Concepts Exam #3 Flashcards
(36 cards)
The abuse of an email system to arbitrarily send millions of unsolicited bulk messages is called ____________.
Spamming
The M in CPM stands for _______.
Mile, Cost per Mile
A ____________ is specialized hardware and software working together to ensure that public networks like the Internet cannot access private networks like an Intranet.
Firewall
A(n) _____ represents a value that can change.
Variable
A form of malware where a perpetrator logs onto a computer workstation and installs a program that records every keystroke made at the workstation’s keyboard in order to breach the workstation’s security.
Keylogging
The HTML tag: <span style=”color: #ff0000;”>
will make the text change color. The ff0000 represents the binary equivalent of the color’s RGB values.
False
One example of a knowledge worker is a DBA, someone with special skills or knowledge on a particular job or topic. T/F
False
A __________ is a mechanism that helps a Web server track and maintain specific information about a user’s activities; stored in a text file on the local computer’s hard disk.
Cookie
______ elements can become hyperlinks and allow for webpage navigation.
Link
Hal needs to create a formula that multiplies the contents of cell B7 by the contents of cell C1. The correct way for Hal to enter this formula is ______.
=B7*C1
A formula begins with _____.
=
STEM is the acronym for _________.
Science, Technology, Engineering, and Math
The programmed instruction that tell the computer to repeat one or more instructions until a certain condition is met is referred to as a ________.
loop
A Denial-of-service is an attempt to make a computer or any of its resources unavailable to its intended users. T/F
False
A harmless or interesting program that, when executed, unleashes harmful viruses into a user’s system is known as a _________.
Trojan Horse
A spreadsheet can examine several alternative _____ scenarios.
???
The <ul> element defines display and alignment of a _________.
bulleted list
To create a formula, you should use _______ instead of the actual numbers.
Cell references
HTML is the acronym for _________.
Hypertext markup language
A website style that generates a web page directly from the server depending on the context of the user is called a _______.
Dynamic Website
Which IT job is the highest paid?
CIO
The concept of using web browser application software for viewing and working with data is sometimes referred to as utilizing a thin client. T/F
True
If testing a program does not produce the expected results, the program contains an error, sometimes called a ______.
Bug
A self-replicating program that can send copies of itself to other computers on a network without any user participation or knowledge is called a _________.
Worm