In your encryption algorithm, you removed every third letter. Which algorithm did you use? Compaction |
compaction |
Which of the following does your college use to verify your identity? Face Recognition System |
hand geometry system |
The term, PIN, is an acronym for which of the following? |
personal identification number |
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet? Sending spam via email |
authoring ActiveX scripts |
All of the following are guidelines about the appearance of letterhead elements EXCEPT ____. Choose Colors that convey your goal |
make the font size of your name the same size as the rest of the text in the letterhead |
Which of the following terms is used to describe a small text file that a web server stores on your computer? A breadcrumb |
a cookie |
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________. Information theft |
information theft |
A(n) ____________________ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed. |
backup |
The term, botnet, means _____________. A program that performs a repetitive task on a network |
a group of compromised computers connected to a network that attacks other networks |
A(n) ____________________ website offers exciting, challenging avenues for formal and informal teaching and learning. |
educational |
Which of the following does your daughter’s daycare use to verify the identity of parents who pick up their children? Hand geometry system |
hand geometry system |
Which of the following statements is not true about backing up? Backup programs are available from many sources. |
With a selective backup, all of the files in the computer automatically are chosen to be copied. |
A(n) ____________________ is a type of software for computers and mobile devices that reads a user’s specified web feeds and collects their most recent content. |
feed reader |
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? Cybersleuthing |
digital forensics |
If no name is present what comes after in MLA format? |
title of source |
By default, the Normal style inserts a vertical space equal to ____ line(s) between each line of text. 1 |
1.08 |
What is an EULA intended to do? License software for individual use |
license software for individual use |
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service? digital forensics system |
voice verification system |
Which of the following can be used to create a software registration number, sometimes illegally? BSA |
keygen |
All social networking sites have a specialized audience. true |
false |
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer? Chat |
Chat |
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender? a certificate authority |
a digital signature |
A thesaurus can be used to look up a(n) _____, or a word similar in meaning to a given word. |
synonym |
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? script kiddie |
cracker |
Which of the following terms refers to a written list of guidelines that might include rules that prevent employees from using software illegally or using computers to steal? a software license |
IT code of conduct |
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following? resources |
resources |
What happens during a DDoS attack? An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic. |
A zombie army is used to attack computers or computer networks. |
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer? worm |
a cookie |
Which of the following does your company use to track your time and attendance?
face recognition system |
hand geometry system |
Although you can use a dialog box to indent paragraphs, Word provides a quicker way through the ____. Quick Access Toolbar |
horizontal ruler |
A(n) ____________________ is a motion you make on a touch screen with the tip of one or more fingers or your hand. |
gesture |
The term firewall is _____________. The access point a hacker uses to intrude on a computer or network |
hardware and/or software that protects a network’s resources from intrusion |
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage? 25 |
25 |
A(n) ____________________ is a portable storage device that is small and lightweight enough to be transported on a keychain or in a pocket. |
USB flash drive |
A(n) ____________________ address is a number that uniquely identifies the location of each computer or device connected to the Internet. |
internet protocol |
Which of the following statements is not true about software theft? A keygen distributes user names and passwords to those who register their legally purchased copies of a software program. |
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program. |
Which of the following statements is not true about intellectual property rights? The term fair use refers to the rights which creators are entitled for their work. |
The term fair use refers to the rights which creators are entitled for their work. |
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations? malware |
malware |
A web ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic. |
search engine |
By default, the Normal style places ____ points of blank space after each paragraph. 8 |
8 |
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a virus |
a rootkit |
A(n) ____________________ is an input device that converts printed material into a form the computer can process. |
scanner |
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters? PIN |
password |
As an alternative to using the Color button on the PICTURE TOOLS FORMAT tab to display the Color gallery, you can right-click the graphic, click ____ on the shortcut menu, click the Picture button, expand the PICTURE COLOR section, and select the desired options. Format Picture |
format picture |
According to the MLA style, the _____ is a list of sources that are referenced directly in a research paper. parenthetical citations page |
works cited page |
In your encryption algorithm, you replaced each letter with another letter. Which algorithm did you use? substitution |
substitution |
Which of the following terms is used to describe a file a computer creates that records successful and unsuccessful access attempts? an access control |
an audit trail |
Which of the following does your new smartphone use to unlock the device? hand geometry system |
face recognition system |
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? spoofing |
spoofing |
A(n) ____________________ name is the text-based name that corresponds to the IP address of a server that hosts a website. |
domain |
A tag name is an identifier that links a(n) ____ to a source. citation |
citation |
What is an AUP intended to do?
License software for individual use |
outline computer activities for which the computer and network may or may not be used |
Which of the following statements is not a safeguard against the failure of hardware?
surge protectors |
device-tracking apps |
The term ____________________ refers to the worldwide collection of websites (blogs) like the one in the accompanying figure. |
blogosphere |
A(n) ____________________ is a mobile computing device designed for single-player or multiplayer video games. |
game console |
Bing, Google, and Yahoo! are all examples of web ____________________. |
search engines |
A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages. |
pop-up |
A note reference mark signals that an explanatory note exists at the bottom of the page as a(n) ____, as shown in the accompanying figure. keynote |
footnote |
The term, payload, as it pertains to computer crime, is defined as _____________. The money a criminal receives from extortion or other computer crimes |
the destructive event or prank the program is intended to deliver |
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
a decipher module |
an encryption algorithm |
What term is used to describe the process of restricting access to certain material on the web? content filtering |
content filtering |
A(n) ____________________ device is a computing device small enough to hold in your hand. |
mobile |
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program? war driving |
clickjacking |
In your encryption algorithm, you swapped adjacent characters. Which algorithm did you use? substitution |
transposition |
A(n) ____________________ is a named collection of stored data, instructions, or information and can contain text, images, video, and audio. |
file |
A(n) ____________________, which is similar to a password, consists of several words separated by spaces. |
passphrase |
Which of the following does a new federal laboratory use in its high security areas?
signature verification system |
iris recognition system |
A(n) ____________________ is an Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, and several other apps (programs). |
smartphone |
In order to safeguard your personal information, which of the following is recommended? Fill out rebates and warranty forms completely to provide the manufacturer with as much information as possible in case you need to contact them. |
Clear your history file when you are finished browsing. |
The term back door, as it refers to computer crime, is _____________. The area of memory where information about a virus or attempted attack is sent by the antivirus software in order to prevent similar attacks in the future |
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network |
To select a ____ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow. cell |
cell |
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
a virus |
a worm |
A(n) ____________________ is a collaborative website that allows users to add to, modify, or delete the website content via their browser. |
wiki |
Which of the following terms is an alternate term for the kind of computer shown in the accompanying figure?
thinbook |
notebook computer |
A(n) ____ is a book of synonyms. |
thesaurus |
A(n) ____ is a placeholder for data whose contents can change. attribute |
field |
The term, zombie, is _____________. A program that performs a repetitive task on a network |
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider |
Which of the following is the least likely motive for a DDoS? political anger |
spoofing |
A ____ symbol is another name for a dot symbol. bullet |
bullet |
Social engineering, as it pertains to computers, is _____________. Creating consumer and personal profiles by tracking website history and electronic purchases |
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users |
A computer like the one in the accompanying figure weighs up to ____________________ pounds (depending on the configuration). |
10 |
Storage devices like the ____________________ in the accompanying figure hold data, instructions, and information for future use. |
hard disk drive |
Which of the following does your financial institution use to reduce fraud? Signature Verification System |
signature verification system |
A(n) ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic. |
search engine |
Automatic page breaks are determined by ____.
paper size |
all of the above |
Because technology changes, you must keep up with the changes to remain digitally ____________________. |
literate |
Which of the following statements is not true about Internet and network attacks? No central administrator is present on the Internet. |
Information kept on an organization’s premises has a higher security risk than information transmitted over networks. |
To move from the second cell in the table in the accompanying figure back to the previous cell, press the ____ key(s). TAB |
SHIFT+TAB |
An entertainment website contains content that describes a cause, opinion, or idea. true |
false |
When using the MLA style, position in-text parenthetical references either at the _____, as shown in the accompanying figure. Top of the page as headnotes or at the end of the paper as endnotes |
bottom of the page as footnotes or at the end of the paper as endnotes |
The term CAPTCHA is _____________. A private combination of words associated with a user name that allows access to computer resources |
a series of distorted characters that a user is required to enter correctly to continue using a website |
Which of the following best describes the term, cybercrime? Online or Internet-based illegal acts |
online or Internet-based illegal acts |
Business documents can include all of the following EXCEPT ____. resumes |
personal letters |
All of the following are vertical alignment options EXCEPT ____. middle |
middle |
An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following? practical |
ethical |
A letterhead should contain all of the following EXCEPT ____. the complete legal name of the individual or company |
the company’s objective |
An effective business document should ____. have a professional appearance |
all of the above |
Which of the following statements is not true about biometric devices?
Personal characteristics are unique and cannot be forgotten or misplaced. |
Biometric devices are an unreliable method of identification and notification. |
Business documents can include all of the following EXCEPT ____. resumes |
personal letters |
A disadvantage with a subject directory is that users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented. true |
true |
A megabyte is equal to approximately one billion characters. true |
false |
Most websites of the kind shown in the accompanying figure require payment for services. true |
false |
The major differences between server computers like the one in the accompanying figure and client computers are that the client typically has more power, more storage space, and expanded communications capabilities. true |
false |
A game console is small enough to fit in one hand, making it more portable than the handheld game device. true |
false |
A bookmarking site is a website that enables members to manage and share media such as photos, videos, and music. true |
false |
Breakthroughs in surgery, medicine, and treatments seldom result from scientists’ use of computers. true |
false |
Which of the following is a collection of computers and devices connected together, as shown in the accompanying figure, often wirelessly, via communications devices and transmission media? client base |
network |
CSC Midterm Review
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price