CS1 CH1 – Flashcards

Unlock all answers in this set

Unlock answers
question
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data
answer
true
question
Once you have an internet connection, you are ready to begin programming the web - that is, using a web browser to view web pages
answer
false
question
Application service providers supply the info that is available through the internet
answer
false
question
Online auctions allow you to check your account balances, make electronic payments, view your transaction history and more
answer
false
question
Lack of feedback is a disadvantage of web-based training and distance learning
answer
false
question
Possessed knowledge access systems use physical objects for identification purposes are frequently used to access facilities and computer systems
answer
false
question
Like a computer virus, a computer worm infects other computer files to replicate itself-
answer
false
question
Denial of service attacks are usually an insignificant cost in terms of business lost
answer
false
question
Anti-Spam programs are used to detect and remove any viruses or worms that find their way onto your computer
answer
false
question
In addition to the four primary computer operations, today's computers typically also perform _____ functions
answer
B. communications
question
_____ are unique numerical or text-based addresses used to identify resources accessible through the internet, such as computers, web pages and people
answer
D. Internet addresses
question
Similar to the way an IP address of domain name uniquely identifies a computer on the internet, a ____ uniquely identifies a web page
answer
C. URL - uniform resource locator
question
____ are companies that manage and distribute web-based software services to customers over the internet
answer
D. Application service providers
question
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a web site
answer
B. RSS
question
Increasingly, usb security keys, also called usb security ____ USB flash drives that are inserted into a computer to grant access to a network, to supply website usernames and passwords, or to provide other security features are being used
answer
D. tokens
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ______
answer
D. bot
question
Like a computer virus, a ____ is a malicious program designed to cause damage
answer
A. Computer worm
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network
answer
C. worm
question
One emerging type of trojan horse is called a _____ access trojan
answer
B. remote
question
A booming area of computer crime involves online fraud, theft, scams and related activities collectively referred to as ______
answer
D. dot cons
question
Phishing schemes may use a technique called ______, which is setting up spoofed websites with addresses slightly different from legitimate sites
answer
A. typosquatting
question
When a digitally signed doc is received, the recipient's computer used the sender's ____ key to verify the digital signature
answer
B. public
question
Checks all incoming and outgoing traffic and only allows authorized traffic to pass through
answer
B. firewall
question
Designed to find sensitive info about the user located on the PC and then send it to malware creator. This malware can't replicate itself
answer
A. trojan horse
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New