Computer Science. Exam 3: Michelangelo Computer Virus, server networks, program file

Flashcard maker : Lily Taylor

A peer-to-peer (P2P) network is an example of ________ administration.

A) corporate
B) central
C) wide area
D) local

D. local
The most popular transmission media option for wired home Ethernet networks is ________ cable.
A) coaxial
B) fiber-optic
C)unshielded twisted-pair (UTP)
D) power-line
C. unshielded twisted-pair (UTP)
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
A) Routers and switches
B) Firmware
C) USB ports
D) Firewalls
A. Routers and switches
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
A. Windows 7
C. firewall
D. firmware
B. network operating system (NOS)
Wireless network devices use ________ to communicate with each other.
A)satellitesB)

fiber optics

C)

DSL

D)

radio waves

D) radio waves
Data are sent through a network in bundles called ________.
A. packages
B. pouches
C. packets
D. switches
C. packets
Which of the following is NOT a wired broadband Internet connection option?
A)Dial-upB)

DSL

C)

Fiber-optic

D)

Cable

A) dial up
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
A. change your network name (SSID)
B. enable SSID broadcast
C. turn on security protocols
D. create a passphrase
B. enable SSID broadcast
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
A. MAC
B. IP
C. SSID
D. network
A. MAC
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
A. MAN
B. PAN
C. LAN
D. WAN
A. MAN
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
A. DSL modem
B. network adapter
C. network interface card
D. router
B. network adapter
A ________ is a network located in your residence that connects to all your digital devices.
A. MAN
B. WAN
C. HAN
D. LANG
C. HAN
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
A. node
B. switch
C. broadband
D.network
D. network
The fastest version of wireless Ethernet is ________.
A) 802.11ab
B) 802.11n
C) 802.11g
D) 802.11ac
D) 802.11ac
To transfer data packets between two or more networks, a ________ is used
A) firewall
B) router
C) switch
D) hub
B. router
Using a network without the network owner’s permission is known as ________.
A. hijacking
B. chillijacking
C. piggybacking
D. hybacking
C. piggybacking
A(n) ________ device facilitates file sharing and data backup.
A) NAS
B) UTP
C) NOS
D) WAN
A. NAS
A ________ is a device connected to a network such as a printer or a game console.
A) packet
B) NOS
C) NIC
D) node
D. node
Normal telephone cable is a type of ________.
A) fiber-optic cable
B)coaxial cable
C) twisted-pair cable
D) Ethernet cable
B. twisted pair
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network
A) Cat 6A
B) Cat 5E
C) Cat 7B
D) Cat 6
C) Cat 7B
A network that spans a large physical distance is called a ________.
A)WANB)

LAN

C)

MAN

D)

PAN

C) WAN
On a network, a(n) ________ helps prevent data packets from colliding with each other.
A)hubB)

switch

C)

adapter

D)

router

B. switch
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.
A)BandwidthB)

Benchmark

C)

Broadband

D) Throughput

D. throughput
Which of the following is NOT used to classify network architectures?
A)Distance between nodesB)

Communication medium

C)

Protocol used to exchange data

D)

Speed of the network

D. speed of the network
Which of the following is NOT a type of cable used in wired networks?
A)Unshielded coaxialB)

Unshielded twisted-pair

C)

Fiber-optic

D)

Coaxial

A) unshielded coaxial
All of the following are tasks for network administration of a large organization EXCEPT ________.
A)monitoring network performanceB)

purchasing initial equipment for the network

C)

installing new computers and devices on the network

D)

updating and installing new software on the network

B) purchasing initial equipment for the network
A client/server network is an example of ________ administration
A)remoteB)

local

C)

central

D)

wide

C) central
________ is the maximum speed at which data can be transferred between two nodes
A)ThroughputB)

Broadband

C)

Bandwidth

D)

Through speed

C) Bandwith
Which transmission medium transmits data the fastest?
A)Fiber-optic cableB)

Twisted-pair cable

C)

Wireless

D)

Coaxial cable

A) Fiber-optic cable
All of the following operating systems support P2P networking EXCEPT ________.
A)LinuxB)

Unix

C)

Windows

D)

OS X

B) Unix
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
A)denial of service (DoS)B)

rootkit

C)

zombie

D)

logic bomb

B) rootkit
Which of the following is NOT a virus category?
A)macroB)

logic bomb

C)

worm

D)

pharming

D) pharming
Rules for creating passwords include all of the following EXCEPT ________.
A)change your password frequentlyB)

use letters, numbers and symbols in your passwords

C)

use a dictionary to find a lengthy word that is easy to remember

D)

keep your password a secret

C) use a dictionary to find a lengthy word that is easy to remember
Adware and spyware are referred to collectively as ________.
A)graywareB)

firmware

C)

viruses

D)

alertware

A) grayware
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
A)firehouseB)

fire extinguisher

C)

firebreak

D)

firewall

D) firewall
CAPTCHA stands for ________.
A)Complete Automated Public Turing Trial to Tell Computers and Humans ApartB)

Completely Automated Public Turing Test to Tell Computers and Humans Apart

C)

Completely Amazing Public Turing Test to Tell Computers and Humans Apart

D)

Completely Automated Private Turing Trial to Tell Computers and Humans Apart

B) Completely Automated Public Turing Test to Tell Computers and Humans Apart
Using your computer for non-work activities while you are being paid to work is known as ________.
A)cyberlazingB)

cyberbreaking

C)

cybersleeping

D)

cyberloafing

D) cyberloafing
Which of the following statements about cookies is NOT true?
A)Cookies are text files.B)

Some companies sell the personal information found in cookies to other companies.

C)

Cookies help companies determine the traffic flow through their website.

D)

Cookies obtain your personal information by searching your hard drive.

D) Cookies obtain your personal information by searching your hard drive.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
A)compression codeB)

virus pattern

C)

encryption code

D)

virus signature

D) virus signature
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
A)non-auction scamB)

identity theft

C)

advance fee fraud

D)

theft of services

D) theft of services
A ________ is a virus that is triggered on a certain date
A)logic bombB)

time bomb

C)

worm

D)

macro

B) time bomb
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A)PretextingB)

A DDoS attack

C)

A Trojan horse

D)

A polymorphic virus

B) DDoS attack
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A)theftB)

engineering

C)

pretexting

D)

pharming

B) engineering
Creating and distributing ________ is one of the most widespread types of cybercrimes
A)computer virusesB)

spam

C)

cookies

D)

zombies

A) computer viruses
With regard to computer protection, quarantining is defined as ________.
A)placing a found virus in a secure area on the hard driveB)

updating your antivirus software

C)

repairing an infected file

D)

deleting an infected file

A) placing a found virus in a secure area on the hard drive
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
A)antivirus softwareB)

a packet sniffer

C)

a firewall

D)

a packet filter

C) a firewall
FBI-related scams involve ________.
A)running auctions that do not existB)

convincing people to send money as a “good faith” gesture

C)

collecting funds and not delivering the goods

D)

people pretending to represent official organizations

D) people pretending to represent official organizations
________ viruses are often transmitted by a flash drive left in a USB port.
A)Time bombB)

Logic bomb

C)

Macro

D)

Boot-sector

D) Boot-sector
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
A)Gray-hatB)

Green-hat

C)

Black-hat

D)

White-hat

D) White-hat
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
A)steal your logons and passwords for various accountsB)

use your debit card information to purchase items illegally

C)

assume your identity

D)

launch a denial of service (DoS) attack on your computer

D) launch a denial of service (DoS) attack on your computer
Which of the following classifications of viruses can change its own code to avoid detection?
A)StealthB)

Multipartite

C)

Worm

D)Polymorphic

D) Polymorphic
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A)packet switchingB)

logical port blocking

C)

static addressing

D)

packet filtering

B) logical port blocking
Which of the following provides a visual representation of the patterns of an algorithm?
A)PseudocodeB)

Flow analysis

C)

Flowchart

D)

Gantt chart

C) flowchart
The flowchart shape for a process is a(n) ________.
A)rectangleB)

parallelogram

C)

oval

D)

diamond

D) diamond
________ is the process of translating a task into a series of commands that a computer will use to perform the task
A)DebuggingB)

Diagramming

C)

Analyzing

D)

Programming

D) programming

________ is a combination of natural language and programming language that is used to document an algorithm.

A)

Diagramming

B)

Flowcharting

C)

Debugging

D)

Pseudocode

D) Psuedocode

In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.

A)

reusability

B)

inheritance

C)

regression

D)

scalability

B) inheritance

Corona and Magmito can be used to develop ________.

A)

Web pages

B)

Mac software

C) apps for smartphones

D)

complex web applications

C) apps for smartphones

________ is the instructions programmers have written in a higher-level language.

A)

Compiled code

B)

Source code

C)

Executable code

D)

Base code

B) Source code
Which language is the most popular language for writing Apple OS X applications?
A)C++B)

Objective C

C)

HTML

D)

Java

B) objective c

________ is a powerful programming language that can be used to create a wide range of Windows applications.

A)

PHP

B)

HTML

C)

Visual Basic

D)

BASIC

C) visual basic
What is the first step of the system development life cycle (SDLC)?
A)Problem and opportunity identificationB)

Development and documentation

C)

Analysis

D)

Design

A) problem and opportunity identification
An integrated development environment (IDE) is a ________.
A)program that helps interpret codeB)

collection of tools that helps programmers write and test their programs

C)

program that translates code into binary 1s and 0s and ignores comments

D)

tool that converts one programming language into a different programming language

B) collection of tools that helps programmers write and test their programs
The first-generation language is ________.
A)machine languageB)

assembly language

C)

COBOL

D)

BASIC

A) machine language
Which of the following is the final stage of the program development life cycle (PDLC)?
A)Making the planB)

Debugging the code

C)

Testing and documentation

D)

Coding

C) testing and documentation
A small Java-based program is called a ________.
A)Java appletB)

JSP

C)

JavaScript

D)

Java class

A) java applet

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

A)

general availability (GA)

B)

gamma

C)

beta

D)

release to manufacturers (RTM)

C) Beta
A loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
A)testing planB)

test condition

C)

operator

D)

class

B) test condition
________ is the standard communications protocol used on most client/server networks.
A)TCP/IPB)

VPN

C)

Ethernet

D)

NOS

C) Ethernet
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable
A)HierarchicalB)

Bus

C)

Cluster

D)

Star

B) Bus
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
A)Fiber-opticB)

Polycarbonate

C)

Twisted-pair

D)

Coaxial

A) fiber-optic
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
A)InfusionB)

Data capacity

C)

Bandwidth

D)

Scalability

C) bandwidth
A(n) ________ server is a server that stores and manages files for network users
A)e-mailB)

print

C)

database

D)

file

D) file
A ________ sends data from one collision domain to another
A)linkB)

router

C)

switch

D)

bridge

D) bridge
Ring networks use the ________ method to avoid data collisions
A)passive-checkB)

token

C)

packet screening

D)

active-check

B) token
A(n) ________ address is the address that external entities use when communicating with your network.
A)ALUB)

WAP

C)

IP

D)

MAC

C) IP
The physical address assigned each network adapter is called its ________.
A)network physical address (NPA)B)

media access control (MAC)

C)

network access control (NAC)

D)

physical address control (PAC)

B) media access control (MAC)
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
A)fileB)

authentication

C)

application

D)

dedicated

B) authentication
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A)Trojan horseB)

worm

C)

spammer

D)

brute force attack

B) worm
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
A)loggerB)

spooler

C)

heap

D)

stack

B) spooler

All of the following are ways that can infect your computer with a virus EXCEPT ________.

A)

downloading or running an e-mail attachment file
B)

sharing flash drives

C)

downloading video files from peer-to-peer sites

D)

installing a manufacturer’s printer driver

A) downloading or running an e-mail attachment file
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
A)FBI and National White Collar Crime CenterB)

FBI and local police departments

C)

FBI and National Defense Department

D)

National White Collar Crime Center and U.S. Department of Defense

A) FBI and National White Collar Crime Center
When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.
A)phishingB)

pharming

C)

polymorphing

D)

pretexting

B) pharming
________ is a program that gathers information about your surfing habits without your knowledge.
A)GhostwareB)

Adware

C)

Shareware

D)

Spyware

D) spyware

Which type of virus was the famous Michelangelo virus?

A) time bomb

B)

An e-mail virus

C)

A worm

D)

A script virus

A) time bomb
A ________ is a virus that is attached to documents such as Word or Excel files.
A)Trojan horseB)

script virus

C)

polymorphic virus

D)

macro virus

D) macro virus
A(n) ________ takes advantage of file transport methods to spread on its own.
A)encryption virusB)

script virus

C)

macro virus

D)

worm

D) worm
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A)Social networkingB)

Hacking

C)

Phishing

D)

Cybercrime

D) cybercrime
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
A)flowchartsB)

operators

C)

pseudocode

D)

control structures

D) control structures
The final step of the system development life cycle (SDLC) is ________.
A)analysisB)

maintenance and evaluation

C)

testing and installation

D)

design

B) maintenance and evaluation
Which of the following would NOT be used to build websites with interactive capabilities?
A)Java Server PagesB)

PHP (hypertext preprocessor)

C)

Fortran

D)

Active Server Pages

C) fortran
Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them.
A)fieldsB)

classes

C)

blocks

D)

units

B) classes
________ enables users to define their own data-based tags and facilitates exchange of information between websites.
A)PHPB)

HTML

C)

XHTML

D)

XML

D) XML
SQL is an example of a ________.
A)2GLB)

3GL

C)

4GL

D)

5GL

C) 4GL
Which statement does NOT describe fifth-generation languages?
A)They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.B)

Problems are presented as a series of facts or constraints rather than as a specific algorithm.

C)

The system of facts can be queried.

D)

They are the most “natural” of languages.

A) They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network
A)scanningB)

viewing

C)

sniffing

D)

screening

D) screening
A ________ keeps your computer safe by determining who is trying to access it.
A)firewallB)

switch

C)

gateway

D)

hub

A) firewall
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
A)blockB)

stopper

C)

terminator

D)

endcap

C) terminator
Which of the following is NOT a common network topology?
A)Linear busB)

Ring

C)

Star

D)

Cluster

D) cluster
For business networks, which of the following is NOT a main cable type?
A)DuplexB)

Coaxial

C)

Fiber-optic

D)

Twisted-pair

A) Duplex
A ________ sends data between two networks.
A)routerB)

switch

C)

hub

D)

repeater

A) router
Special symbols called tags are used in which of the following languages?
A)HTML/XHTMLB)

Java

C)

C++

D)

C#

A) HTML/XHTML
Translating an algorithm into a programming language is called ________.
A)codingB)

compiling

C)

executing

D)

interpreting

A) coding
________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks.
A)Object-oriented analysisB)

Top-down design

C)

Inheritance

D)

Bottom-up design

B) top-down design
The process that converts program code into machine language is called
A)documentationB)

compilation

C)

variable declaration

D)

execution

B) compilation
Which of the following is NOT a factor to consider when selecting network cabling?
A)Maximum run lengthB)

Interference

C)

Cable diameter

D)

Bandwidth

C) cable diameter
Which of the following is the most commonly used client/server network topology?
A)HierarchicalB)

Star

C)

Ring

D)

Cluster

B) Star
A(n) ________ server is a heavily secured server located between a company’s secure internal network and its firewall
A)transitionalB)

armored

C)

proxy

D)

bastion host

D) bastion host
Division by zero is a ________ error that is caught when the program executes.
A)logicalB)

syntax

C)

runtime

D)

compiler

C) runtime
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
A)algorithmB)

flowchart

C)

structure chart

D)

pseudocode

A) algorithm
The computers in a lab on a floor of a building would be connected using a ________.
A)WANB)

LAN

C)

PAN

D)

MAN

B) LAN
A ________ network can contain servers as well as individual computers.
A)switchB)

client/server

C)

peer-to-peer

D)

distributed

B) client/server
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
A)stopB)

hit

C)

crash

D)

jam

D) jam
A ________ is a set of rules for how information and communication are exchanged.
A)protocolB)

packet

C)

frame

D)

token

A) protocol
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
A)busB)

router

C)

network

D)

bridge

C) network
Most home networks use ________ cable, which is most susceptible to interference.
A)fiber-opticB)

wi-fi

C)

unshielded twisted-pair

D)

coaxial

B) wi-fi
A ________ uses the Internet communications infrastructure to build a secure and private network.
A)HANB)

VPN

C)

PAN

D)

WAN

B) VPN
A ________ topology uses more than one topology when building a network.
A)fusionB)

hybrid

C)

crossover

D)

multiple-use

B) hybrid
In a ________ network, each node connected to the network communicates directly with every other node
A)bridgeB)

router

C)

client/server

D)

peer-to-peer

D) peer to peer

The capability of moving a completed programming solution easily from one type of computer to another is known as ________.

A)

portability

B)

transferability

C)

inheritance

D)

scalability

A) portability

Get instant access to
all materials

Become a Member