Type of network in which data travels through the air |
wireless network |
Type of network in which data travels from one device to another over cables |
wired network |
The world’s largest wide area network |
Internet |
A communications device a laptop uses to connect to networks |
wireless adapter |
Type of network that can transmit data from a media player to a computer’s speakers |
personal area network (PAN) |
Star topology |
|
Ring topology |
|
Mesh topology |
|
Bus topology |
|
Tree topology |
|
In ______________ online education, the instructor holds a class that students attend virtually and at the same time. |
synchronous |
With ______________, you can buy and sell stocks and bonds without using a broker. |
online investing |
In _______________, blog members post eye-witness accounts of events. |
live blogging |
With _______________, you can view or listen to online content at any time rather than according to a set schedule. |
on-demand media |
When you use wireless mobile devices to make retail purchases, you are engaging in ____________. |
m-commerce |
A computer network is a collection of _____. |
b. systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically a. programs that perform tasks that users are directly interested in, which includes operating systems and any program that supports application software b. systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically c. documents called Web pages available through the Internet d. related fields in a data organization that can be stored, sorted, and queried |
Conventional television and radio networks, cellular telephone networks, and satellite TV networks are examples of _____. |
a. wireless networks a. wireless networks b. wired networks c. reinforced networks d. bounded networks |
Fast Ethernet has a maximum speed of _____. |
c. 100 Mbps a. 40 Mbps b. 10 Gbps c. 100 Mbps d. 400 Gbps |
Identify a method of data transmission used primarily with local area networks (LANs). |
b. Broadcasting a. Clocking b. Broadcasting c. Packet switching d. Circuit switching |
Identify a protocol that is used to retrieve emails. |
d. Post Office Protocol (POP3) a. Address Resolution Protocol (ARP) b. Simple Mail Transfer Protocol (SMTP) c. File Transfer Protocol (FTP) d. Post Office Protocol (POP3) |
Identify how wireless networks differ from wired networks. |
a. Unlike wired networks, wireless networks tend to be faster and more secure. b. Unlike wired networks, wireless networks can be accessed only when they are connected to the home network. c. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. d. Unlike wired networks, wireless networks physically connect the computers and other devices on the network. 6 5 out of 5 points Correct Identify how wireless networks differ from wired networks. Selected Answer: Correctc. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. Answers: a. Unlike wired networks, wireless networks tend to be faster and more secure. b. Unlike wired networks, wireless networks can be accessed only when they are connected to the home network. Correctc. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical. d. Unlike wired networks, wireless networks physically connect the computers and other devices on the network. Answer Feedback: Correct. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical or inconvenient as well as provide much more freedom about where you can use your computer. With wireless networking, for example, you can surf the Web on your notebook or tablet from anywhere in your house or backyard, access the Internet with your portable computer or smartphone while on the go, and create a home network without having to run wires among the rooms in your house. See 4-2: Network Characteristics Response Feedback: Correct. Unlike wired networks, wireless networks allow easy connections in locations where physical wiring is impractical or inconvenient as well as provide much more freedom about where you can use your computer. With wireless networking, for example, you can surf the Web on your notebook or tablet from anywhere in your house or backyard, access the Internet with your portable computer or smartphone while on the go, and create a home network without having to run wires among the rooms in your house. See 4-2: Network Characteristics Question 7 |
In the context of network topologies, which of the following is true of a star network? |
c. It is a network that uses a central device through which all network transmissions are sent. a. It is a network that uses a central cable to which all network devices connect. b. The network continues to function even if the central device fails. c. It is a network that uses a central device through which all network transmissions are sent. d. The network contains multiple devices so that data can take any of several possible paths from source to destination. |
In the context of networking hardware, which of the following is true of wired networks that have a central device called a hub? |
a. The bandwidth of the network is shared. a. The bandwidth of the network is shared. b. The network breaks down the data at the sender’s end and then reassembles it at the receiver’s end. c. The network forwards the data only to the intended receiver. d. The network is extremely efficient. |
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s. |
c. digital signals a. exponential signals b. ramp signals c. digital signals d. contiguous signals |
The amount of data that is actually transferred under real-life conditions is called _____. |
d. throughput a. jitter b. interplay data c. latency d. throughput |
The main disadvantage of fiber-optic cabling is _____. |
b. the initial expense of both the cable and the installation a. its slow speed when used to connect networks housed in separate buildings b. the initial expense of both the cable and the installation c. the use of metallic fiber strands instead of glass or plastic fiber strands d. its susceptibility to interference |
Which of the following is an advantage of Internet Protocol Version 6 (IPv6) and is not available in Internet Protocol Version 4 (IPv4)? |
d. In IPv6, all devices in a home or business are accessible on the Internet directly by their own Internet Protocol (IP) address. a. IPv6 uses 32-bit addresses, which allows for 232 possible unique addresses. b. In IPv6, the router always recalculates a checksum when header fields are altered, such as time to live (TTL) or hop limit. c. IPv6 addresses can be used for television and radio broadcasting. d. In IPv6, all devices in a home or business are accessible on the Internet directly by their own Internet Protocol (IP) address. |
Which of the following is one of the key enhancements of Bluetooth 4.0? |
b. Energy efficiency a. Need of cables between devices for data transfer b. Energy efficiency c. Use of Wi-Fi signals d. Large-range connectivity |
Which of the following ranges of the electromagnetic spectrum is sometimes referred to as the wireless spectrum? |
c. Radio frequency (RF) a. Gamma ray b. Infrared (IR) transmission c. Radio frequency (RF) d. X-ray |
Which of the following statements is true of Wi-Fi (802.11)? |
a. Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. a. Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. b. The speed of a Wi-Fi network is independent of the Wi-Fi standard being used. c. Wi-Fi is designed for low-range data transfers—typically between 10 and 30 feet indoors and 30 to 90 feet outdoors. d. The speed of a Wi-Fi network is independent of the number of solid objects between the access point and the computer or other device being used. |
Which of the following statements is true of a network adapter? |
a. It needs to support the type of cabling or signals being used. a. It needs to support the type of cabling or signals being used. b. It prevents the conversion of signals from digital to analog, and vice versa. c. It is independent of the type of Internet access being used. d. It is built into a device as a bridged card |
Which of the following statements is true of the Transmission Control Protocol (TCP)? |
d. It is responsible for the delivery of data. a. It is used in broadcast and multicast connections. b. It is faster than the User Data Protocol (UDP). c. It does not allow users to create block boundaries. d. It is responsible for the delivery of data. |
Which of the following statements is true of the global positioning system (GPS)? |
a. It is used in determining exact geographic locations. a. It is used in determining exact geographic locations. b. It is used to avail work from home facilities. c. It uses satellite technology to schedule meetings with clients. d. It provides medical information and services worldwide |
With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the network. |
d. wired a. radionic b. cellular c. shortwave d. wired |
With fixed WiMAX, it is feasible to provide coverage to an entire city or other geographical area by using _____. |
c. multiple WiMAX towers and overlapping hotzones a. a single WiMAX tower with a single hotspot b. multiple WiMAX towers and a single hotspot c. multiple WiMAX towers and overlapping hotzones d. a single WiMAX tower with overlapping hotzones |
… |
Bluetooth is a technology often used in this type of network. Computers need this hardware to connect to a network. Network technology best suited to networks of ten or fewer computers. Company that offers Internet access to individuals and businesses. This device connects two or more networks and directs the flow of information along the network. Term NIC router peer-to-peer ISP PAN |
Bluetooth is a technology often used in this type of network |
PAN |
Computers need this hardware to connect to a network. |
NIC |
Network technology best suited to networks of ten or fewer computers. |
peer-to-peer |
Company that offers Internet access to individuals and businesses. |
ISP |
This device connects two or more networks and directs the flow of information along the network. |
router |
… |
A network where each computer is equal to others and maintains its own operating system and application software. A private corporate network for use by employees to coordinate e-mail and communications. A private, secure path across a public network (usually the Internet). Network architecture in which one or more high-powered computers provide resources or services to other computers on the network. Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network. Term intranet extranet VPN client/server peer-to-peer |
A network where each computer is equal to others and maintains its own operating system and application software. |
peer-to-peer |
A private corporate network for use by employees to coordinate e-mail and communications. |
intranet |
A private, secure path across a public network (usually the Internet). |
VPN |
Network architecture in which one or more high-powered computers provide resources or services to other computers on the network. |
client/server |
Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network. |
extranet |
… |
Students connect to instructors, information, and other students using a computer and the Internet. Readers develop and refine news reports by commenting on them and posting contributions. Consumers read product descriptions and reviews and compare features and prices of similar products. People use a computer connected to the Internet to manage financial accounts. Listeners can create a personal radio station by listening to songs and then voting for the ones they like or dislike. Term online banking online education online music service e-tail Web sites hybrid Web sites |
Students connect to instructors, information, and other students using a computer and the Internet. |
online education |
Readers develop and refine news reports by commenting on them and posting contributions. |
hybrid web sites |
Consumers read product descriptions and reviews and compare features and prices of similar |
e-tail Web sites |
People use a computer connected to the Internet to manage financial accounts. |
online banking |
Listeners can create a personal radio station by listening to songs and then voting for the ones they like or dislike. |
online music service |
Created the World Wide Web in 1989 |
Tim Berners-Lee |
The largest network in the world, consisting of millions of interconnected networks |
Internet |
Patented the first mouse in 1970 |
Douglas Englebart |
The first computer network, consisting of four computers, created by the U.S. Department of Defense |
ARPANET |
Agency that sets standards and guidelines for the Web |
W3C |
A word or symbol that identifies the relationship between keywords, such as AND, OR, and NOT |
Boolean operator |
An automated program that uses hyperlinks to jump between Web pages and collect data |
Web crawler |
Consists of multiple keywords |
search phrase |
The unethical practice of manipulating meta keywords to push a Web site to the top of a search result list |
keyword stuffing |
Creates a query based on your search criteria and stores the data it collects in a database. |
search engine |
(n)___________ is a type of online conference where a presenter provides some type of instructional activity. |
Webinar |
In a(n) _______, participants can use a chat window to send typed messages to each other. |
Web conference |
A(n) ____________ allows people at two or more locations to meet electronically using a network to transmit video and audio data. |
video conference |
A(n) _________ is a data format used to provide frequently updated Web content delivered directly to your browser or e-mail software. |
RSS feed |
A(n) __________________ is an audio file stored online that can be distributed via download. |
podcast |
Businesses participate in social networks to encourage _____ to post messages with questions, comments, and ratings. |
consumers |
Flicker, Shutterfly, and Photobucket are ________ social networks. |
photo-sharing |
A social network is a Web site that links people to form a(n) _____ with shared interests and experiences. |
online community |
On a social network, you create an online form to create a virtual identity, or _____, which includes information you choose to describe yourself. |
profile |
_____ is an example of a professional networking site where you keep in touch with business contacts. |
|
Search engines place the most relevant ___________ on the first few pages of search results. |
hits |
Set up ____________ if you want to be notified when new online information about a topic becomes available. |
Google Alerts |
One way to refine a search term is to use a word base, or ____________ , to broaden the search. |
word stem |
To customize search results, you can change _________ , such as the number of results displayed per page. |
preferences |
When preparing for a search, choose ________________ that make the search term unique and specific. |
key words |
According to the online version of the Merriam-Webster Dictionary, the term _____ means "to steal and pass off the ideas or words of another as one’s own." |
plagiarize Answers: a. peptonize b. journalism Correctc. plagiarize d. dualism Answer Feedback: Correct. According to the online version of the Merriam-Webster Dictionary, the term plagiarize means "to steal and pass off the ideas or words of another as one’s own" or to "use another’s production without crediting the source." To avoid plagiarizing Web page content, one should credit Web page sources—as well as any other Internet resources—when he or she uses them in papers, on Web pages, or in other documents. See 5-3: Searching the Internet |
Facebook is an example of a(n) _____. |
social networking site Facebook is an example of a social networking site. A social networking site can be loosely defined as any site that enables individuals to connect and interact with other individuals, such as by following each other’s activities and posting messages. See 5-5: Beyond Browsing and Email |
Identify a disadvantage of Web-based training and distance learning. |
There is a possibility of technological problems. Answers: a. Each user cannot learn at his or her own pace. b. Employee training is impossible. Correctc. There is a possibility of technological problems. d. Content cannot be updated as needed. Answer Feedback: Correct. A disadvantage of Web-based training and distance learning is the possibility of technological problems. Because students need a working computer and Internet connection to access the material, they cannot participate if their computer, their Internet connection, or the Web server hosting the material goes down. See 5-5: Beyond Browsing and Email |
Instant messaging is commonly referred to as _____. |
chat Answer Feedback: Correct. Instant messaging, also commonly referred to as chat, allows one to exchange real-time messages with others. They can be sent via computers and smartphones using installed messaging programs or apps such as Hangouts, Kik, and What’s App. See 5-4: Email and Messaging |
Internet2 is _____ |
a research and development tool that is focused on speed Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the growth of revolutionary Internet technologies. See 5-1: Evolution of the Internet |
Rihanna owns a publication in New Jersey. She uses a Web-based software, Open Journals, to manage her publication works. She often downloads many Web-based applications needed for her work. Here, _____ are the companies that distribute Web-based software facilities to Rihanna over the Internet. |
Application service providers Application service providers (ASPs) are the companies that manage and distribute Web-based software services to Rihanna over the Internet. Instead of providing access to the Internet like Internet service providers (ISPs) do, these companies provide access to software applications via the Internet. See 5-1: Evolution of the Internet |
The biggest advantage of Voice over Internet Protocol (VoIP) is _____. |
cost savings Answer Feedback: Correct. The biggest advantage of Voice over Internet Protocol (VoIP) is cost savings, such as unlimited local and long-distance calls for as little as $25 per month, or basic cable and VoIP services bundled together for about $50 per month. One of the biggest disadvantages of VoIP is that it does not function during a power outage or if the Internet connection goes down, though some VoIP services are able to forward calls to a landline or mobile phone during outages. See 5-5: Beyond Browsing and Email |
The roots of the Internet began with an experimental project called _____ created in 1969 by the U.S. Department of Defense Advanced Research Projects Agency (ARPA). |
ARPANET The roots of the Internet began with an experimental project called the Advanced Research Projects Agency Network (ARPANET) created in 1969 by the U.S. Department of Defense Advanced Research Projects Agency (ARPA). As ARPANET grew during the next decade, networks at hundreds of colleges and universities were connected to it. See 5-1: Evolution of the Internet |
The term podcast is derived from the _____. |
iPod The term podcast is derived from the iPod (the first widely used device for playing digital audio files), although one can also listen to podcasts today using a computer or mobile phone. See 5-5: Beyond Browsing and Email |
Which of the following is a recorded audio or video file that can be downloaded via the Internet? |
A podcast In addition to written online communication, there are some types of online communications that utilize audio or video. For example, a podcast is a recorded audio or video file that can be downloaded via the Internet. See 5-5: Beyond Browsing and Email |
Which of the following is a term used by individual providers for fiber-to-the-premises (FTTP)? |
Verizon FOS In areas where fiber-optic cabling runs all the way to the building, a relatively new type of very fast direct Internet connection is available to homes and businesses. This type of Internet connection is generically called broadband over fiber (BoF) or fiber-to-the-premises (FTTP), with other names being used by individual providers, such as Verizon FOS and Google Fiber. See 5-2: Connecting to the Internet |
Which of the following provides leadership in addressing issues that may impact the future of the Internet? |
The Internet Society The Internet Society provides leadership in addressing issues that may impact the future of the Internet. It also oversees the groups responsible for Internet infrastructure standards, such as determining the protocols that can be used and how Internet addresses are constructed, as well as facilitating and coordinating Internet-related initiatives around the world. See 5-1: Evolution of the Internet |
Which of the following statements are true of Internet2? |
It is the first national network to use 100 Gigabit Ethernet over its entire footprint. It uses low-performance networks which can link only 200 member institutions to deploy and test new network applications and technologies. Answers: a. It supports only low bandwidth applications. Correctb. It is the first national network to use 100 Gigabit Ethernet over its entire footprint. c. It uses low-performance networks which can link only 200 member institutions to deploy and test new network applications and technologies. d. It initially connected four supercomputers. Answer Feedback: Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the growth of revolutionary Internet technologies. See 5-1: Evolution of the Internet |
____ are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet. |
Governments Governments are the ruling bodies of countries that can pass laws that impact both the information available via the Web and the access their citizens have to the Internet. For example, in France, it is illegal to sell items or post online content related to racist groups or activities. See 5-1: Evolution of the Internet |
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online. |
Web 2.0 A growing number of today’s Web-based applications and services are referred to as Web 2.0 applications. It generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online. See 5-1: Evolution of the Internet |
_____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the development of revolutionary Internet technologies. |
Internet2 Internet2 is a consortium of researchers, educators, and technology leaders from industry, government, and the international community who are dedicated to the development of revolutionary Internet technologies. Designed as a research and development tool to help create technologies that ensure the Internet can handle tomorrow’s applications, Internet2 is working to deploy advanced applications and technologies that might not be possible otherwise with today’s Internet. See 5-1: Evolution of the Internet |
____ is an example of an online payment service. |
PayPal Answer Feedback: Correct. PayPal is an example of an online payment service. Online shopping is commonly used to purchase both physical products—such as clothing, shoes, and furniture—as well as downloadable products—such as software, movies, and e-books—via Web pages like the L.L.Bean Web page. See 5-5: Beyond Browsing and Email |
____ is the largest and most well-known computer network, linking billions of computers all over the world. |
The Internet Answer Feedback: Correct. The Internet is the largest and most well-known computer network, linking billions of computers all over the world. As it has evolved over the past two decades or so, it has redefined how people think about computers, communications, and the availability of news and information. See 5-1: Evolution of the Internet |
In the accompanying figure, box _____ denotes the area where the email sent by a user is stored until the recipient opens the email. |
D Email (more formally called electronic mail) is the process of exchanging electronic messages (emails) over a network, typically the Internet. In the accompanying figure, box D denotes the area where the email sent by a user is stored until the recipient opens the email. See 5-4: Email and Messaging |
In the accompanying figure, boxes _____ denote the transfer of an email from a sender’s mail server to a receiver’s mail server. |
B-D Answer Feedback: Incorrect. Email messages can be sent from any Internet-enabled device, such as a personal computer or smartphone, to anyone who has an email address. See 5-4: Email and Messaging |
A collection of related Web pages connected by hyperlinks |
web site |
A collection of millions of Web sites |
World Wide Web |
The first graphical Web browser released in 1993 |
Mosaic |
Another term for Short Message Service (SMS), messages of less than 160 characters sent via a cellular network |
text messaging |
A Hypertext Markup Language (HTML) document |
web page |
A Web site like www.google.com that is designed specifically to help you find information on the Web |
search site |
A Web crawler, an indexer, a database, and a query processor are all components of this. |
search engine |
A search engine returns a list of these, which are links to Web pages that match your search criteria. |
hits |
These are descriptive data and words entered into the header section of a Web page when it’s created. |
meta keywords |
This person can manually submit a URL to a search engine. |
web master |
Steps for using an RSS feed in IE |
… |
Pages about the exact phrase, social networking sites |
… |
Social networks, including synonyms for networks |
… |
Social networking sites other than Facebook |
… |
Information about Apple’s social networking technology |
… |
Pages about social networks, social networking, and a social network |
… |
True False |
… |
You can encrypt specific files and folders in Windows using _____. |
EFS |
Besides passwords and firewalls, you can add an additional layer of protection for your computer data by using _____. |
encryption |
Real-time location systems, such as RFID tags, use _____ technology. |
GPS |
You can back up your files to remote servers over the Internet using ____, and you can then retrieve your data anytime from anywhere in the world. |
cloud storage |
Passwords, PINs, and ____ are the keys to your personal accounts with online retailers, banks, and social sites. |
usernames |
Technique used to scramble or code data that is transmitted over a network. |
encryption |
Creates a blockade between a corporate or personal network and the Internet. |
firewall |
Often used in combination with a password to gain entry to a computer system. |
username |
A system that verifies that user input is not computer-generated by having you type in distorted characters that appear on the screen. |
CAPTCHA |
Storing data on Internet servers is commonly referred to as storage on this. |
the cloud |
Warning signs include frequent slowdowns or freezes and a screeching, grinding, or repetitive clicking sound. |
hard drive failure |
This is the crime of hacking and attacking networks. |
cybercrime |
This is the premeditated disruption of computers and networks, with attacks centered on areas that will affect the most people. |
cyberterrorism |
This is the most important action you can take to protect your data. |
back up |
Steps you can take to protect personal information |
Shred documents and monitor accounts |
Hosted ad on a Web site |
How a third-party cookie can end up on your computer |
Crime usually committed by identity thieves |
Financial fraud |
Determine how a Web site uses your browsing history |
Read the Terms of Use and Privacy statements |
Uses Web technologies to humiliate, torment, or badger an individual |
Cyberbullying |
A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. |
firewall A way to control access to a computer or network is to use a firewall, which is a security system that essentially creates a barrier between a computer or a network and the Internet. Firewalls are typically two way, so they check all incoming and outgoing traffic and only allow authorized traffic through. See 6-2: Unauthorized Access and Unauthorized Use |
Technology that authenticates identity by scanning a person’s physical characteristics, like fingerprints. |
biometrics |
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access. |
virus A computer virus is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access. Computer viruses are often embedded into program or data files, such as games, videos, and music files downloaded from Web pages or shared via a P2P service. See 6-3: Computer Sabotage |
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____. |
botnet A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a botnet. Millions of U.S. computers are unknowingly part of a botnet. See 6-3: Computer Sabotage |
A sender’s private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____. |
digital signature The keys included in a digital certificate can be used to digitally sign an email message or other document to authenticate that document. The sender’s private key is used to sign the document, and that key, along with the contents of the document, generates a unique digital signature. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
An employee using an office computer to check personal emails is an example of _____. |
unauthorized use Unauthorized use is using a computing resource for unauthorized activities, even if the user is authorized to access that resource. For employees, checking personal email or visiting personal Facebook pages using work devices might be classified as unauthorized use. See 6-2: Unauthorized Access and Unauthorized Use |
The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception. |
U.S. SAFE WEB Act of 2006 The U.S. SAFE WEB Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception. Internet privacy is viewed as one of the top policy issues facing Congress today. See 6-8: Security and Privacy Legislation |
The _____ has been controversial since it was passed in 1998, and, in fact, it has never been implemented. |
Child Online Protection Act The Child Online Protection Act (COPA) has been controversial since it was passed in 1998, and, in fact, it has never been implemented. This legislation prohibited making pornography or any other content deemed harmful to minors available to minors via the Internet. See 6-8: Security and Privacy Legislation |
The _____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies |
Homeland Security Act Internet privacy is viewed as one of the top policy issues facing Congress today. The Homeland Security Act includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies. See 6-8: Security and Privacy Legislation |
The _____ regulates how Web sites can collect information from minors and communicate with them. |
Children’s Online Privacy Protection Act Internet privacy is viewed as one of the top policy issues facing Congress today. The Children’s Online Privacy Protection Act (COPPA) regulates how Web sites can collect information from minors and communicate with them. See 6-8: Security and Privacy Legislation |
Two of the most common ways individuals are harassed online are cyberbullying and _____. |
cyberstalking Two of the common ways individuals are harassed online are cyberbullying and cyberstalking. Repeated threats or other malicious behavior that pose a credible threat of harm carried out online is referred to as cyberstalking. See 6-5: Cyberstalking and Other Personal Safety Concerns |
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users’ personal information. |
Pharming Pharming is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by the pharmer in an effort to obtain users’ personal information. Sometimes pharming takes place using malicious code sent to a computer or other device via an email message. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
____ is the complete malfunction of a computer. |
System failure System failure is the complete malfunction of a computer system. System failure can occur because of a hardware problem, software problem, or computer sabotage. See 6-6: Personal Computer Security |
_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers. |
Phishing Phishing is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a phisher to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers. Once obtained, this information is used in identity theft and other fraudulent activities. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
____ occurs when an online buyer receives the proper items but falsely claims that they never arrived. |
Online auction fraud Online auction fraud occurs when an online auction buyer pays for merchandise that is never delivered or that is delivered but is not as represented. It can also occur when an online buyer receives the proper items but falsely claims that they never arrived. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
_____ occurs when someone obtains enough information about a person to be able to masquerade as that person. |
Identity theft Identity theft occurs when someone obtains enough information about a person to be able to masquerade as that person—usually to buy products or services in that person’s name. Typically, identity theft begins when a thief obtains a person’s name, address, and Social Security number, often from a discarded or stolen document. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
____ refers to the act of breaking into a computer or network. |
Hacking Hacking refers to the act of breaking into a computer or network. Hacking is a crime in the United States and many other countries. See 6-2: Unauthorized Access and Unauthorized Use |
____ refers to unsolicited email sent to a large group of individuals at one time. |
Spam Spam refers to unsolicited email sent to a large group of individuals at one time. Spam is also used in phishing schemes and other dot cons and is sent frequently via botnets. See 6-7: Understanding Privacy Concerns |
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers. |
Skimmers Skimmers steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers. They sometimes also position a hidden camera to capture ATM PINs. See 6-4: Online Theft, Online Fraud, and Other Dot Cons |
A _____ requires the person requesting access to provide information that only an authorized user is supposed to know. |
possessed knowledge access system Organizations must ensure that authorized individuals can access only the resources that they are supposed to access. A possessed knowledge access system requires the person requesting access to provide information that only an authorized user is supposed to know, such as a username and its corresponding password, which is a secret combination of characters. See 6-2: Unauthorized Access and Unauthorized Use |
_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim’s home address and telephone number, or hacking into the victim’s social media pages to alter the content. |
Cyberstalking Cyberstalking typically begins with online harassment, such as sending harassing or threatening email messages to the victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim’s home address and telephone number, or hacking into the victim’s social media pages to alter the content. Cyberstalking can also lead to offline stalking and possibly physical harm to, and sometimes the death of, the victim. See 6-5: Cyberstalking and Other Personal Safety Concerns |
Because electronics need to stay ________, computers have built-in systems to keep components from overheating. |
cool |
To prevent power fluctuations from damaging electronic components, you should always use a ________ with your computer. |
surge suppressor |
You can avoid data loss by installing an uninterruptible ________ supply (UPS) to prevent power loss to your computer in the event of a power outage. |
power |
Keep a can of compressed ________ near your work area, and use it to clean dust off your keyboard or pointing device. |
air |
________ will affect the data on older storage technology such as floppy disks, but are no danger to newer systems that use solid-state technology. |
magnets |
Displays unwanted advertisements in banners or pop-up windows on your computer |
Adware |
Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission |
Spyware |
Computer taken over by hackers to perform malicious tasks across a network |
Bot |
Common forms include computer viruses, Trojan horses, and worms |
Malware |
Used by commercial Web site vendors to identify users and customize Web pages |
Cookie |
Method used to verify the identity of computer users. |
authentication |
A high level of encryption for wireless devices. |
WPA2 |
A strong password. |
JO$e186#ntK |
Security feature often built into operating systems. |
firewall |
A unique name you create to identify yourself to a computer system. |
username |
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people |
cyberterriorism |
Type of power supply/battery backup device that can prevent some forms of data loss |
uninterruptible |
Type of hacker who intends serious harm through espionage, theft, or disruption of a network |
Black Hat |
Events that account for almost half of total catastrophic data losses |
hurricanes and storms |
Type of hacker who wants to show off their skills and doesn’t intend any serious damage |
White Hat |
Indication that a Web site is secure for shopping |
https:// |
One secure method of online payment |
electronic wallet |
E-mails that might appear to come from your bank or credit card company, asking you for e-mail logon or personal information |
phishing |
Online payment method to avoid |
money transfer |
Indication that a Web site is not secure |
misspelled company name |
A set of online communication practices and rules |
Netiquette |
First step to take when being cyberbullied or cyberstalked |
Report abuse quickly |
The nation’s fastest growing crime, where victims are unaware it’s being committed until the damage is done |
Identity theft |
Items an identity thief can obtain to impersonate you |
Driver’s license, birth certificate |
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons |
Components of an online profile |
CIS 110 Module 2 – Ch. 4-5-6
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price