CS exam 1 – Flashcards

Unlock all answers in this set

Unlock answers
question
systems analysts design computer systems to be used within their companies.
answer
T
question
The external hardware components are located inside the main box or system unit of the computer.
answer
F
question
Despite efforts, the risk of prosecution, and the risk of accidentally downloading spyware, a computer virus, or a corrupted file when downloading a file from another person's PC, illegal file sharing continues.
answer
T
question
The Internet is by far one of the most popular and one of the fastest-growing parts of the Web.
answer
F
question
A computer does not always do whatever the instructions, or program, tell it to do.
answer
F
question
Computer literacy is the knowing about and understanding computers and their uses.
answer
T
question
A strategy that is sometimes used with keywords is the wildcard approach.
answer
T
question
The Fair and Accurate Credit Transactions Act enacted in Dec 2003 enables all Americans to get one credit report per year for a small fee.
answer
F
question
Unauthorized use involves using a computer resource for unauthorized activities.
answer
T
question
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
answer
T
question
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
answer
F
question
Many networks use a network server to manage the data flowing through the network devices and the resources on a network
answer
T
question
Lack of feedback is a disadvantage of Web-based training and distance learning.
answer
F
question
To identify a secure Web page, look for a URL that begins with https instead of http
answer
T
question
Direct Internet connections are much slower than dial-up connections.
answer
F
question
Wi-Fi security features work by default.
answer
F
question
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
answer
T
question
Application service providers (ASPs) supply the information that is available through the Internet.
answer
F
question
Biometric authentication uses information that an individual should know or can easily remember.
answer
F
question
A firewall is a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
answer
T
question
Online shopping and online investing are examples of: A. online merchandising B. online marketing C. e-commerce D. e-trade
answer
C
question
__are businesses or other organizations that provide Internet access to others, typically for a fee. A. application service providers B. conferencing service providers C. telephone service providers D. Internet service providers
answer
D
question
The term __ refers to the programs or instructions used to tell the computer hardware what to do. A. hardware B. port C. software D. adapter
answer
C
question
__is a generic term that refers to any type of malicious software. A. spamware B. malware C. spyware D. badware
answer
B
question
__is charged with such responsibilities as IP address allocation and domain name management. A. National Center for Supercomputing Applications B. web consortium (W3C) C. ICANN (internet corporation for assigned names and numbers) D. Internet society (ISOC)
answer
C
question
__lines are high-speed (about 1.5 Mbps) dedicated lines that schools and large businesses often lease from the telephone company or an Internet service provider to provide a fast, direct connection to the Internet for the PCs on their networks. a. T1 b. DSL c. ISDN d. Cable
answer
A
question
A personal computer or __ is a small computer system designed to be used by one person at a time. a. processor b. microcomputer c. microchip d. small processor
answer
B
question
__is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his internet connection. a. malware b. spyware c. phishing software d. adware
answer
B
question
computer crime is sometimes referred to as __ a. hacking b. cybercrime c. cyberstalking d. spoofing
answer
B
question
when data is processed into a meaningful form, it becomes a. information b. code c. a program d. a database
answer
A
question
__is the most widely used type of home broadband connection, with over 60% of the home broadband market. a. DSL Internet access b. fixed wireless internet access c. mobile wireless internet access d. cable internet access
answer
D
question
the most common input devices today are the keyboard and __ a. printer b. mouse c. speaker d. monitor
answer
B
question
today the standard term for placing telephone calls over any type of data network (including the internet, as well as a lan, wan, or other type of data network) is__ a. VoIP b. DSL c. ISDN d. BoF
answer
A
question
a booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as__ a. e-cons b. e-scams c. dot frauds d. dot cons
answer
D
question
the main communications media used as the __ are typically owned by telecommunications companies, such as telephone and cable companies. a. main internet b. world net c. internet backbone d. super net
answer
C
question
__are acts of malicious destruction to a computer or computer resource. a. phishing b. blocking attacks c. computer sabotage d. spoofing
answer
C
question
a growing number of college campuses have wireles___ on campus that allow students to use their PCs to connect wirelessly... a. hotspots b. hotpoints c. com spots d. com points
answer
A
question
__refers to the act of breaking into another computer system. a. spamming b. phishing c. hacking d. spoofing
answer
C
question
to contact people using the Internet, you most often use their__ a. domain names b. e-mail addresses c. usernames d. passwords
answer
B
question
similarly to the way an ip address or domain name uniquely identifies a computer on the internet, a __ uniquely identifies a web page. a. universal resource identifier b. web ID c. uniform resource locator d. web resource identifier
answer
C
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New