The penguin image shown here is the logo an operating system that first appeared in |
1991 |
pink desktop with icons |
Linux |
Boot Camp is a software package that allows you to run _____ on a _____. |
Windows; Mac |
Yosemite is the newest version of which operating system? |
OS X |
_____ currently runs just over 80 percent of the mobile phones on the market. |
Android OS |
A Mac operating system isn’t designed to run on a Windows computer. This is called _____ dependency. |
platform |
Chromebooks have a(n) _____ startup time and store settings, applications, and documents _____. |
8-second; in the cloud |
Windows was initially a graphical user interface layered on top of this operating system. |
DOS |
To a great extent, _____ is based on UNIX. |
Linux |
According to Chapter 4, the industries of graphic design and photo imaging have been historically strong markets for |
Macs. |
Which of the following operating systems uses a command-line interface? |
UNIX |
The term platform is used to describe the combination of _____ and _____ used to run applications. |
hardware architecture; software |
Linux is different from the Mac OS X and Windows operating systems in that it |
is open source. |
Which of the following operating systems runs on tablets? |
Chrome OS |
Who developed Linux? |
Linus Torvalds |
_____ is a(n) Linux-based operating system meant to appeal to people who work primarily in web-based applications. |
Chrome OS |
_____ is primarily a server operating system. |
UNIX |
The operating system and utility software are known collectively as |
system software. |
The UNIX operating system was developed by _____ in the 1970s and was written in the _____ programming language. |
AT&T Bell Laboratories; C |
Drivers are software that allows an operating system to interface with |
hardware. |
black screen shot |
DOS; disk operating system |
The _____ interface replaced the command-line interface of earlier operating systems. |
graphical user |
A computer’s OS refers to its |
operating system. |
A new specification for _____, called UEFI, is just beginning to be adopted and could make the process much quicker. |
booting your computer |
UNIVAC I was the first _____ produced in the United States. |
commercial computer |
The process of _____ your computer, called booting, is handled by instructions that reside on the BIOS. |
starting |
Starting a computer when _____ is called a cold boot. |
the computer’s power is turned off |
In the _____ step of the booting process, the power supply sends signals to the motherboard. |
first |
What does UEFI stand for? |
Unified Extensible Firmware Interface |
Operating system packages such as Windows, Mac OS X, and Linux typically combine the OS with |
utilities. |
Where is your computer’s firmware stored? |
on a ROM BIOS chip |
A network operating system is what allows resources, such as printers, to be shared by many users. |
True |
Network operating systems must keep data secure while it’s being transmitted or |
stored. |
Multitasking involves |
handling several requests at one time |
Network operating systems support both network servers and user computers, which are referred to as |
clients |
Chapter 4 states that your computer’s performance is largely determined by the processor, the available cache, the bus, and the |
. amount of memory installed |
Your computer’s start screen is also referred to as its |
desktop |
Your computer’s OS uses a file allocation table to |
keep track of the physical locations where bits of data that make a file are stored. |
_____ memory is a dedicated holding area in which the data and instructions most recently used by the processor are temporarily stored. |
Cache |
A user interface is what you see when you look at your |
computer screen. |
What does the bus in your computer do? |
moves instructions and data around between the components |
_____ features allow you to enter information about a file, such as the date it was last saved, and the operating system helps you locate the file. |
Search |
Automated driver updates on a _____ are accomplished by the Software Update feature. |
Mac |
To rid your Windows PC’s hard drive of unwanted files, which utility would you use? |
Disk Cleanup |
_____ memory can be accessed quickly because it sits on the microprocessor. |
Cache |
When running several programs at once, your operating system places data that will not fit into _____ into ____ memory. |
RAM; virtual |
Most devices today work with a feature called Plug and Play, which |
recognizes the devices you plug into your computer (for example, into a USB port) |
When your computer moves data _____, the file it moves is referred to as a swap file. |
into virtual memory |
Utility that lets you undo changes made to the operating system and programs. – System Restore, Mobile operating system from Apple. – iOS, Operating system originally designed for servers. – UNIX, Files that provide instructions needed to run programs. – system files, Memory that holds data while the computer is in operation. – RAM |
Starting a computer from a no-power state. – cold boot, Part of the system software that can be used to perform system maintenance, scan files, and help protect your computer. – utility software, Where data is swapped into when RAM is used up. – virtual memory, The hierarchy of folders that leads to a stored file. – path, Memory that holds instructions the computer uses to start up the OS. – ROM, |
This is a small program needed by the operating system in order to communicate with a connected device such as a printer. |
driver |
GUI is an acronym for |
graphical user interface. |
The operating system and utilities are known as |
system software. |
The operating system on a mobile device is stored in this type of memory. |
read-only memory (ROM) |
This operating system is an open source program. |
Linux |
Which of the following is not an operating system designed for a smartphone or a tablet? |
Mac OS X |
This term describes the hardware architecture that software runs on. |
platform |
In this table, the operating system keeps track of the physical location where a document is saved to the hard disk. |
file allocation table (FAT) |
This utility searches for unnecessary files (such as temporary Internet files) and deletes them. |
Disk Cleanup |
What are computer manufacturers starting to use which will eventually replace the aging BIOS firmware? |
UEFI |
Microsoft Edge is the name of the new Windows |
web browser. |
In Windows 10, Cortana is |
a personal assistant. |
Continuum is a feature for tablet users that turns on or off |
tablet mode. |
You can customize the Windows 10 interface using the new |
Settings app. |
Find an app or program by typing the first few letters for the name in the |
Search box. |
In what way do futurists acknowledge the fact that digital technology is easily broken? |
Futurists acknowledge that because things are always being broken, they are also always being redesigned and improved. |
How will our control of devices and the Internet change in the future, according to experts? |
It will become less deliberate. |
According to the interviewee, what is one of the things that the original architects of the Internet did not anticipate? |
the current amount of mobile Internet activity |
4G network improvements allow greater reliability and |
improved security |
The change between the first and second generation of mobile telecommunications involved the change from |
analog to digital. |
4G stands for the fourth generation in mobile telecommunications standards. |
True |
According to the video, 3G turned your phone into |
a mini computer. |
What does BYOD stand for? |
bring your own device |
J2ME is a _____-based mobile OS. |
Java |
How is a mobile operating system different from a personal computer operating system? |
It’s less robust. |
You would find a mobile platform (or mobile operating system) on a |
smartphone |
An embedded object resides in |
the file you have inserted it into. |
These two file formats are discussed in Chapter 5 as means of exporting and importing data between applications. |
RTF and CSV |
Create a sales forecast. – QuattroPro, Develop a presentation. – KeyNote, Organize your contacts, tasks, calendar, and email. – Outlook, Create a web page. – Adobe Dreamweaver, Edit a photo. – Adobe Photoshop, Record and edit audio for podcasts. – Sony Creative, Maintain records of an inventory. – Access, Create product packaging. – CorelDraw, Prepare your tax return. – TurboTax, Prepare a mail merge. – Word |
… |
This shared feature in Microsoft Office helps you diagram processes and work flow. |
SmartArt |
A docx extension indicates a file created in |
Word. |
The icons for image files can indicate an associated image viewing program, while icons for sound files can indicate an associated |
media player. |
A file extension is typically three or four characters long. |
True |
You can send the following from PowerPoint to Word using the procedures described in this video. |
images of slides with lines for notes |
To export a PowerPoint 2016 presentation to a Word outline, you click the FILE tab, click Export, and then click |
Create Handouts. |
To export a Word outline to PowerPoint, you can add this button on the Word Quick Access toolbar. |
Send to Microsoft PowerPoint |
Which of the following is not true? |
It is not possible to share content between other programs in the Microsoft Office suite, only between Word and PowerPoint. |
Deciding between alternatives is called |
selection. |
Which structure is used when creating a program? |
a. sequence All of these Correct c. repetition d. selection |
Who creates a computer program? |
programmer |
The end result of running a computer program is a |
solution. |
With cloud computing, software is hosted |
on an online provider’s website. |
In the software development life cycle, once all tests are complete and the product seems stable, a final _____ version is produced. |
RTM |
Software products that are shared for a small payment are called |
shareware. |
In the software development life cycle, the software involved in the first stage of testing is referred to as the _____ version. |
alpha |
The final step in the software development life cycle involves |
performing maintenance and fixing bugs. |
As discussed in Chapter 5, a key benefit of a software suite is |
a common interface among programs. |
Who owns open source software? |
no one |
Office 365 is an example of |
. SaaS. |
The way software is packaged and delivered has changed drastically. Which of the following statements is still true of today’s software? |
a. All of these Correct Correct b. It comes with very little printed documentation. c. It is often contained on a single DVD. |
SDLC illustration |
testing the software |
Software developed and sold by individual companies is called |
proprietary. |
The source code is freely distributed in open source software. |
True |
Source code consists of |
a collection of statements written by programmers. |
What license issued in 1989 outlined the requirements of open source software? |
the GNU General Public License |
According to the interviewee, what technology has seen an explosion in the last five years? |
software for mobile devices |
Storing information in the cloud allows people to |
have the same information on multiple devices. |
According to the interviewee, how will software change in the future for the user? |
Software will become simpler for the user. |
Cloud computing involves |
accessing software and services from the Internet. |
To use any software application in the cloud you have to install a plug-in on your computer. |
False |
In the future, in the interviewee’s opinion, who will be able to design new software? |
both large corporations and independent coders |
You can minimize security risks with cloud computing by |
using strong passwords and reputable services. |
What is Apple’s productivity software suite called? |
iWork |
When software vendors host software on their sites and users access it, it’s referred to as |
software as a service. |
In the spreadsheet example shown in Chapter 5, _____ run from side to side and are designated by a number. |
rows |
Including a spreadsheet in a report created with a word processor is an example of |
how productivity suites can integrate content across programs. |
The presentation software included in the OpenOffice suites is called |
Impress. |
Productivity software suites typically include each of the following except _____ software. |
financial management |
Which of the following is an audio software application mentioned in Chapter 5? |
Audacity |
The productivity suite from Microsoft is called |
Office. |
After data has been entered into a database table, the data can be viewed in a tabular list or in a |
form. |
According to Chapter 5, productivity software and suites allow you to be productive from anywhere because they |
are available for smartphones and other mobile devices |
What is the name of the word processor software included in the OpenOffice suite? |
Writer |
What do the D and M stand for, respectively, in CAD/CAM? |
design and manufacturing |
This feature of word processor software allows you to take a list of names and addresses and print personalized letters. |
mail merge |
The spreadsheet software called Calc is part of the _____ suite. |
OpenOffice |
Chapter 5 discusses the current state of application software. Which of the following is not true of application software today? |
The basic categories of application software are the same as existed in the early days of consumer software. |
Word processor software allows you to use _____, which are pre-designed documents with formatting and graphics already in place. |
templates |
Who makes the Pages software application? |
Apple |
In the early days of consumer software, the offerings consisted mainly of _____ and simple games. |
basic business tools |
Microsoft interface |
OpenProj |
Which of the following applications provides the same types of functions as salesforce.com? |
ACT! |
In the past, mobile applications typically not as full-featured as their non-mobile counterparts because of the limitations of |
memory and screen size. |
_____ software is used by design professionals to lay out pages for books, magazines, brochures, product packaging, and other print materials. |
Desktop publishing |
Chapter 5 gives this example of how managers use spreadsheets. |
to track department budgets |
What is the name of the database software included in Microsoft Office? |
Access |
Microsoft Expression Web and Adobe Dreamweaver are _____ software. |
web authoring |
Chapter 5 notes that these two services allow access to productivity suites from the cloud. |
Office 365 and Google Docs |
_____ is mentioned in Chapter 5 as being useful for those writing software documentation or books about software, programming, or other technology. |
Screen capture |
The ability to estimate standard deviations is an example of spreadsheet software’s _____ capabilities. |
calculating |
What is the name of the database software included in OpenOffice? |
Base |
According to a survey cited in Chapter 5, more than _____ million Americans play computer and video games, and the average age of gamers is _____ years. |
150; 35 |
Chapter 5 discusses financial software used by accounting professionals, included Sage 50 Accounting and |
QuickBooks. |
_____ software is designed to store and manage information about the people you work or otherwise interact with. |
Contact management |
GIMP is an example of _____ software. |
photo editing |
Database software uses look-up fields to reduce |
redundant data. |
A computer network consists of two or more computing or other devices connected by a |
communications medium. |
When a company offers an extension of its internal network for the use of suppliers or customers, this is referred to as a(n) |
extranet |
A cellular tower relays |
radio waves. |
A medium in communications is some kind of network. |
True |
Communication involves someone who sends a message and someone who receives a message, as well as |
a communication medium and a common protocol. |
Communications protocols |
govern the exchange of information. |
radio waves. |
A cellular tower relays |
True |
A medium in communications is some kind of network. |
a communication medium and a common protocol. |
Communication involves someone who sends a message and someone who receives a message, as well as |
govern the exchange of information. |
Communications protocols |
time. |
The illustrations above depict different types of signals. The arrow represents |
modulate; demodulate |
The word modem comes from the combination of the words _____ and _____. |
continuous sound waves; fluctuate between high and low |
An analog signal is formed by _____ that _____. |
frequency. |
The speed at which a signal can change from high to low is called |
broadband. |
A communications medium that is capable of carrying a large amount of data at a fast speed is known as |
6 to 40 Mbps |
What is the typical speed range of a DSL network connection? |
1 Pbps |
Of the following bandwidth measurements, which represents the fastest transmission speed? |
bandwidth |
On a computer network, the term _____ refers to the number of bits per second that can be transmitted over a communications medium. |
send and receive data. |
Devices use network protocols to |
line of sight |
Infrared’s chief drawback in the electronics gadget world is that it requires |
mirroring. |
The ability to stream content from a tablet or phone to a TV is called |
BLE. |
The latest Bluetooth specification which uses less power is known as Bluetooth Smart or |
True |
RF can work with voice and gesture controls. |
energy |
One disadvantage of Wi-Fi Direct compared with Bluetooth is that Wi-Fi Direct uses more |
4G; 100 Mbps |
The current generation of cellular transmissions is called _____ and can transmit digital data at speeds of up to _____. |
Cat 5 |
_____ is an example of twisted-pair cable used in many wired networks. |
Satellite |
_____ communication is typically used for longer range transmissions, for international communications, and for connectivity in rural areas. |
beams of light. |
Fiber-optic cable uses a protected string of glass that transmits |
high-frequency radio signal |
A microwave is a(n) _____ that is directed from one microwave station tower to another. |
Tracking and Data Relay Satellite |
In January 2014 NASA launched its latest TDRS system into orbit. What does TDRS stand for? |
IMAP |
Which retrieval protocol allows you to synchronize mail folders between your email client and the email server? |
Simple Mail Transfer Protocol. |
The protocol used to deliver messages to the server is |
Post Office Protocol. |
POP stands for |
Gmail. |
An example of a webmail service is |
ANSI; IEEE |
_____ and _____ are organizations that develop standards that address the way devices communicate with one another. |
hands-free operation. |
Bluetooth headsets like the one shown above are popular with smartphone users because they offer |
modem. |
The process of tethering essentially turns your mobile phone into a |
microbrowser. |
Devices using WAP to display web content have to contain a(n) |
short-range; radio waves |
Bluetooth is a network protocol that offers _____ connectivity via _____. |
Gbps |
Ethernet networks are capable of speeds up to |
transponder |
The part of an RFID tag that sends the radio signal is called the |
802.11 |
Wi-Fi refers to a network that is based on the _____ standard. |
WiMAX |
LTE is generally expected to replace _____ networks in the future. |
TCP/IP |
This wired networking standard specifies the order in which data is sent through the network. |
802.16 |
By what other name is the WiMAX standard known? |
bus |
In which topology are all computers connected via a single cable? |
ring |
In which topology does data travel in one direction in a closed loop until the data reaches its destination? |
star |
In which topology do all devices connect to a hub or switch? |
mesh |
Which topology is used on the Internet? |
server |
In a LAN, the _____ houses the networking software that coordinates the data exchange among the devices. |
Internet |
Chapter 6 discusses a modification of the peer-to-peer network architecture called the _____ peer-to-peer network. |
MAN. |
If you connect to a network through your phone or cable company, then you probably connect through a |
stores programs and files; is a device connected to the network |
In a client/server network, the server _____ and the client _____. |
client; server |
In a peer-to-peer network, each computer in the network can act as both a _____ and a _____ |
peer-to-peer. |
The network architecture pictured above is called |
physical layout of; how data moves around the network |
Topology relates to the _____ the network but doesn’t reflect _____. |
The Internet |
_____ is, in essence, a giant WAN. |
NIC |
A(n) _____ is a type of network adapter. |
3 |
Approximately _____ percent of US adults still access the Internet using a dial-up modem. |
an Ethernet cable connecting a desktop to a router |
Which of the following would not be considered a node on a network? |
lines on the telephone network |
A DSL modem sends and receives data using |
hub |
A _____ is used on older LAN networks to coordinate the message traffic among nodes connected to a network. |
router |
A _____ is a device that allows you to connect two or more networks in either a wired or wireless connection. |
the central server. |
In a network, the network operating system is installed on |
block unwanted information from reaching your computer or computer network. |
The purpose of a firewall is to |
True |
A hardware firewall does not filter all outgoing traffic. |
hardware and software |
The best type of firewall protection for a network is |
b. may include privacy controls. |
Software firewalls |
cloud storage. |
Online storage of your email messages is an example of |
False |
Cloud-hosted software is stored on your computer. |
Google Docs |
An example of software on demand is |
install desktop application software on your computer. |
With cloud computing, you never have to |
… |
The correct answer is: The cable that is used to transmit cable television signals over an insulated wire at a fast speed. – coaxial cable, Any combination of hardware and software that provides a service, such as storing data, to a device, such as your computer. – server, A high-speed transmission medium that uses a protected string of glass to transmit beams of light. – fiber-optic cable, Uses a high-speed connection without the need for a physical cable between each computer. – wireless network, A computer or other device capable of sending data to and receiving data from any combination of hardware and software on a network. – client, Computer hardware and software is used to facilitate the exchange of data between a sender and a receiver. – communications system, This wireless medium provides short-range connectivity (3 to 300 feet, depending on a device’s power class) to other devices that have the same hardware. – Bluetooth, This wireless medium uses a series of access points to transmit signals to connected areas called hotspots. – Wi-Fi, Allow different devices to talk to one another. – standards, Used for wired telephone connections. – twisted-pair cable, The number of bits per second that can be transmitted over the communications medium. – bandwidth |
True |
HootSuite is second only to Twitter as the tool people use to manage their Twitter accounts. |
events. |
With HootSuite you can aggregate newsfeeds, photos, videos, and |
aggregator |
HootSuite is considered a(n) _______ of social content. |
analytical |
HootSuite’s _____ tools allow you to generate reports on activity. |
1999 |
According to Chapter 7, when did blogs begin to surface online? |
open source |
One of the trends associated with the development of Web 2.0 was the _____ movement, which allowed users to contribute to the code of free software. |
Snapchat |
Today, the social web has expanded to be accessible by a variety of mobile devices. Which of the following social media services is accessible only via apps on mobile devices? |
user profiles and friends lists |
Chapter 7 states that social networking was born when these two features came together in one service. |
HootSuite |
In the discussion of social technology trends, this service is cited as one that allows you to gather content from other social networking sites. |
2.0 |
Web _____ is a phase of the development of the web that is associated with user involvement and collaboration. |
Open content |
_____ is to the social web what open source was to software development–it means that anybody can freely share their knowledge. |
1997 |
In _____, one of the first true social networking sites, SixDegrees.com, appeared. |
Harvard |
The initial version of Facebook, which launched in 2004, was available only to student of this university. |
carry it from site to site |
One predicted trend in social technology is the ability to do this with the profile you create when you join a service. |
Friendster |
Of the following social networking sites, which launched first? |
2003 |
Chapter 7 cites _____ as the year the phenomenon known as social networking exploded, with several sites launching within months of each other. |
preferences |
A predicted development in the future of social technology is that you will have one set of _____ that will apply to all your social sites. |
AsianAvenue and BlackPlanet |
These two social networking sites initially launched in 1999 and relaunched in 2005. |
artblog |
Sketchblogs are a category of this type of blog. |
2008 |
YouTube added video blog features in |
True |
MP3 blogs are sometimes used by record companies to promote their musicians |
MP3 blog |
A site that uses music as a form of blogging is called a |
pound symbol (#) |
Because the _____ was already in use in several programming languages, in 2007 it was suggested that this symbol be used to organize topics on Twitter. |
to allow readers to search the blog for specific topics |
Why do bloggers assign tags to their content? |
microblogging |
The social site pictured above is described in Chapter 7 as a combination of _____ and social networking whose customizable format allows users to share text, photos, quotes, music, and videos. |
law enforcement websites. |
Chapter 7 discusses several online setting blogging has moved into, including each of the following except |
1990s |
Blogging began on a small scale in the mid- |
blog |
A _____ is an online journal that anybody can use to express ideas and opinions. |
social journaling |
What other term is used in Chapter 7 for microblogging sites such as Twitter. |
half a second. |
According to Chapter 7, somewhere in the world a new blog is created every |
five days |
It took Twitter over three years to reach its one billionth tweet, but in early 2014 an average of one billion new tweets were being created every |
recruiting |
According to the movie, colleges are using the social web for |
posting responses to blogs. |
Companies can market in a direct and personal way by |
True |
Social networking sites are now the number one marketing tool for small businesses. |
posting useful information. |
Online marketers often find that a direct sell approach on social networking sites doesn’t work as well as |
AOL |
Online socializing began in the late 1970s with the advent of each of the following services except |
organizing social events |
Social networks are going beyond online communication with sites like Socializr and Punchbowl, which have become popular for |
92; 67 |
About _____ percent of Internet users aged 18-29 use social networking sites, versus about _____ percent of those in the 50-64 years old category. |
2011 |
In what year did Google+ launch? |
100% |
What percentage of users’ time spent on Snapchat is done on a mobile device instead of a desktop or laptop? |
Friendster |
In 2002, _____ became one of the first social networking sites to catch on with the general public. |
40 |
Over _____ percent of smartphone owners use a social networking site on their phones. |
marketing tools. |
When a retailer includes a Like button (Facebook) or a Pin It button (Pinterest) on its product pages, this is an example of the growing trend of using trend of using social networking sites as |
share contacts; build a network of friends |
What has traditionally differentiated social networking sites from other social sites is the ability to _____ and _____. |
disappearing media |
One of the latest trends in the social web is _____, a movement driven by mobile apps such as Snapchat. |
strings. |
The discussion forums that appeared in the 1980s encouraged interaction with posts and responses displayed in discussion series called |
allow you to share bookmarks of recommended sites with others |
Social bookmarking sites |
Digg |
This site is an example of a social bookmarking site. |
True |
Businesses use social bookmarking to gain additional visitors to their sites and new customers. |
capture citations. store images. coordinate with online libraries. |
Features of social bookmarking that are useful to researchers include the ability to |
Share icon |
Social bookmarking is accessed on many websites through the use of a |
tags; links |
Social bookmarking sites save bookmarks as _____ rather than saving _____ in folders as some browsers do. |
social bookmarking |
Symbaloo is an example of this form of social networking. |
metadata |
Social bookmarking uses _____, which is essentially data about data. |
True |
A wiki is a way to collaborate on a project or online document. |
. a personal online diary |
A blog can be described as |
Wikipedia. |
A well known example of a wiki site is |
allows only a limited number of characters per posting. |
A microblog |
True |
A wiki is a way to collaborate on a project or online document. |
a personal online diary |
A blog can be described as |
Wikipedia. |
A well known example of a wiki site is |
allows only a limited number of characters per posting. |
A microblog |
make your site private. |
To keep strangers from viewing your videos online, you can |
providing a map of your location. |
Geotagging consists of |
being turned down by a school or employer. |
Posting videos that contain personal information online can put you at risk for |
survey what’s online about you and remove anything damaging. |
On a regular basis you should |
live media streaming |
Many media sharing sites use _____, a technology that allows them to send the content over the Internet in live broadcasts. |
record it offline and upload it. |
Some media sharing sites allow you to record your media right from the site, while others require that you |
late 1990s; MP3 music |
The media sharing trend began in the late _____ with _____ file sharing. |
media sharing; the ability to have a conversation about the media |
The site pictured above is discussed in Chapter 7 as an example of one that combines _____ with _____. |
Tumblr. |
Chapter 7 lists each of the following as examples of media sharing sites except |
scrambles a message so that it’s unreadable to anybody who doesn’t have the right key |
What does encryption do? |
one million |
In their 2015 Internet Security Threat Report cited in chapter 7, Symantec reported that _____ new malware threats are released every day. |
80 million |
In 2015, the second largest health insurance company experienced a breach that exposed medical IDs and social security numbers of as many as _____ customers. |
Florida, Georgia, California |
In 2013, these states had the top three per capita rates of identity theft complaints. |
47 |
Chapter 8 cites a 2015 study of data breaches which found that _____ percent involved a malicious or criminal attack. |
information security |
Chapter 8 states that computer security is also referred to as |
APT |
A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information. |
data loss prevention |
An important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network. |
installing anti-virus software on your computer |
Which of the following is not an example of the use of authentication? |
botmaster. |
A person who runs a botnet is called a |
True |
Botnet is short for robot network. |
install and run antivirus software. |
A good defense to prevent your computer from becoming a zombie is to |
reproduce itself. |
Botnets are created using self-propagating software, which means that the software can |
macro virus |
Which of the following types of malware is usually hidden in a document such as a word processing or spreadsheet file? |
identity theft. |
Phishing is typically used for |
the sender |
When sending an email message with public key encryption, who uses the private key? |
to obtain payment from the affected user |
What is the objective of ransomware? |
rootkit |
This type of malware is designed to gain access to the system software and allow the hacker to monitor the user’s actions. |
Trojan horse |
Which of the following types of malware opens a back door to your computer for malicious hackers? |
the recipient did not open the infected email. |
The illustration above shows a virus-infected email attack that was unsuccessful because |
TLS |
_____ is a protocol that protects data such as credit card numbers as they are being transmitted between a customer and an online vendor. |
cookie |
This is a type of file that can be stored on your computer for legitimate or illegitimate purposes. |
It is designed to gain access to the system software. |
Which of the following is not a characteristic of a virus? |
WEP |
When setting up your Wi-Fi router, you should use this form of encryption only as a last resort. |
bad or evil |
The mal in malware means _____ in Latin. |
denial-of-service attacks and generating spam |
Which two activities are often undertaken by botnets? |
to steal money and credit card information. |
Scareware scams are primarily used |
adware |
Which type of malware has a related type of software that allows shareware writers to offset the cost of developing their software? |
It does not require the user (the target) to do anything. |
In what way is a worm different from a virus? |
better target advertisements to you. |
Spyware is sometimes used by legitimate websites to track your browsing habits in order to |
a PIN number. |
One form of authentication used by some Bluetooth device manufacturers is |
False |
The typical range for consumer Bluetooth devices is 600 feet. |
electronics standard. |
Bluetooth is a(n) |
disable Bluetooth when not in use. |
One way to protect yourself from risks of Bluetooth devices is to |
a PIN number. |
One form of authentication used by some Bluetooth device manufacturers is |
False |
The typical range for consumer Bluetooth devices is 600 feet. |
a key that matches the one used to encrypt the message |
In symmetric encryption, devices that are designated as legitimate recipients of an encrypted message are give |
Device Manager |
What is the name of Android’s built in find-and-wipe utility? |
turn it off |
What does Chapter 8 advise doing with Bluetooth when you’re not using it? |
tax returns |
Chapter 8 advises you not to post these on cloud services such as OneDrive and Dropbox. |
OneDrive |
Which of the following products or features is not among those mentioned in Chapter 8’s discussion of remote tracking and wiping? |
locks automatically after a period of inactivity |
Chapter 8 advises that you should set a password or passcode on your mobile computer and configure it so that it |
very large prime numbers |
Public and private keys are created using |
cipher text. |
Encoded and unreadable plaintext is called |
both sender and recipient |
With symmetric encryption a cipher is known to |
both a public key and a private key |
Asymmetric encryption uses |
suspicious content or unexpected traffic |
An anomaly based intrusion detection system is a type of IPS that can detect |
phishing scams. |
Chapter 8 discusses social engineers and their involvement in |
authentication |
Spoofing is an attempt to get around _____ systems. |
failover |
The process of redirecting users to a spare server is called |
identify weak spots in their network security |
A honeypot is used by companies to |
battery backup. |
A UPS is a |
authenticate users. |
Chapter 8 discusses the use of biometrics to |
become inefficient or crash. |
A DoS attack typically causes an Internet site to |
False |
A digital certificate contains a company’s private key. |
your browser |
Who or what identifies a secure certificate when you go to a website? |
a hash function |
The author of the file creates a digital signature by running a program known as |
certification authority |
Verisign is an example of a(n) |
hardware only. software only. a combination of hardware and software. |
Firewalls are created by using |
Windows Defender |
Windows 8.1 and Windows 10 install this antivirus software automatically. |
three or more repeating characters. |
Chapter 8 states that strong passwords should not contain |
info 1101
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price