Understanding Computer chapter 1, 8, 9

Unlock all answers in this set

Unlock answers
question
A(n) ____ is a collection of an individual's work accessible through a Web site.
answer
e-portfolio
question
The ____ is the most commonly used Internet search type.
answer
keyword search
question
Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.
answer
RSS
question
RSS (Rich Site Summary) is a format for delivering regularly changing web content. Many news-related sites, weblogs and other online publishers syndicate their content as an RSS Feed to whoever wants it.
answer
What is RSS?
question
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
answer
search engine
question
limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.
answer
Field searches
question
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.
answer
Address bar
question
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.
answer
search sites
question
Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?
answer
XHTML
question
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories
answer
Snopes
question
____ refers to guidelines for online behavior
answer
Netiquette
question
Ultraportables conforming to Intel's standards can be marketed as ____.
answer
Ultrabooks
question
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other
answer
computer network
question
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
answer
smart appliances
question
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
answer
software
question
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand
answer
two and a half years
question
Common input devices include the keyboard and ____.
answer
mouse
question
____ occurs when data is entered into the computer
answer
Input
question
Two of the most common types of communications hardware are ____ and network adapters.
answer
modems
question
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people
answer
Internet addresses
question
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.
answer
mobile device
question
Hybrid notebook-tablet computers are also called ____.
answer
convertible tablets
question
____ refers to typing your entire e-mail message or discussion group post using only capital letters
answer
Shouting
question
A(n) ____ is a medium-sized computer used to host programs and data for a small network
answer
midrange server
question
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time
answer
microcomputer
question
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.
answer
third-generation computers
question
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page
answer
uniform resource locator (URL)
question
When data is processed into a meaningful form, it becomes ____.
answer
information
question
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.
answer
wikis
question
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
answer
VOD
question
____ is the most widely used type of home broadband connection, with over half of the home broadband market.
answer
Cable Internet access
question
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom
answer
Privacy
question
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
answer
Online portfolio
question
Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is ____.
answer
VOIP
question
Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.
answer
blog
question
____ sites allow you to generate map and driving directions and provide access to specific types of useful information
answer
Reference
question
Online shopping and online investing are examples of ____.
answer
e-commerce
question
____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.
answer
BoF
question
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.
answer
RSS
question
____ refers to any instruction delivered via the Web
answer
Web-based training (WBT)
question
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences.
answer
cookies
question
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
answer
Internet service providers (ISPs)
question
____ are companies that manage and distribute Web-based software services to customers over the Internet.
answer
Application service providers (ASPs)
question
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects
answer
message boards
question
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.
answer
author
question
____ is charged with such responsibilities as IP address allocation and domain name management
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company
answer
Third-party
question
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
answer
ARPANET
question
One advantage of a dial-up connection is ____.
answer
security
question
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box
answer
Internet Options
question
Conventional dial-up connects to the Internet at a maximum of ____.
answer
56 Kbps
question
Direct Internet connections are typically ____ connections
answer
broadband
question
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies
answer
Internet backbone
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites
answer
typosquatting
question
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications
answer
USA Patriot Act
question
Like a computer virus, a ____ is a malicious program designed to cause damage.
answer
computer worm
question
software can control which devices can be connected to an employee's computer
answer
Data-leakage prevention
question
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____
answer
dot cons
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
bot
question
Repeated threats or other harassment carried out online between adults is referred to as ____.
answer
cyberstalking
question
The best protection against many dot cons is ____.
answer
common sense
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
answer
worm
question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer
war driving
question
The term ____ refers to accessing someone else's unsecured WiFi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
answer
Wi-Fi piggybacking
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
answer
public
question
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
answer
IPS
question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network
answer
virtual private network
question
____ is a generic term that refers to any type of malicious software.
answer
Malware
question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
answer
Pharming
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
threat definitions
question
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.
answer
EV
question
The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.
answer
virus
question
Some Webbased encrypted email systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system
answer
HushMail
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual
answer
Passwords
question
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
answer
codes of conduct
question
A ____ is a malicious program that masquerades as something else—usually as some type of application program
answer
Trojan horse
question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name
answer
Identity theft
question
One emerging type of Trojan horse is called a ____-Access Trojan.
answer
Remote
question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
answer
virus
question
____ includes any acts of malicious destruction to a computer or computer resource
answer
Computer sabotage
question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
answer
firewall
question
____ uses a single secret key to both encrypt and decrypt the file or message.
answer
Private key encryption
question
____ identify users by a particular unique biological characteristic
answer
Biometric access systems
question
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through
answer
firewall
question
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies
answer
Homeland Security Act of 2002
question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems
answer
Possessed object
question
____ refers to the act of breaking into a computer or network.
answer
Hacking
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New