few extreme cases, even committed suicide.
answer
        true
question
            ___ is the act of being annoying and antagonistic in online social interactions.
answer
        Trolling
question
            In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
answer
        piracy
question
            Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
answer
        false
question
            Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
answer
        true
question
            ___ occurs when an organization transfers some aspect of its business to a third party.
answer
        Outsourcing
question
            A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
answer
        AUP