Final exam Flashcards

(107 cards)

1
Q

is the most widely used type of home broadband connection, with over half of the home broadband market.

A

Cable Internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

are companies that manage and distribute Web-based software services to customers over the Internet.

A

Application service providers (ASPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

A

Internet2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

A

phrase searching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is

A

VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to any instruction delivered via the Web.

A

Web-based training (WBT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.

A

Field searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One advantage of a dial-up connection is ____.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Online music ____ allow you to purchase and then download music singles and albums to your computer, mobile phone, or portable digital media player.

A

stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she’s away from her computer.

A

online music store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ____ is the most commonly used Internet search type.

A

keyword search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

A

RSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The accompanying figure shows the MSN ____ Web page.

A

portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Direct Internet connections are typically ____ connections.

A

broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.

A

BoF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ are businesses or other organizations that provide Internet access to others, typically for a fee.

A

Internet service providers (ISPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.

A

lack of face-to-face contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.

A

wikis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A

codes of conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

A

Homeland Security Act of 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.

A

the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

includes any acts of malicious destruction to a computer or computer resource.

A

Computer sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
bot
26
____ is a generic term that refers to any type of malicious software.
Malware
27
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.
EV
28
When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature.
public
29
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
dot cons
30
Like a computer virus, a ____ is a malicious program designed to cause damage
computer worm
31
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
Wi-Fi piggybacking
32
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
war driving
33
____ software can control which devices can be connected to an employee’s computer.
Data-leakage prevention
34
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
firewall
35
____ refers to the act of breaking into a computer or network.
hacking
36
___, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Passwords
37
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
typosquatting
38
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access
firewall
39
Repeated threats or other harassment carried out online between adults is referred to as ____.
cyberstalking
40
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
FDE
41
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.
encrypted
42
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
Antispyware software
43
Before providing any personal information on a shopping site, Samuel always reads the Web site’s ____.
privacy policy
44
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
security slot
45
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
proximity cards
46
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
Video surveillance
47
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
CAN-SPAM act
48
By ____, you instruct companies you do business with that they cannot share your personal data with third parties
opting out
49
____ devices are designed to withstand much more physical abuse than conventional devices.
Ruggedized
50
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.
Computer monitoring software
51
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
Cable locks
52
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
privacy policy
53
In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
throw-away
54
Collecting in-depth information about an individual is known as ____.
electronic profiling
55
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
7 to 10 years
56
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
throw-away e-mail address
57
To supplement backup procedures, businesses and other organizations should have a(n) ____.
disaster recovery plan
58
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
patches
59
A screen reader is a ____ program that reads aloud all information displayed on the computer screen, such as instructions, menu options, documents, and Web pages.
software
60
Carpal tunnel syndrome (CTS), ____ tendonitis, and other types of repetitive stress injuries (RSIs) are common physical ailments related to computer use.
DeQuervain’s
61
Solar panels are being designed to be built into the ____ of notebook computers, and both solar-powered and hand-powered chargers are available for use with portable computers, mobile phones, and other small portable devices.
covers
62
____ is increasingly being tied to crime and even death in some countries
Internet addiction
63
The most significant recent legislation regarding accessibility has been the 1998 amendment to the Rehabilitation Act requiring federal agencies to make their electronic and information technology accessible to people with disabilities. This act applies to all federal Web sites, as well, creating a trend of Web sites that are Section ____ compliant
508
64
The primary reason(s) for exporting e-waste is
cost and U.S. states are increasingly banning dangerous computing equipment from landfills
65
Solar panels that cover most of the rooftops at Google’s Mountain View, California, headquarters power ____ of the energy needs for that complex.
30%
66
Which of the following is NOT true of EPDs?
They require a backlight.
67
The doctor advises Jill that the proper user position is to sit straight with shoulders back, about ____ inches away from the monitor; keep forearms, wrists, and hands straight; keep forearms and thighs parallel to the floor.
24
68
The stress of keeping up with ever-changing technology, layoffs, always being in touch, fear of being out of touch, information overload, and ____ are all possible emotional problems related to computer use.
burnout
69
A condition known as ____ has been linked to the arm fatigue associated with the prolonged use of a touch screen.
gorilla arm
70
In the United States, ____ refurbishes donated computers and sends them free of charge to families of U.S. military personnel deployed overseas, who use the PCs to communicate with the soldiers via e-mail.
Operation Homelink
71
The term ____ refers to the use of computers in an environmentally friendly manner.
“green computing”
72
An emotional health concern related to computer use is ____.
computer/Internet addiction
73
According to an AT&T study, ____ of commuters admits to sending text messages while driving.
49%
74
The doctor suggest that when Jill is programming she should use a tilt-and-swivel monitor which will adjust for a comfortable viewing angle. The doctor advises that the top of screen should be no higher than ____ above the user’s eyes.
3 inches
75
_ is an example of an assistive output device.
Screen reader software
76
To encourage the development of energy-saving devices, the Environmental Protection Agency (EPA) developed the ____ program.
ENERGY STAR
77
To prevent a sore or stiff neck,
place the monitor directly in front of you
78
The Basal _____ Network has worked with industry leaders to create the eStewards Certification program, which is designed to help individuals and organizations locate responsible recyclers.
action
79
To record data, holographic storage systems split the light from a blue laser beam into two beams–a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.
reference
80
____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty.
DARPA
81
In her presentation, Sam explains that, to record data, holographic storage systems split the light from a blue laser beam into two beams, and that it is the ____ beam whose angle determines the address used to store data at that particular location on the storage medium.
reference
82
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM), which translates the data’s 0s and 1s into a hologram.
spatial
83
In general, Wi-Fi is designed for data transfers between ____ feet indoors.
100 and 300
84
Telesurgery is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient, and which typically uses ____ to give the human surgeon an extremely close view of the surgical area.
cameras
85
A __________ usually projects the image from a mobile device to a display screen built into the glasses via a wireless connection.
wearable display
86
Self-driving cars, like Google's autonomous cars, are essentially
robotic cars
87
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents.
semantic
88
One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ videoconferencing.
telepresence
89
Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.
electrical
90
____ mobile payments use RFID to facilitate communication between devices, including transferring payment information, receipts, boarding passes, and other information wirelessly between payment terminals and mobile phones.
Near Field Communication (NFC)
91
Privacy-rights advocates worry that the ____ could someday be used by the government to track citizens.
VeriChip
92
Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.
silicon
93
Today’s holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from 300 GB to ____ GB per cartridge.
500
94
____ chips have a special coating that changes its physical state when heat is applied.
PRAM
95
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.
author
96
A(n) ____ is a collection of an individual’s work accessible through a Web site.
E-portfolio
97
____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.
RSS
98
____ is charged with such responsibilities as IP address allocation and domain name management.
ICANN (Internet Corporation for Assigned Names and Numbers)
99
Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box.
Internet options
100
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
101
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.
Third-party
102
Conventional dial-up connects to the Internet at a maximum of ____.
56 Kbps
103
Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she’s away from her computer.
online music store
104
____ limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.
field searches
105
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other
ARPANET
106
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators
lack of face-to-face contact
107
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify
online portfolio