CompConFinal

Bluetooth is a technology often used in this type of network

PAN

Network technology best suited to networks of ten or fewer computers

Peer to Peer

Computers need this hardware to connect to a network

NIC

Company that offers internet access to individuals and businesses

ISP

This device connects 2 or more networks (or computers) and directs the flow of information along the network

Router

Wireless LANs and public hotspots use ___________ technology to connect to the internet

Wi-Fi

Bluetooth, 3G, and WiMAX are examples of ___________

Network Standards

________ is a newer standard for cell network technologies

LTE

_______ allows computers to be networked through ordinary telephone wires

HomePNA

Your computer needs a _______ to access a network

NIC

Fiber Optic Cable

USB

Coaxial

Ethernet RJ-45

Twisted Pair

A private corporate network for use by employees to coordinate e-mail and communications

Intranet

Network architecture in which one or more high-powered computers provide resources or services to other computers on the network

Client-Server

A private secure path across a public network (usually the internet)

VPN

A network where each computer is equal to others and maintains its own operating system and application software

Peer to Peer

Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network

Extranet

The standard method of business communication

E-mail

Skype and Tango are examples of this type of service

Video Chat

Text messaging is based on this technology

SMS

You can use this device for video chatting as well as surfing the internet

Smartphone

Flickr, Google, Outlook.com, Dropbox, and iCloud provide this type of service

Online Storage

You use ________ when your telephone calls travel over the Internet instead of using traditional phone systems

VolP

Buying and selling products via electronic channels such as the Internet is called _________

E-Commerce

With _______, you can access storage and applications over the Internet

Cloud Computing

The internet connects millions of computers connected through millions of _________ worldwide

Networks

_________ does not allow changing service or bandwidth because a website allows illegal media sharing

Net Neutrality

A collection of millions of websites

World Wide Web

The first graphical Web browser released in 1993

Mosaic

Another term for Short Message Service (SMS), messages of less than 160 characters sent via a cellular network

Text Messaging

A collection of related web pages connected by hyperlinks

Website

A Hypertext Markup Language (HTML) document

Webpage

This person can manually submit a URL to a search engine

Web Master

These are descriptive data and words entered into the header section of a Web page when its created

Meta Keywords

A web site like www.google.com that is designed specifically to help you find information on the web

Search Site

A web crawler, an indexer, a database, and a query processor are all components of this

Search Engine

A search engine returns a list of these, which are links to web pages that match your search criteria

Hits

T/F - Servers that host part of the Domain Name System are called domain name servers, or DNS servers

True

T/F - File sharing sites like YouTube and Flickr let you post and share photos, music and other media

True

T/F - Some sites on the Internet have the same IP address

False

T/F - Sites that let you access your email account from public computers like the ones in the library are called file sharing sites

False

T/F - The .mobi TLD (top level domain) is used by sites that are optimized for mobile devices

True

T/F - The world wide database of domain names and corresponding IP addresses is called the Domain Name System

True

A forum temporarily saves messages and often uses a ___________ to approve messages before they are posted to read

Moderator

Synchronous communication that everyone who is communicating must be _______at the same time

Online

A system that lets people exchange short messages while they're online

Realtime Messaging

A _________ or internet forum is an online discussion site where people participate in a conversation by posting messages

Message Board

A _________ program, used to participate in a newsgroup, is often provided with some e-mail software

Newsreader

Members of the public who report on current events

Citizen Journalists

Type of communication such as blogging, where authors and readers do not need to be online at the same time

Asychronous

A Web page listing journal entries that provide commentary and information, usually about a particular interest

Blog

A type of Web page that a group of people can comment on or make changes to

Wiki

A post to a microblog such as Twitter

Tweet

Using an RSS feed: Internet Explorer lists the feed in the Favorites Center

4

Using an RSS feed: You click the Feeds button

2

Using an RSS feed: Internet Explorer displays the Feeds button in orange

1

Using an RSS feed: You click a bold feed name in the Favorites Center to display updated content from the Web site

5

Using an RSS feed: You click a subscribe link on the Web page

3

T/F - Video sharing sites such is YouTube and Vimeo provide a place to post short videos called clips

True

T/F - Social Networking sites never allow members to post messages on pages of other members

False

T/F - You can use Facebook's live feed tool to broadcast content as you post it

True

T/F - You have no control over who views your social network information

False

T/F - To join a social network, you create an avatar

False

Social Networks, including synonyms for networks

~networks social

Pages about the exact phrase, social networking sites

"social networking sites"

Pages about social networks, social networking, and a social network

Social network

Information about Apple's social networking technology

Site:www.apple.com social networking

Social networking sites other than Facebook

Related:www.facebook.com

Y/N - Scan the page for quotations from experts

Yes

Y/N - Make sure the information was published or updated

Yes

Y/N - Consider whether the page contains typos and grammar errors

Yes

Y/N - Make sure the photos and video clips show a sense of humor

No

Y/N - Consider whether the author has a conflict of interest

Yes

Engine that search web pages in its database that contains specific words or phrases

General Search

Service that connects you to a human librarian

Online Reference

Finds subjective content, such as comments, reviews and opinions

Social Search Tool

Engine that provides access to academic information for research

Specialty Search

Offers the convenience of searching many sources from one website

Metasearch Engine

T/F - Your computer should be password protected

True

T/F - There is no way to track your cell phone once it is lost

False

T/F - With cloud storage, you can retrieve your data anytime from anywhere in the world

True

T/F - Your best protection from losing your data is to backup your files to your hard drive

False

T/F - Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges

True

T/F - A thief must physically steal your computer to gain access to its files and data

False

Computer taken over by hackers to perform malicious tasks across a network

Bot

Common forms include viruses, Trojan horses, and worms

Malware

Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission

Spyware

Displays unwanted advertisements in banners or pop-up windows on your computer

Adware

Used by commercial web site vendors to identify users and customize web pages

Cookie

A high level of encryption for wireless devices

WPA2

Method used to verify the identity of computer users

Authentication

A strong password

Jo$e185#ntK

Security feature often built into operating systems

Firewall

A unique name you create to identify yourself to a computer system

Username

A slowed down WIFI connection can be the result of this

Piggybacking

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

Worm

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

Virus

Type of malware that collects bits of data, like your surfing habits

Spyware

Scam that looks like a genuine message or web site, but tries to get you to reveal sensitive information

Phishing

Indication that a web site is secure for shopping

https://

Indication that a website is not secure

Misspelled company name

E-mails that might appear to come from your bank or credit card company, asking you for email logon or personal information

Phishing

Online payment method to avoid

Money transfer

One secure method of online payment

Electronic wallet

Excessive use of gaming, video, research & surfing, texting, blogging, social networking & shopping coupled with the inability to stop

Signs of internet addiction

A way to relieve overall stress on body and breakup workflow

App that reminds you to take a break

Swiping, tapping, pinching a tablet, or clicking and dragging a mouse repeatedly

Causes of RSI's

Straining to read at an awkward angle or viewing a screen for too long

Causes of headaches & eyestrain

Having eyes even with the top third of a monitor

Relieves eye and neck strain

Using text messages to get you to download a mobile app that steals your information

Smishing

The process used to verify or identify computer users

Authentication

A type of fraudulent e-mail that typically contains misspellings and dire warnings

Phishing

Using physical features such as fingerprints, facial recognition, & retinal scans to verify a person's identity

Biometrics

A way to adjust security settings offered by Internet Explorer

SmartScreen filter

Present hardware and software that meets a buyer's needs

Computer seller

Write programming code

Software developer

Assemble computer parts

Manufacturer

Set up computer equipment for other employees

IT department

Collection of software development tools

IDE (Integrated Development Environment)

Word processing interface that programmers use to write code

Program editor

Examines software code line by line to identify errors

Debugger

Converts assembly code into machine code

Assembler

Repository of pre-existing software code for common functions

Code library

A data retrieval tool that finds specified data within a database

Query

A collection of records

Table

A data entry tool used to input data into a database

Form

The display format you choose when working with a database object on the screen

View

All of the fields for a single database entity

Record

Do this with devices you don't want, rather than discarding them

Donate (image)

Electronic trash is often shipped overseas

Trash (image)

Devices that become e-waste

Electronic devices (image)

Indication that a product was built using energy-efficient standards

Energy Star (image)

Certification a company or recycling business can receive from the international non-profit environmental group, Basil Action Network

e-Stewards enterprise (image)

T/F - Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging

True

T/F - Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones

False

T/F - Energy vampire devices draw power even when they are turned off or in standby mode

True

T/F - One reason to move to a paperless society is that printers are becoming prohibitively expensive

False

T/F - Before donating a computer, you should use a program to wipe the hard disk to remove all its data

True

Y/N - Receiving permission from a photographer to use one of his photos

Yes

Y/N - Copying a photo from a website and then using it without requesting permission

No

Y/N - Copying a quotation from a website and citing the source

Yes

Y/N - Copying content from a Wikipedia article, changing the words, and using text without citing the source

No

Y/N - Downloading a video in the public domain and using it is a presentation

Yes

CompConFinal - Subjecto.com

CompConFinal

Your page rank:

Total word count: 1983
Pages: 7

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Bluetooth is a technology often used in this type of network

PAN

Network technology best suited to networks of ten or fewer computers

Peer to Peer

Computers need this hardware to connect to a network

NIC

Company that offers internet access to individuals and businesses

ISP

This device connects 2 or more networks (or computers) and directs the flow of information along the network

Router

Wireless LANs and public hotspots use ___________ technology to connect to the internet

Wi-Fi

Bluetooth, 3G, and WiMAX are examples of ___________

Network Standards

________ is a newer standard for cell network technologies

LTE

_______ allows computers to be networked through ordinary telephone wires

HomePNA

Your computer needs a _______ to access a network

NIC

Fiber Optic Cable

USB

Coaxial

Ethernet RJ-45

Twisted Pair

A private corporate network for use by employees to coordinate e-mail and communications

Intranet

Network architecture in which one or more high-powered computers provide resources or services to other computers on the network

Client-Server

A private secure path across a public network (usually the internet)

VPN

A network where each computer is equal to others and maintains its own operating system and application software

Peer to Peer

Type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network

Extranet

The standard method of business communication

E-mail

Skype and Tango are examples of this type of service

Video Chat

Text messaging is based on this technology

SMS

You can use this device for video chatting as well as surfing the internet

Smartphone

Flickr, Google, Outlook.com, Dropbox, and iCloud provide this type of service

Online Storage

You use ________ when your telephone calls travel over the Internet instead of using traditional phone systems

VolP

Buying and selling products via electronic channels such as the Internet is called _________

E-Commerce

With _______, you can access storage and applications over the Internet

Cloud Computing

The internet connects millions of computers connected through millions of _________ worldwide

Networks

_________ does not allow changing service or bandwidth because a website allows illegal media sharing

Net Neutrality

A collection of millions of websites

World Wide Web

The first graphical Web browser released in 1993

Mosaic

Another term for Short Message Service (SMS), messages of less than 160 characters sent via a cellular network

Text Messaging

A collection of related web pages connected by hyperlinks

Website

A Hypertext Markup Language (HTML) document

Webpage

This person can manually submit a URL to a search engine

Web Master

These are descriptive data and words entered into the header section of a Web page when its created

Meta Keywords

A web site like www.google.com that is designed specifically to help you find information on the web

Search Site

A web crawler, an indexer, a database, and a query processor are all components of this

Search Engine

A search engine returns a list of these, which are links to web pages that match your search criteria

Hits

T/F – Servers that host part of the Domain Name System are called domain name servers, or DNS servers

True

T/F – File sharing sites like YouTube and Flickr let you post and share photos, music and other media

True

T/F – Some sites on the Internet have the same IP address

False

T/F – Sites that let you access your email account from public computers like the ones in the library are called file sharing sites

False

T/F – The .mobi TLD (top level domain) is used by sites that are optimized for mobile devices

True

T/F – The world wide database of domain names and corresponding IP addresses is called the Domain Name System

True

A forum temporarily saves messages and often uses a ___________ to approve messages before they are posted to read

Moderator

Synchronous communication that everyone who is communicating must be _______at the same time

Online

A system that lets people exchange short messages while they’re online

Realtime Messaging

A _________ or internet forum is an online discussion site where people participate in a conversation by posting messages

Message Board

A _________ program, used to participate in a newsgroup, is often provided with some e-mail software

Newsreader

Members of the public who report on current events

Citizen Journalists

Type of communication such as blogging, where authors and readers do not need to be online at the same time

Asychronous

A Web page listing journal entries that provide commentary and information, usually about a particular interest

Blog

A type of Web page that a group of people can comment on or make changes to

Wiki

A post to a microblog such as Twitter

Tweet

Using an RSS feed: Internet Explorer lists the feed in the Favorites Center

4

Using an RSS feed: You click the Feeds button

2

Using an RSS feed: Internet Explorer displays the Feeds button in orange

1

Using an RSS feed: You click a bold feed name in the Favorites Center to display updated content from the Web site

5

Using an RSS feed: You click a subscribe link on the Web page

3

T/F – Video sharing sites such is YouTube and Vimeo provide a place to post short videos called clips

True

T/F – Social Networking sites never allow members to post messages on pages of other members

False

T/F – You can use Facebook’s live feed tool to broadcast content as you post it

True

T/F – You have no control over who views your social network information

False

T/F – To join a social network, you create an avatar

False

Social Networks, including synonyms for networks

~networks social

Pages about the exact phrase, social networking sites

"social networking sites"

Pages about social networks, social networking, and a social network

Social network

Information about Apple’s social networking technology

Site:www.apple.com social networking

Social networking sites other than Facebook

Related:www.facebook.com

Y/N – Scan the page for quotations from experts

Yes

Y/N – Make sure the information was published or updated

Yes

Y/N – Consider whether the page contains typos and grammar errors

Yes

Y/N – Make sure the photos and video clips show a sense of humor

No

Y/N – Consider whether the author has a conflict of interest

Yes

Engine that search web pages in its database that contains specific words or phrases

General Search

Service that connects you to a human librarian

Online Reference

Finds subjective content, such as comments, reviews and opinions

Social Search Tool

Engine that provides access to academic information for research

Specialty Search

Offers the convenience of searching many sources from one website

Metasearch Engine

T/F – Your computer should be password protected

True

T/F – There is no way to track your cell phone once it is lost

False

T/F – With cloud storage, you can retrieve your data anytime from anywhere in the world

True

T/F – Your best protection from losing your data is to backup your files to your hard drive

False

T/F – Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges

True

T/F – A thief must physically steal your computer to gain access to its files and data

False

Computer taken over by hackers to perform malicious tasks across a network

Bot

Common forms include viruses, Trojan horses, and worms

Malware

Software secretly installed on networked computers that tracks and transmits personal data without your knowledge or permission

Spyware

Displays unwanted advertisements in banners or pop-up windows on your computer

Adware

Used by commercial web site vendors to identify users and customize web pages

Cookie

A high level of encryption for wireless devices

WPA2

Method used to verify the identity of computer users

Authentication

A strong password

Jo$e185#ntK

Security feature often built into operating systems

Firewall

A unique name you create to identify yourself to a computer system

Username

A slowed down WIFI connection can be the result of this

Piggybacking

Type of malware that spreads without human interaction, sending itself out to everyone in your address book

Worm

Type of malware that is spread when you distribute infected files, especially as e-mail attachments

Virus

Type of malware that collects bits of data, like your surfing habits

Spyware

Scam that looks like a genuine message or web site, but tries to get you to reveal sensitive information

Phishing

Indication that a web site is secure for shopping

https://

Indication that a website is not secure

Misspelled company name

E-mails that might appear to come from your bank or credit card company, asking you for email logon or personal information

Phishing

Online payment method to avoid

Money transfer

One secure method of online payment

Electronic wallet

Excessive use of gaming, video, research & surfing, texting, blogging, social networking & shopping coupled with the inability to stop

Signs of internet addiction

A way to relieve overall stress on body and breakup workflow

App that reminds you to take a break

Swiping, tapping, pinching a tablet, or clicking and dragging a mouse repeatedly

Causes of RSI’s

Straining to read at an awkward angle or viewing a screen for too long

Causes of headaches & eyestrain

Having eyes even with the top third of a monitor

Relieves eye and neck strain

Using text messages to get you to download a mobile app that steals your information

Smishing

The process used to verify or identify computer users

Authentication

A type of fraudulent e-mail that typically contains misspellings and dire warnings

Phishing

Using physical features such as fingerprints, facial recognition, & retinal scans to verify a person’s identity

Biometrics

A way to adjust security settings offered by Internet Explorer

SmartScreen filter

Present hardware and software that meets a buyer’s needs

Computer seller

Write programming code

Software developer

Assemble computer parts

Manufacturer

Set up computer equipment for other employees

IT department

Collection of software development tools

IDE (Integrated Development Environment)

Word processing interface that programmers use to write code

Program editor

Examines software code line by line to identify errors

Debugger

Converts assembly code into machine code

Assembler

Repository of pre-existing software code for common functions

Code library

A data retrieval tool that finds specified data within a database

Query

A collection of records

Table

A data entry tool used to input data into a database

Form

The display format you choose when working with a database object on the screen

View

All of the fields for a single database entity

Record

Do this with devices you don’t want, rather than discarding them

Donate (image)

Electronic trash is often shipped overseas

Trash (image)

Devices that become e-waste

Electronic devices (image)

Indication that a product was built using energy-efficient standards

Energy Star (image)

Certification a company or recycling business can receive from the international non-profit environmental group, Basil Action Network

e-Stewards enterprise (image)

T/F – Manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging

True

T/F – Refilling ink and toner cartridges unfortunately consumes more energy than manufacturing new ones

False

T/F – Energy vampire devices draw power even when they are turned off or in standby mode

True

T/F – One reason to move to a paperless society is that printers are becoming prohibitively expensive

False

T/F – Before donating a computer, you should use a program to wipe the hard disk to remove all its data

True

Y/N – Receiving permission from a photographer to use one of his photos

Yes

Y/N – Copying a photo from a website and then using it without requesting permission

No

Y/N – Copying a quotation from a website and citing the source

Yes

Y/N – Copying content from a Wikipedia article, changing the words, and using text without citing the source

No

Y/N – Downloading a video in the public domain and using it is a presentation

Yes

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending