CSIT 101 Set 2 – Flashcards
112 test answers
Unlock all answers in this set
Unlock answers 112question
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years.
answer
analyze large amounts of data
Unlock the answer
question
A common form of authentication is a ____.
answer
password
Unlock the answer
question
A company called ____ provides digital certifications for web transactions.
answer
VeriSign
Unlock the answer
question
A company may hire a ____ hacker to learn about vulnerabilities in its system.
answer
white-hat
Unlock the answer
question
A concern over heavy use of ____ is that it may desensitize the individual to the reality of the real world.
answer
violent, interactive simulated games
Unlock the answer
question
A game console relies on a fast _____ to handle the lively animations in a video game.
answer
microprocessor
Unlock the answer
question
A popular encryption method used to protect data that travels over a wireless network is ____.
answer
WPA
Unlock the answer
question
A popular term used to identify devices such as the iPad is _____.
answer
tablet PC
Unlock the answer
question
A printer requires a ____ installed on the computer in order to operate.
answer
device driver
Unlock the answer
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web.
answer
SSL
Unlock the answer
question
A(n) ____ lifestyle involves ridding oneself of all concerns about privacy.
answer
transparent
Unlock the answer
question
A(n) ____ view of data is the way a user thinks about data.
answer
logical
Unlock the answer
question
AI applications are ways in which AI methodologies are applied to ____ and provide services.
answer
solve problems
Unlock the answer
question
All of the following are examples of malware EXCEPT ____.
answer
updates
Unlock the answer
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
Unlock the answer
question
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
answer
libel
Unlock the answer
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
phishing
Unlock the answer
question
An icon on your desktop is a component of a ____ interface.
answer
graphical user
Unlock the answer
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
Unlock the answer
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
Unlock the answer
question
An industrial operating system works with a large computer system requiring a(n) ____.
answer
server
Unlock the answer
question
An item such as a smart card is an example of the ____ form of authentication.
answer
something you have
Unlock the answer
question
An online B2B transaction uses a(n) _____ network to exchange information on the web.
answer
EDI
Unlock the answer
question
Carpal tunnel syndrome can cause ____.
answer
a numb sensation in the wrists and hands
Unlock the answer
question
Cloud computing is not possible without _____.
answer
an Internet connection
Unlock the answer
question
Compulsive online gambling and pornography are examples of ____.
answer
computer addiction
Unlock the answer
question
Controlling the amount of ____ we receive in our email Inbox is one way to control information overload.
answer
spam
Unlock the answer
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
Unlock the answer
question
Each person's digital shadow is ____.
answer
the digital information generated about a person by organizations
Unlock the answer
question
Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications.
answer
servers
Unlock the answer
question
Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible.
answer
networks
Unlock the answer
question
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
answer
special-purpose
Unlock the answer
question
Embedded systems can be found in all of the following EXCEPT _____.
answer
cloud computers
Unlock the answer
question
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
answer
web empowerment
Unlock the answer
question
Full transparency is a scenario in which surveillance and information are ____.
answer
easily available to every law-abiding member of a society
Unlock the answer
question
Geographical technology advances to cell phones such as user location and _____ software have improved augmented reality.
answer
directional
Unlock the answer
question
Google Wallet software utilizes smart phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items.
answer
RFID
Unlock the answer
question
IT Access for Everyone is an initiative for increasing access to digital technology for ____.
answer
developing nations
Unlock the answer
question
If a behavior is considered ethical, this most likely suggests it is ____.
answer
morally right
Unlock the answer
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
Unlock the answer
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
answer
social engineering
Unlock the answer
question
In general, governmental computer ethics involves two main types of responsibilities: ____ and ____.
answer
protection, empowerment
Unlock the answer
question
In the United States, the ____ oversees the handling of Internet traffic.
answer
FCC
Unlock the answer
question
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____.
answer
Privacy Act of 1974
Unlock the answer
question
In the past 10 years, the digital divide in the United States has ____.
answer
shrunk
Unlock the answer
question
Interactive media are most prominent in the _____ industry.
answer
entertainment
Unlock the answer
question
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
answer
open-source
Unlock the answer
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
answer
high-precision
Unlock the answer
question
Net Nanny is an example of ____.
answer
content-filtering software
Unlock the answer
question
Of the following, ____ contains the most information about citizens of the United States.
answer
LexisNexis
Unlock the answer
question
Of the following, ____ is considered the most invasive.
answer
network behavioral targeting
Unlock the answer
question
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings.
answer
recognize
Unlock the answer
question
One of the biggest roadblocks to ecash and ewallet technologies is _____.
answer
fear
Unlock the answer
question
One thing to consider when choosing a mobile device is _____.
answer
battery life
Unlock the answer
question
One use for a(n) ____ is to search a database for information pertaining to a specific query.
answer
intelligent agent
Unlock the answer
question
Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet.
answer
hacktivists
Unlock the answer
question
Performing a system ____ utility rearranges your files on disk in an orderly fashion, resulting in faster access.
answer
defragmentation
Unlock the answer
question
Personal computer ethics involves ____.
answer
all of the above
Unlock the answer
question
Personal ethics deals with ____. (Choose the best answer.)
answer
the choices and behaviors made by individuals
Unlock the answer
question
Programs such as ____ support energy conservation for electronic devices.
answer
ENERGY STAR
Unlock the answer
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phising
Unlock the answer
question
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
answer
disasters
Unlock the answer
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
answer
an intelligent agent
Unlock the answer
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
Unlock the answer
question
Some netiquette rules to consider when using social media include all of the following EXCEPT ____.
answer
freely tag friends in your photos
Unlock the answer
question
Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____.
answer
typing
Unlock the answer
question
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
answer
pattern
Unlock the answer
question
Studying the way people use the web—what sites they visit, what products they buy, etc.—is an example of ____.
answer
one-to-one marketing
Unlock the answer
question
The Children's Online Privacy Protection Act prohibits businesses from collecting data on children under the age of ____.
answer
13
Unlock the answer
question
The FCC ordered ____ to stop throttling BitTorrent Internet traffic.
answer
Comcast
Unlock the answer
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
answer
US-CERT
Unlock the answer
question
The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.
answer
desktop
Unlock the answer
question
The _____ was one of the first game controllers to use a player's motions and gestures as input.
answer
Wii
Unlock the answer
question
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
answer
accessibility
Unlock the answer
question
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
answer
censorship
Unlock the answer
question
The first known flash mob happened ____.
answer
at Macy's in New York City
Unlock the answer
question
The idea of digital etiquette came into being ____.
answer
with the advent of chat rooms and electronic mail
Unlock the answer
question
The introduction of _____ on cell phones was the first step toward realizing augmented reality.
answer
geographic positioning systems
Unlock the answer
question
The law that requires telecommunications manufacturers and service providers to make their products and services accessible to people with disabilities, if readily achievable, is ____.
answer
the U.S. Telecommunications Act of 1996
Unlock the answer
question
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries.
answer
satellite imagery
Unlock the answer
question
Through the use of ____, one physical server can run several server operating systems.
answer
virtual servers
Unlock the answer
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
Unlock the answer
question
Twitter is a ____ site.
answer
microblogging
Unlock the answer
question
Typical _____ computing providers deliver common software online that is accessed from another web service or browser.
answer
cloud
Unlock the answer
question
Users can interact in a virtual reality environment through the use of _____.
answer
avatars
Unlock the answer
question
Users multiple computers, such as a desktop, notebook, and smartphone are well acquainted with the process of _____ files.
answer
synchronizing
Unlock the answer
question
When a smart phone goes into ____ mode, pressing a button immediately turns it back on.
answer
sleep
Unlock the answer
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
answer
network usage policy
Unlock the answer
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
Unlock the answer
question
When you combine a system's hardware configuration and operating system, it is sometimes called the computer's ____.
answer
platform
Unlock the answer
question
Which is not part of the boot process?
answer
Load application software into memory
Unlock the answer
question
Which of the following is an example of a repetitive stress injury?
answer
carpal tunnel syndrome
Unlock the answer
question
Which of the following is another name for ecash?
answer
emoney
Unlock the answer
question
Which of the following is one realistic way to promote Internet security?
answer
Select strong passwords and change them regularly.
Unlock the answer
question
Why are LEDs used in green computing?
answer
They reduce the energy used in displays.
Unlock the answer
question
Windows cleaners maintain the ____ for more effective system operation.
answer
registry
Unlock the answer
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
Unlock the answer
question
____ can tell more about a person than all other kinds of electronic surveillance.
answer
Data mining
Unlock the answer
question
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
answer
Ubiquitous
Unlock the answer
question
____ computing refers to the ability to access information at any time and in any place.
answer
Pervasive
Unlock the answer
question
____ is a form of traffic shaping.
answer
Throttling
Unlock the answer
question
____ is an example of following good ergonomic practices.
answer
Adjusting the angle of a keyboard for comfort
Unlock the answer
question
____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.
answer
Mobile
Unlock the answer
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
Unlock the answer
question
____ supports network neutrality.
answer
Google
Unlock the answer
question
_____ make up a large portion of the interactive media market.
answer
Video games
Unlock the answer
question
_____ media refers to digital media that involve user interaction for education, training, or entertainment.
answer
Interactive
Unlock the answer
question
_____ virtual reality refers to a user experience where you may feel like you are actually part of the experience generated by the computer.
answer
Immersive
Unlock the answer