Eight bits grouped together are collectively referred to as a ____. a). Kilobit |
b). byte |
The numbering system we commonly use is called the decimal numbering system because it uses ____ symbols to represent all possible numbers. a). 2 |
c). 10 |
A ____ is the smallest unit of data that a binary computer can recognize. a). byte |
d). bit |
A ____ is equal to 1,024 bytes. a). kilobyte (KB) |
a). Kilobyte |
Each place value in a binary number represents ____ taken to the appropriate a). 0 |
c). 2 |
With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality. a). pixel |
a). Pixel |
In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to store the color data for each pixel in the image. a). mega color |
b). True color |
Like graphics data, ____—such as a song or the sound of someone speaking— must be in digital form in order to be stored on a storage medium or processed by a PC. a). pixel data |
c). Audio data |
Video data—such as home movies, feature films, and television shows—is displayed using a collection of ____. a). slides |
d). Frames |
A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations. a). COBOL language |
d). Machine language |
11. ____ are very small pieces of silicon or other semiconducting material onto which integrated circuits are embedded. a). Pixels |
c). Chips |
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz). a). system speed |
b). CPU clock speed |
A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one time. a). word |
a). word |
A ____ is an electronic path over which data can travel. a). bus |
a). bus |
The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time. a). clock speed |
b). throughput |
The term ____ refers to chip-based storage used by the computer. a). storage media |
b). memory |
An emerging type of RAM is magnetic (or more precisely, ____) (MRAM). a). magnetoselective |
c). magnetoresistive |
____ are small components typically made out of aluminum with fins that help to dissipate heat. a). ACs |
d). heat sinks |
____ consists of nonvolatile memory chips that can be used for storage by the user. a). RAM |
d). Flash memory |
____ have begun to replace ROM for storing system information, such as a PC’s a). Motherboards |
d). Flash memory chips |
The ____ enables up to 127 devices to be connected to a computer’s PCI bus through a single port on the computer’s system unit. a). HyperTransport bus |
b). USB standard |
Most network cards contain a port that accepts a(n) ____, which looks similar to connector but is larger. a). RJ-11 connector |
d). RJ-45 connector |
A USB ____ is a device that plugs into your PC’s USB port to convert one port USB ports. a). hub |
a). hub |
Most computers today support the ____ standard, in which the computer automatically configures new devices as soon as they are installed and the PC is powered up. a). Plug and Play |
a). Plug and Play |
The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip. a). processor |
b). transistor |
The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand. a). register |
b). decode unit |
The ____ is the section of the CPU that performs arithmetic involving integers and logical operations. a). FPU |
d). ALU |
The ____ orders data and instructions from cache or RAM based on the task at hand. a). ALU |
b). prefetch unit |
The ____ tries to predict what data and instructions will be needed and retrieves of time, in order to help avoid delays in processing. a). control unit |
d). prefetch unit |
Instructions and data flow in and out of the CPU via the ____. a). control unit |
d). bus interface unit |
In order to synchronize all of a computer’s operations, a ____—a quartz crystal located on the motherboard—is used. a). cycle chip |
c). system clock |
Some ____ must be added in pairs. a). interfaces |
b). memory modules |
Today’s CPUs are formed using a process called ____ that imprints patterns on semiconductor materials. a). vectoring |
b). lithography |
One nanometer (nm) is ____ of a meter. a). one-billionth |
a). one-billionth |
Terascale computing is the ability of computers to process one ____ floating-point operations per second (teraflops). a). million |
c). trillion |
To connect her external hard drive where her music files are stored to the computer, Jess needs to use the ____ port. a). serial |
b). USB |
Jess has a music keyboard that she uses to compose music that will be stored electronically. To connect the keyboard to the computer, she would use the ____ port. a). SCSI |
d). MIDI |
Jack has many large files such as digital photos and movies stored on his computer. Since he only occasionally uses these files, he should consider moving them to a removable storage medium, such as a CD disc, DVD disc, or ____. a). RAM memory module |
c).USB flash drive |
Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin. a). Windows Registry |
d). Windows Disk Cleanup |
Since Jack has a Windows system, he can right-click a hard drive icon in Windows Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors. a). Check Now |
a). Check Now |
Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make sure that his operating system has CD-____ capabilities. a). mirroring |
b). burning |
Conventional CD discs use ____ lasers. a). red |
b). infrared |
Most computer tapes today are in the form of ____ tapes, as shown in the accompanying figure a).floppy |
d). cartridge |
Media that allow random access are sometimes referred to as ____ media. a).optical |
c).addressable |
Usually the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____). a).procurable |
c).removable |
The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called the ____. a).initial time |
d). seek time |
Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. A friend of Dan suggested to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port. a).ScanDisk |
d).fireWire |
A ____, as shown in the accompanying figure, consists of a vertical stack of tracks, with the same relative track on each disk surface a).sector |
c).cylinder |
Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.
a).label |
d).file |
One type of storage device that is sometimes used with computers and that uses sequential access is a ____. a).hard drive |
d).magnetic tape drive |
____ devices are high-performance storage servers that are individually connected to a network to provide storage for the computers connected to that network.
a).Network attached storage (NAS) |
a).Network attached storage (NAS) |
A ____ is a place to store something temporarily.
a).sector |
b).cache |
Regardless of how storage devices are connected to a computer, ____ and/or names are typically assigned to each storage device. a).letters of the alphabet |
a).letters of the alphabet |
Each hard disk is divided into pie-shaped groups of ____.
a).tracks |
d).sectors |
To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium. a).indexes |
c).folders |
A ____ is the hardware where data is actually stored. a).storage device |
d).storage medium |
____ means that data can be retrieved directly from any location on the storage medium, in any order. a).Indirect access |
b).Random access |
____ provide(s) a method of storing data on two or more hard drives that work in combination to do the job of a larger drive. a).Storage Area Networks (SANs) |
b).RAID (redundant arrays of independent disks) |
A storage medium is inserted into the appropriate ____ to be read from or written to. a).storage processor |
d).storage device |
Some drive letters, such as the letter ____ typically used with the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to a computer. a).A |
c).C |
____ keys on a keyboard are used for issuing commands in some programs. a). Alphanumeric |
d). Function |
A ____ is designed to scan flat objects one page at a time. a).sheetfed scanner |
c). flatbed scanner |
____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth. a). Optical character recognition (OCR) Devices |
b). Optical mark readers (OMRs) |
The accompanying figure shows a portable ____ reader. a). barcode |
a). barcode |
Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, typically measured in the number of dots per inch (dpi), for the business needs of the office. a). magnetic resolution |
c). optical resolution |
Digital still cameras most often use ____ cards for storage. a). flash memory |
a). flash memory |
A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen. a). graphics table |
b). graphics tablet |
With a ____, the user touches the screen with his or her finger to select commands or otherwise provide input to the computer with which it is being used. a). touch screen |
a). touch screen |
Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game. a). touch screen |
c). speaker |
The display device for a desktop computer is formally called a ____. a). touch screen |
d). monitor |
____ uses a combination of multi-touch input from multiple users and object recognition to interact with computers that are typically built into tabletops and other surfaces. a). Tactile feedback |
b). Surface computing |
____ are used to input data about a person into a computer system so that the individual can be identified based on a particular unique physiological characteristic. a). Biometric readers |
a). Biometric readers |
In a printer, the number of ____ affects the quality of printed output. a). characters per inch (cpi) |
b). dots per inch (dpi) |
Some data projectors include an iPod ____ to connect a video iPod in order to project videos stored on that device. a). port |
b). dock |
A(n) ____ keyboard folds or rolls up and connects to a device via a wired or wireless connection when needed. a). slide-out |
b). portable |
One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares. a). ISBN |
b). QR |
The number of bits used to store color information about each pixel is called ____. a). bit depth |
a). bit depth |
A ____ rests on the desk or other flat surface close to the user’s computer and is moved across the surface with the user’s hand in the appropriate direction to point to and select objects on the screen. a). touch screen |
d). mouse |
A ____ is an optical code that represents data with bars of varying widths or heights. a). digital code |
d). barcode |
____ are the most common type of flat-panel technology used for small- to medium-sized computer monitors. a). Gas plasmas |
d). LCDs |
____ is the proprietary operating system for computers made by Apple Corporation. a). Linux |
c). Mac OS |
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system’s manufacturer on a regular basis. a). security walls |
c). security patches |
Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy. a). mirror |
b). backup |
The most recent version of Windows is Windows ____.
a). Leopard |
c). 7 |
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
a). disk defragmentation |
a). disk defragmentation |
In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____. a). embedded operating systems |
a). embedded operating systems |
____ memory allows you to use more memory than is physically available on your computer. a). Shared |
b). Virtual |
A computer’s ____ is a collection of programs that manage and coordinate the activities taking place within a computer system. a). database system |
d). operating system |
____ is the most widely used mobile operating system worldwide. a). Mac OS |
d). Symbian OS |
In DOS, the command ____ displays the files and folders in the current location. a). CD |
c). DIR |
____ is a Linux-based operating system developed by the Open Handset Alliance. a). Android |
a). Android |
The means by which an operating system or any other program interacts with the user is called the ____. a). user login |
d). user interface |
Filenames typically include a ____ at the end of the filename. a). file extension |
a). file extension |
A ____ is a software program that is designed to cause damage to the computer system or perform some other malicious act. a). firewall |
d). computer virus |
All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used. a). pies |
c). pages |
Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet has an Apple computer at home. The operating system of that computer is ____. a). Windows Vista |
d). Mac OS |
____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer. a). Background |
d). System |
System software is usually divided into two categories: operating system software and ____ programs. a). planning system |
b). utility |
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers. a). Linux |
b). UNIX |
Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Another thing that Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to protect against data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this. a). cleanup |
d). backup |
Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility. a). delete |
b). uninstall |
In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____. a). embedded operating systems |
a). embedded operating systems |
With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are selected with the mouse to issue commands to the PC. a). graphical user interface |
a). graphical user interface |
One of the most obvious initial changes in Windows Vista is the ____ interface. a). Leopard |
c). Aero |
____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter. a). System software |
c). Application software |
Commercial Linux distributions, such as those available from ____ and Novell, come with maintenance and support materials. a). Red Hat |
a). Red Hat |
The ____ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
a). startup |
b). operating system |
During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
a). Mac OS |
b). DOS (Disk Operating System) |
Filenames typically include a ____ at the end of the filename. a). file extension |
a). file extension |
The most recent version of Windows is Windows ____. a). Leopard |
c). 7 |
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system’s manufacturer on a regular basis. a). security walls |
c). security patches |
There are four basic categories of software: commercial software, shareware, freeware, and ____.
a). publish software |
b). public domain software |
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.
a). Format |
b). Insert |
The most common type of database used on PCs today is a(n) ____. a). relational database |
a). relational database |
When typing text in a word processing program, you should only press ____ after a short line (like a title), at the end of a paragraph, and to leave a blank line between paragraphs.
a). Enter |
a). Enter |
A single spreadsheet document is often called a ____.
a). cell |
d). worksheet |
____ is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client.
a). Computer-aided design (CAD) |
c). Project management software |
When selecting font size in a document, ____ points equals one-inch-tall text. a). 36 |
d). 72 |
Related software programs are sometimes sold bundled together as a ____, such as a group of graphics programs, utility programs, or office-related software.
a). software suite |
a). software suite |
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. The supervisor explains that each employee’s information forms a separate ____.
a). field |
b). record |
When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to use the software. a). software license |
a). software license |
Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached. a). word wrap |
a). word wrap |
____ programs are software programs that are distributed on the honor system.
a). Commercial |
c). Shareware |
____ is freeware software.
a). Norton AntiVirus (antivirus program) |
c). Internet Explorer (Web browser) |
A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants. a). document |
c). spreadsheet |
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan’s supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
a). query |
a). query |
____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.
a). DVD authoring |
a). DVD authoring |
In a worksheet, the intersection of a row and a column is called a ____.
a). pointer |
d). cell |
When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software. Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on her computer, she needs a photo ____ program.
a). dramatization |
d). editing |
When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software. Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____, which is available as a free download via the Internet.
a). Microsoft Office |
b. OpenOffice.org |
Most application programs have a built-in help feature, typically available through a(n) ____ button. a). Tool |
c). Help |
Although labels and constant values will be copied exactly to the new location, the way formulas behave when they are copied depends on whether they use relative cell referencing or ____.
a). total cell referencing |
c). absolute cell referencing |
In addition to their full versions, some commercial software is available as a ____ or trial version. a). sample |
d). demo |
Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide. a). wizards |
d). slide layouts |
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan is told by the supervisor that to create a database, he first needs to create the database ____ itself, and then he can create the necessary database objects. a). table |
d). file |
The most common type of database used on PCs today is a(n) ____. a). relational database |
a). relational database |
Most ____ programs are available to try free of charge, but typically a small fee is required to use the program regularly. a). shareware |
a). shareware |
Related software programs are sometimes sold bundled together as a ____, such as a group of graphics programs, utility programs, or office-related software. a). software suite |
a). software suite |
A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people. a). projector |
b). presentation graphic |
____ refers to using a PC to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer. a). Computer-aided design (CAD) |
b). Desktop publishing |
Businesses and many individuals often use office suites, sometimes called ____, to produce various types of documents. a). integral suites |
b). productivity software suites |
Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached. a). word wrap |
a). word wrap |
The ____ is a new feature in versions of Microsoft Office, starting with Office 2007; it consists of tabs, which contain groups of related commands for the program being used. a). shortcut menu |
c). Ribbon |
A single spreadsheet document is often called a ____. a). cell |
d). worksheet |
A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or calculate a mortgage payment amount. a). argument |
d). function |
The accompanying figure represents the toolbar command button for the ____ command. a). New document |
d). Undo |
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon. a). Format |
b). Insert |
Some mobile software programs are designed to be compatible with popular ____ to facilitate sharing documents between the two platforms. a). Web-based software |
c). desktop software |
Companies that deliver SaaS are sometimes referred to as ____. a). download services |
b). application service providers (ASPs) |
One of the most common painting programs is ____. a). Macromedia’s Dreamweaver |
c). Microsoft Paint |
____ is a shareware program. a). Microsoft Office (office suite) |
d). WinZip (file compression program) |
There are four basic categories of software: commercial software, shareware, freeware, and ____. a). publish software |
b). public domain software |
The original first-generation cell phones were ____ and designed for voice data only. a). digital |
c). analog |
____ transmissions are used with cell phones and are sent and received via cellular (cell) towers. a). PM radio |
c). Cellular radio |
A standard that is designed to connect peripheral devices, similar to Bluetooth, but that transfers data more quickly is ____. a). WiMAX |
d). wireless USB |
____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles. a). Satellite stations |
d). Microwave stations |
____ is the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places.
a). Online conferencing |
b). Videoconferencing |
A global positioning system (GPS) consists of ____ and a group of GPS satellites. a). GPS transmitters |
d). GPS receivers |
With ____, data is sent one bit at a time, one after the other along a single path. a). serial transmission |
a). serial transmission |
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle would like to purchase a new ____, which would be used to connect the company’s LAN and the Internet. a). hub |
c). router |
____ satellites travel at a speed and direction that keeps pace with the earth’s rotation, so they appear (from earth) to remain stationary over a given spot. a). Microwave |
b). Geosynchronous |
The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device. a). Singbox |
b). Slingbox |
Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss. a). intranets |
d). videoconferencing |
The accompanying figure shows a ____ network. a). star |
a). star |
Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home. Robert’s job is a(n) ____ job. a). telemarketing |
b). telecommuting |
Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa. a). hub |
b). modem |
__________ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached
a). IrDA |
c). RFID |
In ____ transmission, data is sent at the same time as other related data to support certain types of real-time applications that require the different types of data to be delivered at the proper speed for that application. a). synchronous |
b). isochronous |
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
a). hotspot |
b). access point |
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only. a). switch |
a). switch |
A ____ is a network that covers a relatively small geographical area, such as a home, office building, or school. a). small area network (SAN) |
c). local area network (LAN) |
A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.
a). bridge |
d). hub |
____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period.
a). Bandwidth |
a). Bandwidth |
Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted
a). transmitters |
d). sensors |
The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes.
a). location positioning system (LPS) |
d). global positioning system (GPS) |
Microsoft Office markup tools and specialized ____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content.
a). collaboration software |
a). collaboration software |
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network. a). network interface card (NIC) |
a). network interface card (NIC) |
___ transmission is relatively uncommon in data transmissions since most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer. a). Half-duplex |
b). Simplex |
In ____ transmission, data can move in both directions at the same time, such as with a telephone.
a). full-duplex |
a). full-duplex |
____ are acts of malicious destruction to a computer or computer resource.
a). Phishing attacks |
c). Computer sabotage |
Repeated threats or other harassment carried out online between adults is referred to as ____.
a). cyberstalking |
a). cyberstalking |
____ are sets of tools that allow hackers to access a system.
a). Toolkits |
d). Rootkits |
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
a). e-cons |
d). dot cons |
____ identify users by a particular unique biological characteristic. a). Possessed object access systems |
d). Biometric access systems |
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities. a). Framing |
c). Pharming |
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
a). Trojan horse |
a). Trojan horse |
___ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee’s computer. a). Data-leakage prevention |
a). Data-leakage prevention |
Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network. Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.
a). private key |
d). password |
A computer that is controlled by a hacker or other computer criminal is referred to as a ____. a). spider |
d). bot |
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a). Touch object |
b). Possessed object |
When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature. a). private |
b). public |
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications. a). Sarbanes-Oxley Act |
b). USA Patriot Act |
Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network. One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through. a). botnet |
b). firewall |
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business). a). war driving |
b). Wi-Fi piggybacking |
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies. a). Heath Insurance Portability and Accountability Act (HIPAA) |
c). Homeland Security Act of 2002 |
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive. a). Spams |
b). Identity theft |
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a). Spoofing |
b). Unauthorized access |
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a). spoofing |
d). war driving |
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites. a). typosquatting |
a). typosquatting |
____ uses a single secret key to both encrypt and decrypt the file or message. a). Private key encryption |
a). Private key encryption |
Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network. Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them. a). IPS |
a). IPS |
Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando’s computer when he downloaded a free computer game from the Internet. a). spider |
c). virus |
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
a). virus definitions |
a). virus definitions |
Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself. a). Trojan horse |
a). Trojan horse |
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
a). Touch object |
b). Possessed object |
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network. a). laptop private network |
d). virtual private network |
____ refers to the act of breaking into a computer or network. a). Spamming |
c). Hacking |
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
a). spoofing |
d). war driving |
____ is a generic term that refers to any type of malicious software. a). Spamware |
b). Malware |
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
a). CryptMail |
c). HushMail |
____ identify users by a particular unique biological characteristic.
a). Possessed object access systems |
d). Biometric access systems |
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network. a). virus |
c). worm |
The accompanying figure shows the iGoogle ____ Web page.
a). portal |
a). portal |
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search. a). character searching |
b). phrase searching |
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.
a). lack of face-to-face contact |
a). lack of face-to-face contact |
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
a). Web X |
d). Web 2.0 |
____ is the most widely used type of home broadband connection, with over half of the home broadband market. a). DSL (Digital Subscriber Line) Internet access |
d). Cable Internet access |
One advantage of a dial-up connection is ____. a). connection speed |
b). security |
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
a). Application service providers (ASPs) |
d). Internet service providers (ISPs) |
Online shopping and online investing are examples of ____. a). online merchandising |
c). e-commerce |
Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects. a). e-mail programs |
b). message boards |
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box. a). Windows |
d). Internet Options |
____ are companies that manage and distribute Web-based software services to customers over the Internet. a). Internet service providers (ISPs) |
d). Application service providers (ASPs) |
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
a). main Internet |
c). Internet backbone |
____ sites allow you to generate map and driving directions and provide access to specific types of useful information. a). Educational |
b). Reference |
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.
a). VoIP |
b). RSS |
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
a). World Wide Web |
b). ARPANET |
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source. a). technology |
d). author |
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available. a). wiki |
b). RSS |
____ allows you to exchange real-time messages easily with people on your buddy list—a list of individuals that you specify. a). VoIP |
c). Instant messaging |
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences. a). cookies |
a). cookies |
Video content delivered at the user’s request is called ____. a). video channel |
c). video-on-demand |
____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.
a). P2P |
b). Internet2 |
Conventional dial-up connects to the Internet at a maximum of ____.
a). 10.2 Kbps |
c). 56 Kbps |
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom. a). Security |
b). Privacy |
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.
a). e-portfolios |
b). wikis |
Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is ____. a). VoIP |
a). VoIP |
Direct Internet connections are typically ____ connections. a). broadband |
a). broadband |
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available. a). wiki |
b). RSS |
____ limit search results to just those pages with a specific Web page title, URL, text, or top-level domain. a). Keyword searches |
c). Field searches |
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she’s away from her computer. a). VoIP |
d). online music store |
____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building. a). T1 |
d). BoF |
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee. a). RSS |
b). VOD |
CIS #1
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price