Practice Test Three

Flashcard maker : Lily Taylor
Which of the following is NOT true about peer-to-peer networks?
In a P2P network, each device can share its resources with every other device, and there is no centralized authority.

P2P networks are only found in homes or small businesses.

Computers in a P2P network belong to a workgroup.

A P2P network uses the networking functions built into desktop or mobile operating systems, and therefore does not require a network operating system.

P2P networks are only found in homes or small businesses.
________ is the protocol that converts a domain name such as ebay.com to an IP address.
DNS
By using password-stealing software, ________capture what is typed on a keyboard, and phishing and pharming scams, criminals can easily obtain enough personal information to wreak havoc on an individual.
keyloggers
A(n) ________ account is used for making changes, installing software, configuring settings, and completing other tasks.
administrator
________ is when a social network user clicks a link and enables malware to post unwanted links on their page.
Clickjacking
A ________ is two or more computers that share resources.
computer network
Which of the following is NOT true about securing a network?

In a network, the network configuration determines what is shared and who is granted access to it.

In a home network, the hardware firewall is established by protocols.

A firewall prevents unauthorized access to a network.

In a network, the first layer of defense is the hardware at the access point to the network.

In a home network, the hardware firewall is established by protocols.
In a ________ network users log in to the network instead of their local computers and are granted access to resources based on that login.
Client-server
Server ________ is when multiple versions of server software runs on the same computer.
Virtualization
Members of a ________ automatically share their picture, music, and video libraries and their printers with each other without any additional configuration.
homegroup
________ hack into systems for malicious purposes, such as theft or vandalism.
Black-hats
A ________ blocks unauthorized access to a network.
firewall
To share resources with Macs, Linux, or older computers not running Windows 7 or 8, you must use a ________.
workgroup
The ________ enables multiple client devices to communicate with the server and each other, to share resources, to run applications, and to send messages.
network operating system
________ hackers are security experts that are paid to hack systems to find security holes for the purpose of preventing future hacking.
Gray-hat
A(n) ________ account is used for everyday computing.
standard
________ can be categorized as white-hat, gray-hat, or black-hat depending on their motivation.
Hackers
________ scans files on your computer to search for known viruses.
Antivirus software
Whenever you visit a site and click the Remember me or Keep me logged in button, the website puts ________ on your computer.
A cookie
A 3G or 4G cellular adapter built into a smartphone or notebook computer is an example of a(n) ________.
wireless adapter
A ________ is spyware that changes your home page and redirects you to other websites.
Browser hijacker
In a ________ topology, the nodes are all connected using a single cable.
Bus
________ redirects you to a phony website.
Pharming
Malicious ________ can use CPU cycles and Internet bandwidth and, as a result, can reduce your computer’s performance and slow down your browsing dramatically.
adware
A ________ attacks when certain conditions are met, such as when an employee’s name is being removed from a database.
logic bomb
Mass, unsolicited email messages is called ________.
Spamming
________ uses email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, or social network.
Phishing
________ define the rules for communication between devices.
Protocols
________ is a form of malware that secretly gathers personal information about you.
Spyware
A ________ is a network that has all connected devices located in the same physical location.
LAN
T/F: In a client-server network, users log in to the network instead of their local computers and are granted access to resources based on that login.
True
T/F: A browser hijacker is spyware that changes your home page and redirects you to other websites.
False
T/F: Network hardware is what enables devices to connect to each other, but the domain controller enables them to communicate.
False
T/F: Routers make up the backbone of the Internet and are responsible for sending the data packets along the correct route to their destination.
True
T/F: The U.S. Cyber Command reported that the Pentagon systems are attacked 500,000 times an hour.
False
T/F: Your personal information, such as credit card numbers, is stored in a cookie.
False
T/F: A wireless LAN has a very limited range of only about 10 to 100 meters, roughly 30 to 300 feet.
False
T/F: A home LAN uses the same network standards and equipment as those used in larger business networks.
False
T/F: Servers range from very small to massive enterprise-level systems that serve hundreds of thousands of clients.
False
T/F: Cellular networks use encryption to ensure the data is secure as it travels through the public network.
False
T/F: A firewall blocks unauthorized access to a network.
True
T/F: A Trojan horse is a program that appears to be a legitimate program but is actually malicious.
True
T/F: Computers running Windows 7 or later can belong to a workgroup.
True
T/F: Each device that connects to a network must have some type of network adapter.
True
T/F: Sending mass, unsolicited email messages is called spamming.
True
T/F: Identity theft occurs when someone uses your name, Social Security number, or bank or credit card number fraudulently.
True
T/F: Devices on a LAN are connected by using nodes.
False
T/F: WiFi networks found in homes and public hotspots use the IEEE 201.88 standards.
False
T/F: Computer networks save both time and money and make it easier to work, which increases productivity.
True
T/F: Phishing redirects you to a phony website.
False
________ is the delivery of applications over the Internet.
Saas
A ________ is a 256-color graphic file format that uses lossless compression and is best for simple images with large areas of solid color.
GIF
________ means that the source code is published and made available to the public, enabling anyone to copy, modify, and redistribute it without paying fees.
Open source
You should always read the ________, which is the contract between the software user and the software publisher.
site license
A ________ license grants a license to use one or more copies of the software, but ownership of those copies remains with the software publisher.
proprietary software
________ refers to applications and services that are accessed over the Internet.
Cloud computing
All of the following are standard features of word processors EXCEPT ________.

JPG

TIF

BMP

GIF

BMP
The most commonly used productivity software used in business is a(n) ________.
office application suite
________ help you work more efficiently and effectively on both personal and business-related documents.
Productivity programs
All of the following are one of the four basic models for software distribution EXCEPT ________.

charityware

shareware

freeware

retail software

Charityware
Microsoft Office, Adobe Photoshop, and TurboTax are all types of ________.
retail software
A ________ license allows multiple installations of software using the same product key.
Per-set
________ dimensional spreadsheets can have multiple worksheets that are linked together.
Three-
A ________ is a graphic format that can store up to 16.7 million colors.
JPG
Personal ________ software can be used to keep track of your bank accounts, monitor investments, create and stick to a budget, and file income taxes.
Finance
A ________ is a single point on a display screen.
Pixel
Which of the following is NOT true about determining system requirements?

System requirements pertain to the minimum hardware and software specifications required to run a software application.

For most software you buy in a store, you will need a DVD drive to perform the installation.

You can verify that you have enough free space in Windows 8 by opening Internet Explorer.

On a Windows computer, one of the easiest ways to obtain the system information you need is to open the System Control Panel window.

You can verify that you have enough free space in Windows 8 by opening Internet Explorer.
Microsoft PowerPoint and Keynote are examples of ________.
presentation applications
Microsoft SharePoint, KnowledgeTree, and Alfresco are examples of ________.
document management systems
________ formats rely on compression, low frame rates, and small image size to deliver your video over the Internet.
Streaming video
________ is the Adobe application that creates an environment in which you develop webpages visually or directly in code.
Dreamweaver
Which of the following is NOT true about video game applications? (1 point)
The average age of a video game player is 32 to 35 years old, 20 percent are over 50, and about 40 percent are female.

Video game sales, which includes mobile apps, games for video game systems, and computer games, reached $16.6 billion in the United States in 2011.

Games and simulations are no more than just first-person actors in which you play the game from the perspective of the game character.

Game software typically requires a lot of processing, memory, and video power to run well.

Games and simulations are no more than just first-person actors in which you play the game from the perspective of the game character.
A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features.
Service pack
A ________ enables you to create electronic worksheets composed of rows and columns.
Spreadsheet application
________ means that an organization uses servers in the cloud instead of purchasing and maintaining the servers on site.
Iaas
The default file type used by Apple’s iTunes software is ________.
AAC
A(n) ________ file is about one-tenth the size of a CD file.
MP3
Which of the following is NOT true about spreadsheets? (1 point)
In a spreadsheet, the intersection of a row and a column is called a cell.

By using a spreadsheet application, you can create tables to represent data visually.

Spreadsheets are quite useful for managing business expenses, payroll, and billing.

Spreadsheets organize data so that it can be sorted, filtered, and rearranged, making them useful for things that do not involve calculations at all.

By using a spreadsheet application, you can create tables to represent data visually.
When software publishers release updates, these updates can address security holes or ________.
bugs
A ________ is an application with which you can create, edit, and format text documents.
word processor
T/F: The process of software installation may require you to enter guest credentials.
False
T/F: Machinima is a creative use of streaming video.
False
T/F: The most popular general-purpose applications are productivity programs, which help you work more efficiently and effectively on both personal and business-related documents.
True
T/F: A database is an organized collection of facts about people, events, things, or ideas related to a specific topic or purpose.
True
T/F: The Portable Apps platform is closed source, however the apps are free.
False
T/F: Mobile apps that extend the functionality of mobile devices should be downloaded only from trusted sources.
True
T/F: Page description languages describe image elements as geometric objects, such as lines and arcs, and consist of commands given by the program and carried out by the printer to re-create the computer image precisely on a printed page.
True
T/F: QuickTime is a video file format developed by Microsoft Corporation.
False
T/F: Finance software enables you to complete your income tax returns yourself on your computer or online.
False
T/F: When you see a movie at a theater, you are actually looking at still images shown at a frame rate that is high enough to trick the eye into seeing continuous motion.
True
T/F: The most commonly used accounting software used in business is an office application suite, such as Microsoft Office.
False
T/F: A budget spreadsheet that has a worksheet for each quarter and an annual summary worksheet is an example of a quasi-dimensional spreadsheet.
False
T/F: Cloud computing is another term for the Internet.
False
T/F: DRM is a technology applied to digital media files such as music, ebooks, and videos to impose restrictions on the use of these files.
True
T/F: Before you purchase new software you should first document your system so that you can compare it to the system requirements.
True
T/F: Open source means that the source code is published and made available to the public, enabling anyone to copy, modify, and redistribute it without paying fees.
True
T/F: Video game sales, which include mobile apps, games for video game systems, and computer games, reached $16.6 billion in the United States in 2011.
True
T/F: Codecs are compression algorithms that reduce the size of digital media files.
True
T/F: A commonly used SaaS service is off-site backup services.
False
T/F: A bug is a flaw in a program.
True

Get instant access to
all materials

Become a Member