CS 1 Exam 1 Key

The external hardware components are located inside the main box or system unit of the computer.
To identify a secure Web page, look for a URL that begins with https instead of http.
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
Application service providers (ASPs) supply the information that is available through the Internet.
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
Small office networks enable workers to access company records stored on a network server.
Fixed wireless Internet access is similar to satellite Internet in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
Lack of feedback is a disadvantage of Web-based training and distance learning.
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
A computer does not always do whatever the instructions, or program, tell it to do.
Like a computer virus, a computer worm infects other computer files to replicate itself.
The use of cookies provides no benefits to consumers.
Storage devices are hardware used to store data or or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as “users.”
Direct Internet connections are much slower than dial-up connections.
Denial of service attacks are usually of insignificant cost in terms of business lost.
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
Computer literacy is knowing about and understanding computers and their uses.
Fortunately, identify theft is declining and poses a much smaller danger to individuals today.
Biometric authentication uses information that an individual should know or can easily remember.
The primary infrastructure that makes up the ___ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
___ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets and managing inventory.
Application software
___ is a consortium of researchers, educators and technology leaders from industry, government , and the international community that is dedicated to the development of revolutionary Internet technologies.
A booming area of computer crime involves online fraud, theft, scams and related activities collectively referred to as ___.
dot cons
Computer crime is sometimes referred to as ___.
Online shopping and online investing are examples of ___.
___ is charged with such responsibilities as IP address allocation and domain name management,
ICANN ( Internet Corporation for Assigned names and Numbers)
A growing number of college campuses have wireless ___ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
When data is processed into a meaningful form, it becomes ___.
A personal computer or ___ is a small computer system designed to be used by one person at a time.
A ___ is a malicious program that masquerades as something else – usually some type of application program.
Trojan horse
___ refers to the act of breaking into a computer or network.
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ___ uniquely identifies a Web page.
uniform resource locator (URL)
___ is an online news tool designed for facilitating the delivery of news articles podcasts, and other content regularly published to a Web site.
A (n) ___ is a medium-sized computer used to host programs and data for a small network.
midrange server
___ includes any acts of malicious destruction to a computer or computer resource.
Computer sabotage
Common input devices include the keyboard and ___.
A (n) ___ is a collection of an individual’s work accessible through a Web site.
___ refers to any instruction delivered via the website.
Web-based training (WBT)
A ___ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
virtual private network