CS exam 1

systems analysts design computer systems to be used within their companies.
The external hardware components are located inside the main box or system unit of the computer.
Despite efforts, the risk of prosecution, and the risk of accidentally downloading spyware, a computer virus, or a corrupted file when downloading a file from another person’s PC, illegal file sharing continues.
The Internet is by far one of the most popular and one of the fastest-growing parts of the Web.
A computer does not always do whatever the instructions, or program, tell it to do.
Computer literacy is the knowing about and understanding computers and their uses.
A strategy that is sometimes used with keywords is the wildcard approach.
The Fair and Accurate Credit Transactions Act enacted in Dec 2003 enables all Americans to get one credit report per year for a small fee.
Unauthorized use involves using a computer resource for unauthorized activities.
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
Fortunately, identity theft is declining and does not pose a real danger to individuals today.
Many networks use a network server to manage the data flowing through the network devices and the resources on a network
Lack of feedback is a disadvantage of Web-based training and distance learning.
To identify a secure Web page, look for a URL that begins with https instead of http
Direct Internet connections are much slower than dial-up connections.
Wi-Fi security features work by default.
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Application service providers (ASPs) supply the information that is available through the Internet.
Biometric authentication uses information that an individual should know or can easily remember.
A firewall is a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
Online shopping and online investing are examples of:
A. online merchandising
B. online marketing
C. e-commerce
D. e-trade
__are businesses or other organizations that provide Internet access to others, typically for a fee.
A. application service providers
B. conferencing service providers
C. telephone service providers
D. Internet service providers
The term __ refers to the programs or instructions used to tell the computer hardware what to do.
A. hardware
B. port
C. software
D. adapter
__is a generic term that refers to any type of malicious software.
A. spamware
B. malware
C. spyware
D. badware
__is charged with such responsibilities as IP address allocation and domain name management.
A. National Center for Supercomputing Applications
B. web consortium (W3C)
C. ICANN (internet corporation for assigned names and numbers)
D. Internet society (ISOC)
__lines are high-speed (about 1.5 Mbps) dedicated lines that schools and large businesses often lease from the telephone company or an Internet service provider to provide a fast, direct connection to the Internet for the PCs on their networks.
a. T1
b. DSL
d. Cable
A personal computer or __ is a small computer system designed to be used by one person at a time.
a. processor
b. microcomputer
c. microchip
d. small processor
__is the term used for any software program that is installed without the user’s knowledge and that secretly gathers information about the user and transmits it through his internet connection.
a. malware
b. spyware
c. phishing software
d. adware
computer crime is sometimes referred to as __
a. hacking
b. cybercrime
c. cyberstalking
d. spoofing
when data is processed into a meaningful form, it becomes
a. information
b. code
c. a program
d. a database
__is the most widely used type of home broadband connection, with over 60% of the home broadband market.
a. DSL Internet access
b. fixed wireless internet access
c. mobile wireless internet access
d. cable internet access
the most common input devices today are the keyboard and __
a. printer
b. mouse
c. speaker
d. monitor
today the standard term for placing telephone calls over any type of data network (including the internet, as well as a lan, wan, or other type of data network) is__
a. VoIP
b. DSL
d. BoF
a booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as__
a. e-cons
b. e-scams
c. dot frauds
d. dot cons
the main communications media used as the __ are typically owned by telecommunications companies, such as telephone and cable companies.
a. main internet
b. world net
c. internet backbone
d. super net
__are acts of malicious destruction to a computer or computer resource.
a. phishing
b. blocking attacks
c. computer sabotage
d. spoofing
a growing number of college campuses have wireles___ on campus that allow students to use their PCs to connect wirelessly…
a. hotspots
b. hotpoints
c. com spots
d. com points
__refers to the act of breaking into another computer system.
a. spamming
b. phishing
c. hacking
d. spoofing
to contact people using the Internet, you most often use their__
a. domain names
b. e-mail addresses
c. usernames
d. passwords
similarly to the way an ip address or domain name uniquely identifies a computer on the internet, a __ uniquely identifies a web page.
a. universal resource identifier
b. web ID
c. uniform resource locator
d. web resource identifier