Computer Science. Exam 3: Michelangelo Computer Virus, server networks, program file – Flashcards

Unlock all answers in this set

Unlock answers
question
A peer-to-peer (P2P) network is an example of ________ administration. A) corporate B) central C) wide area D) local
answer
D. local
question
The most popular transmission media option for wired home Ethernet networks is ________ cable. A) coaxial B) fiber-optic C)unshielded twisted-pair (UTP) D) power-line
answer
C. unshielded twisted-pair (UTP)
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A) Routers and switches B) Firmware C) USB ports D) Firewalls
answer
A. Routers and switches
question
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. A. Windows 7 C. firewall D. firmware
answer
B. network operating system (NOS)
question
Wireless network devices use ________ to communicate with each other. A)satellitesB) fiber optics C) DSL D) radio waves
answer
D) radio waves
question
Data are sent through a network in bundles called ________. A. packages B. pouches C. packets D. switches
answer
C. packets
question
Which of the following is NOT a wired broadband Internet connection option? A)Dial-upB) DSL C) Fiber-optic D) Cable
answer
A) dial up
question
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
answer
B. enable SSID broadcast
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network
answer
A. MAC
question
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. A. MAN B. PAN C. LAN D. WAN
answer
A. MAN
question
For the nodes on a network to communicate with each other and access the network, each node needs a ________. A. DSL modem B. network adapter C. network interface card D. router
answer
B. network adapter
question
A ________ is a network located in your residence that connects to all your digital devices. A. MAN B. WAN C. HAN D. LANG
answer
C. HAN
question
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. A. node B. switch C. broadband D.network
answer
D. network
question
The fastest version of wireless Ethernet is ________. A) 802.11ab B) 802.11n C) 802.11g D) 802.11ac
answer
D) 802.11ac
question
To transfer data packets between two or more networks, a ________ is used A) firewall B) router C) switch D) hub
answer
B. router
question
Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking
answer
C. piggybacking
question
A(n) ________ device facilitates file sharing and data backup. A) NAS B) UTP C) NOS D) WAN
answer
A. NAS
question
A ________ is a device connected to a network such as a printer or a game console. A) packet B) NOS C) NIC D) node
answer
D. node
question
Normal telephone cable is a type of ________. A) fiber-optic cable B)coaxial cable C) twisted-pair cable D) Ethernet cable
answer
B. twisted pair
question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network A) Cat 6A B) Cat 5E C) Cat 7B D) Cat 6
answer
C) Cat 7B
question
A network that spans a large physical distance is called a ________. A)WANB) LAN C) MAN D) PAN
answer
C) WAN
question
On a network, a(n) ________ helps prevent data packets from colliding with each other. A)hubB) switch C) adapter D) router
answer
B. switch
question
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. A)BandwidthB) Benchmark C) Broadband D) Throughput
answer
D. throughput
question
Which of the following is NOT used to classify network architectures? A)Distance between nodesB) Communication medium C) Protocol used to exchange data D) Speed of the network
answer
D. speed of the network
question
Which of the following is NOT a type of cable used in wired networks? A)Unshielded coaxialB) Unshielded twisted-pair C) Fiber-optic D) Coaxial
answer
A) unshielded coaxial
question
All of the following are tasks for network administration of a large organization EXCEPT ________. A)monitoring network performanceB) purchasing initial equipment for the network C) installing new computers and devices on the network D) updating and installing new software on the network
answer
B) purchasing initial equipment for the network
question
A client/server network is an example of ________ administration A)remoteB) local C) central D) wide
answer
C) central
question
________ is the maximum speed at which data can be transferred between two nodes A)ThroughputB) Broadband C) Bandwidth D) Through speed
answer
C) Bandwith
question
Which transmission medium transmits data the fastest? A)Fiber-optic cableB) Twisted-pair cable C) Wireless D) Coaxial cable
answer
A) Fiber-optic cable
question
All of the following operating systems support P2P networking EXCEPT ________. A)LinuxB) Unix C) Windows D) OS X
answer
B) Unix
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A)denial of service (DoS)B) rootkit C) zombie D) logic bomb
answer
B) rootkit
question
Which of the following is NOT a virus category? A)macroB) logic bomb C) worm D) pharming
answer
D) pharming
question
Rules for creating passwords include all of the following EXCEPT ________. A)change your password frequentlyB) use letters, numbers and symbols in your passwords C) use a dictionary to find a lengthy word that is easy to remember D) keep your password a secret
answer
C) use a dictionary to find a lengthy word that is easy to remember
question
Adware and spyware are referred to collectively as ________. A)graywareB) firmware C) viruses D) alertware
answer
A) grayware
question
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A)firehouseB) fire extinguisher C) firebreak D) firewall
answer
D) firewall
question
CAPTCHA stands for ________. A)Complete Automated Public Turing Trial to Tell Computers and Humans ApartB) Completely Automated Public Turing Test to Tell Computers and Humans Apart C) Completely Amazing Public Turing Test to Tell Computers and Humans Apart D) Completely Automated Private Turing Trial to Tell Computers and Humans Apart
answer
B) Completely Automated Public Turing Test to Tell Computers and Humans Apart
question
Using your computer for non-work activities while you are being paid to work is known as ________. A)cyberlazingB) cyberbreaking C) cybersleeping D) cyberloafing
answer
D) cyberloafing
question
Which of the following statements about cookies is NOT true? A)Cookies are text files.B) Some companies sell the personal information found in cookies to other companies. C) Cookies help companies determine the traffic flow through their website. D) Cookies obtain your personal information by searching your hard drive.
answer
D) Cookies obtain your personal information by searching your hard drive.
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A)compression codeB) virus pattern C) encryption code D) virus signature
answer
D) virus signature
question
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. A)non-auction scamB) identity theft C) advance fee fraud D) theft of services
answer
D) theft of services
question
A ________ is a virus that is triggered on a certain date A)logic bombB) time bomb C) worm D) macro
answer
B) time bomb
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A)PretextingB) A DDoS attack C) A Trojan horse D) A polymorphic virus
answer
B) DDoS attack
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A)theftB) engineering C) pretexting D) pharming
answer
B) engineering
question
Creating and distributing ________ is one of the most widespread types of cybercrimes A)computer virusesB) spam C) cookies D) zombies
answer
A) computer viruses
question
With regard to computer protection, quarantining is defined as ________. A)placing a found virus in a secure area on the hard driveB) updating your antivirus software C) repairing an infected file D) deleting an infected file
answer
A) placing a found virus in a secure area on the hard drive
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A)antivirus softwareB) a packet sniffer C) a firewall D) a packet filter
answer
C) a firewall
question
FBI-related scams involve ________. A)running auctions that do not existB) convincing people to send money as a "good faith" gesture C) collecting funds and not delivering the goods D) people pretending to represent official organizations
answer
D) people pretending to represent official organizations
question
________ viruses are often transmitted by a flash drive left in a USB port. A)Time bombB) Logic bomb C) Macro D) Boot-sector
answer
D) Boot-sector
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A)Gray-hatB) Green-hat C) Black-hat D) White-hat
answer
D) White-hat
question
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________. A)steal your logons and passwords for various accountsB) use your debit card information to purchase items illegally C) assume your identity D) launch a denial of service (DoS) attack on your computer
answer
D) launch a denial of service (DoS) attack on your computer
question
Which of the following classifications of viruses can change its own code to avoid detection? A)StealthB) Multipartite C) Worm D)Polymorphic
answer
D) Polymorphic
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A)packet switchingB) logical port blocking C) static addressing D) packet filtering
answer
B) logical port blocking
question
Which of the following provides a visual representation of the patterns of an algorithm? A)PseudocodeB) Flow analysis C) Flowchart D) Gantt chart
answer
C) flowchart
question
The flowchart shape for a process is a(n) ________. A)rectangleB) parallelogram C) oval D) diamond
answer
D) diamond
question
________ is the process of translating a task into a series of commands that a computer will use to perform the task A)DebuggingB) Diagramming C) Analyzing D) Programming
answer
D) programming
question
________ is a combination of natural language and programming language that is used to document an algorithm. A) Diagramming B) Flowcharting C) Debugging D) Pseudocode
answer
D) Psuedocode
question
In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class. A) reusability B) inheritance C) regression D) scalability
answer
B) inheritance
question
Corona and Magmito can be used to develop ________. A) Web pages B) Mac software C) apps for smartphones D) complex web applications
answer
C) apps for smartphones
question
________ is the instructions programmers have written in a higher-level language. A) Compiled code B) Source code C) Executable code D) Base code
answer
B) Source code
question
Which language is the most popular language for writing Apple OS X applications? A)C++B) Objective C C) HTML D) Java
answer
B) objective c
question
________ is a powerful programming language that can be used to create a wide range of Windows applications. A) PHP B) HTML C) Visual Basic D) BASIC
answer
C) visual basic
question
What is the first step of the system development life cycle (SDLC)? A)Problem and opportunity identificationB) Development and documentation C) Analysis D) Design
answer
A) problem and opportunity identification
question
An integrated development environment (IDE) is a ________. A)program that helps interpret codeB) collection of tools that helps programmers write and test their programs C) program that translates code into binary 1s and 0s and ignores comments D) tool that converts one programming language into a different programming language
answer
B) collection of tools that helps programmers write and test their programs
question
The first-generation language is ________. A)machine languageB) assembly language C) COBOL D) BASIC
answer
A) machine language
question
Which of the following is the final stage of the program development life cycle (PDLC)? A)Making the planB) Debugging the code C) Testing and documentation D) Coding
answer
C) testing and documentation
question
A small Java-based program is called a ________. A)Java appletB) JSP C) JavaScript D) Java class
answer
A) java applet
question
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost. A) general availability (GA) B) gamma C) beta D) release to manufacturers (RTM)
answer
C) Beta
question
A loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________. A)testing planB) test condition C) operator D) class
answer
B) test condition
question
________ is the standard communications protocol used on most client/server networks. A)TCP/IPB) VPN C) Ethernet D) NOS
answer
C) Ethernet
question
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable A)HierarchicalB) Bus C) Cluster D) Star
answer
B) Bus
question
________ cable is NOT subject to electromagnetic interference or radio frequency interference. A)Fiber-opticB) Polycarbonate C) Twisted-pair D) Coaxial
answer
A) fiber-optic
question
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time. A)InfusionB) Data capacity C) Bandwidth D) Scalability
answer
C) bandwidth
question
A(n) ________ server is a server that stores and manages files for network users A)e-mailB) print C) database D) file
answer
D) file
question
A ________ sends data from one collision domain to another A)linkB) router C) switch D) bridge
answer
D) bridge
question
Ring networks use the ________ method to avoid data collisions A)passive-checkB) token C) packet screening D) active-check
answer
B) token
question
A(n) ________ address is the address that external entities use when communicating with your network. A)ALUB) WAP C) IP D) MAC
answer
C) IP
question
The physical address assigned each network adapter is called its ________. A)network physical address (NPA)B) media access control (MAC) C) network access control (NAC) D) physical address control (PAC)
answer
B) media access control (MAC)
question
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A)fileB) authentication C) application D) dedicated
answer
B) authentication
question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. A)Trojan horseB) worm C) spammer D) brute force attack
answer
B) worm
question
A print server uses a print ________ as a software holding area for jobs waiting to be printed. A)loggerB) spooler C) heap D) stack
answer
B) spooler
question
All of the following are ways that can infect your computer with a virus EXCEPT ________. A) downloading or running an e-mail attachment file B) sharing flash drives C) downloading video files from peer-to-peer sites D) installing a manufacturer's printer driver
answer
A) downloading or running an e-mail attachment file
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________. A)FBI and National White Collar Crime CenterB) FBI and local police departments C) FBI and National Defense Department D) National White Collar Crime Center and U.S. Department of Defense
answer
A) FBI and National White Collar Crime Center
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. A)phishingB) pharming C) polymorphing D) pretexting
answer
B) pharming
question
________ is a program that gathers information about your surfing habits without your knowledge. A)GhostwareB) Adware C) Shareware D) Spyware
answer
D) spyware
question
Which type of virus was the famous Michelangelo virus? A) time bomb B) An e-mail virus C) A worm D) A script virus
answer
A) time bomb
question
A ________ is a virus that is attached to documents such as Word or Excel files. A)Trojan horseB) script virus C) polymorphic virus D) macro virus
answer
D) macro virus
question
A(n) ________ takes advantage of file transport methods to spread on its own. A)encryption virusB) script virus C) macro virus D) worm
answer
D) worm
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A)Social networkingB) Hacking C) Phishing D) Cybercrime
answer
D) cybercrime
question
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. A)flowchartsB) operators C) pseudocode D) control structures
answer
D) control structures
question
The final step of the system development life cycle (SDLC) is ________. A)analysisB) maintenance and evaluation C) testing and installation D) design
answer
B) maintenance and evaluation
question
Which of the following would NOT be used to build websites with interactive capabilities? A)Java Server PagesB) PHP (hypertext preprocessor) C) Fortran D) Active Server Pages
answer
C) fortran
question
Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them. A)fieldsB) classes C) blocks D) units
answer
B) classes
question
________ enables users to define their own data-based tags and facilitates exchange of information between websites. A)PHPB) HTML C) XHTML D) XML
answer
D) XML
question
SQL is an example of a ________. A)2GLB) 3GL C) 4GL D) 5GL
answer
C) 4GL
question
Which statement does NOT describe fifth-generation languages? A)They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.B) Problems are presented as a series of facts or constraints rather than as a specific algorithm. C) The system of facts can be queried. D) They are the most "natural" of languages.
answer
A) They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
question
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network A)scanningB) viewing C) sniffing D) screening
answer
D) screening
question
A ________ keeps your computer safe by determining who is trying to access it. A)firewallB) switch C) gateway D) hub
answer
A) firewall
question
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. A)blockB) stopper C) terminator D) endcap
answer
C) terminator
question
Which of the following is NOT a common network topology? A)Linear busB) Ring C) Star D) Cluster
answer
D) cluster
question
For business networks, which of the following is NOT a main cable type? A)DuplexB) Coaxial C) Fiber-optic D) Twisted-pair
answer
A) Duplex
question
A ________ sends data between two networks. A)routerB) switch C) hub D) repeater
answer
A) router
question
Special symbols called tags are used in which of the following languages? A)HTML/XHTMLB) Java C) C++ D) C#
answer
A) HTML/XHTML
question
Translating an algorithm into a programming language is called ________. A)codingB) compiling C) executing D) interpreting
answer
A) coding
question
________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. A)Object-oriented analysisB) Top-down design C) Inheritance D) Bottom-up design
answer
B) top-down design
question
The process that converts program code into machine language is called A)documentationB) compilation C) variable declaration D) execution
answer
B) compilation
question
Which of the following is NOT a factor to consider when selecting network cabling? A)Maximum run lengthB) Interference C) Cable diameter D) Bandwidth
answer
C) cable diameter
question
Which of the following is the most commonly used client/server network topology? A)HierarchicalB) Star C) Ring D) Cluster
answer
B) Star
question
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall A)transitionalB) armored C) proxy D) bastion host
answer
D) bastion host
question
Division by zero is a ________ error that is caught when the program executes. A)logicalB) syntax C) runtime D) compiler
answer
C) runtime
question
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________. A)algorithmB) flowchart C) structure chart D) pseudocode
answer
A) algorithm
question
The computers in a lab on a floor of a building would be connected using a ________. A)WANB) LAN C) PAN D) MAN
answer
B) LAN
question
A ________ network can contain servers as well as individual computers. A)switchB) client/server C) peer-to-peer D) distributed
answer
B) client/server
question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. A)stopB) hit C) crash D) jam
answer
D) jam
question
A ________ is a set of rules for how information and communication are exchanged. A)protocolB) packet C) frame D) token
answer
A) protocol
question
A ________ is a group of two or more computers, or nodes, designed to share information and resources. A)busB) router C) network D) bridge
answer
C) network
question
Most home networks use ________ cable, which is most susceptible to interference. A)fiber-opticB) wi-fi C) unshielded twisted-pair D) coaxial
answer
B) wi-fi
question
A ________ uses the Internet communications infrastructure to build a secure and private network. A)HANB) VPN C) PAN D) WAN
answer
B) VPN
question
A ________ topology uses more than one topology when building a network. A)fusionB) hybrid C) crossover D) multiple-use
answer
B) hybrid
question
In a ________ network, each node connected to the network communicates directly with every other node A)bridgeB) router C) client/server D) peer-to-peer
answer
D) peer to peer
question
The capability of moving a completed programming solution easily from one type of computer to another is known as ________. A) portability B) transferability C) inheritance D) scalability
answer
A) portability
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New