Send a link to your students to track their progress
195 Terms
1
New cards
Personal computer
Which category of computer is generally meant to be used by only one person at time?
2
New cards
E-book readers
Which low-cost devices feature crisp text that is capable of being read in even the brightest outdoor conditions?
3
New cards
supercomputers
NASA uses these to conduct complex modeling and simulations for upcoming missions.
4
New cards
hardware
The physical devices that make up a computer system are called:
5
New cards
computer program
The set of instructions that directs the computer to perform a variety of tasks is known as a(n):
6
New cards
All-in-one computers
Which types of computers have all of the hardware integrated with the monitor?
7
New cards
augmented
In \___________ reality, the real-world is supplemented with computer-generated information
8
New cards
server
A network \___________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.
9
New cards
Convertible
Which laptops allow users to swivel or detach the touchscreen monitor?
10
New cards
Location-based services
Which of the following is a feature on your mobile device that allows the Yelp app to provide a list of restaurants that are close to you?
11
New cards
Google photos
DOES NOT have integration with FB or Insta
12
New cards
Embedded systems
are limited computers because they are placed inside devices which require specific computing functions.
13
New cards
NFC (Near Field Communication)
Using a wireless technology known as \___________ many smartphones can now be tapped on special payment devices to complete your purchase at select stores.
14
New cards
Internet of Things
Which of the following terms refers to normal objects with the ability to connect to wireless networks and the Internet?
15
New cards
autonomous
A(n) \____________ vehicle is a car, truck, or other mode of transportation that is capable performing variety of driving maneuvers without human intervention.
16
New cards
Automation
occurs when computers or machines can perform the work that was once done by a human.
17
New cards
piracy
In the world of computing, \_______ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
18
New cards
Bluetooth
Which of the following is a short-range wireless technology that can connect your smartphone with a wireless headset worn on the ear or the hands-free systems in some cars?
19
New cards
real-time
Mobile devices allow us to access \___________ information such as current traffic conditions for our city and live radar images on a weather app.
20
New cards
automation
We are currently seeing an increase in home \__________where many household activities are being automated or controlled from a distance.
21
New cards
cloud
With \_________ storage services, your files can be stored online and accessed from any Internet-connected device.
22
New cards
Evernote
Which of the following apps would you use if you wanted to create and share a grocery list with your family?
23
New cards
Streaming
media refers to music and movies that are delivered on demand from an online source.
24
New cards
network
A(n) \________ allows users to communicate and share information between computers.
25
New cards
Cloud computing
Which of the following technologies allows you to store your files and use various applications in an online account?
26
New cards
Data
consist of individual facts or pieces of information.
27
New cards
Google
DID NOT transform the smartphone market with the release of revolutionary Nexus in 2007.
28
New cards
false
Copyright protection lasts 20 years after the date of publication or release.
29
New cards
Private browsing
is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
30
New cards
netiquette
The term refers to the set of online behaviors that are considered polite and proper.
31
New cards
Digital divide
refers to the technology gap that exists between different social and economic classes.
32
New cards
FAQ
Many websites have a(n) \_____________ area that should be checked for common questions and their responses.
33
New cards
licensing
It is through \___________ that a copyright holder can grant usage or distribution rights to others.
34
New cards
privacy policy
Online companies typically have a(n) \_________ on their websites that clearly state what information is collected from users and what is done with that information.
35
New cards
footprints
Digital \___________ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
36
New cards
Whistleblowing
is the act of alerting the public about harmful activities that are being hidden by an organization.
37
New cards
true
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
38
New cards
Biotechnology
is an application of biology that uses living organisms to manufacture new products or improve existing ones.
39
New cards
Nanotechnology
involves the creation or manipulation of matter at the smallest possible scale.
40
New cards
Outsourcing
occurs when an organization transfers some aspect of their business to a third party.
41
New cards
Ad-supported streaming
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
42
New cards
Repair
Which of the following words is NOT part of the green computing model?
43
New cards
true
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
44
New cards
true
Creative works such as books, songs, and photographs are protected by copyright law.
45
New cards
Watson
displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
46
New cards
fair use
Copyright law contains an exception known as \__________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
47
New cards
true
Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
48
New cards
false
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
49
New cards
Neural networks
aim(s) to revolutionize Al by asking computers to process data and learn in a manner inspired by the human brain.
50
New cards
Telecommuting
is the process of working for a company without being physically present at the company's office.
51
New cards
false
The sleep mode on a computer generally saves more electricity than hibernate mode.
52
New cards
Trolling
is the act of being annoying and antagonistic in online social interactions.
53
New cards
acceptable use policy
A(n)\__________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
54
New cards
true
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
55
New cards
DRM
Software is sometimes illegally modified in order to disable \__________ technologies such as copy protection and authenticity checks.
56
New cards
Logs
are files that record activities and events on a computer.
57
New cards
NSA
Many government agencies, such as the \__________ monitor the Internet and mobile activities of individuals all the world.
58
New cards
false
In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.
59
New cards
Spyware
is a type of malware which is designed to report activity on your computer to another party.
60
New cards
hacker
Today, a \_________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
61
New cards
false
Social engineering is a form of hacking that has a social or political agenda behind it.
62
New cards
Who you know
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
63
New cards
DDOS
A attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
64
New cards
802.11x
Which of the following is NOT one of the specifications of Wi-Fi technology?
65
New cards
countermeasure
Any step you take to ward off a threat is called a:
66
New cards
Two-factor authentication
is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
67
New cards
false
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
68
New cards
fiber-optic
A \__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
69
New cards
true
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.
70
New cards
switch
A \________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
71
New cards
worm
A \________ is a fully-contained program that self-replicates and spreads through computers and networks.
72
New cards
UPS
When the power fails completely, the battery in a(n) \_________ contains enough power to run a computer system for a given amount of time.
73
New cards
VPN
Because it increases the security of a network connection, a \_______ is often required for users who wish to access a company's private network over an Internet connection.
74
New cards
mesh
Wireless \________ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area.
75
New cards
virus
is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
76
New cards
bandwidth
For modern networks, \________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
77
New cards
surge protector
is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
78
New cards
Big data
We use the term\_________ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.
79
New cards
packets
Data moves through networks structures known as \________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
80
New cards
Trojan horse
A \______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
81
New cards
Phishing
involves luring individuals into entering personal information into a website controlled by the hacker.
82
New cards
backups
Very few countermeasures are as effective as \_________ which can help you recover data that was lost to almost any type of threat.
83
New cards
data analytics
in the field known as \_______ experts use modeling software and statistics to extract knowledge from large volumes of data.
84
New cards
WAN
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) \________ to connect the systems in these two locations.
85
New cards
true
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPS typically provide for Internet connectivity.
86
New cards
scareware
The scam known as \________ typically comes in form of an alert message that claims to be from the FBI or your security software.
87
New cards
MAC
Each device with a NIC contains a unique identifier, known as a(n) \________ address, which distinguishes it from any other network-connected device in the world.
88
New cards
Ethernet
Most network installations use a(n) \________ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
89
New cards
Strong
passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
90
New cards
Botnets
which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
91
New cards
true
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file- sharing services.
92
New cards
access point
A wireless \____________ is the device that all nodes connect to in order communicate wirelessly.
93
New cards
VolP
which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.
94
New cards
bookmarks
If you visit a website or page that you would like to remember for the future, you can add it to your browser's \________ or favorites.
95
New cards
false
The Internet is managed centrally by the United States government, as it was primarily developed in this country.
96
New cards
hashtag
Twitter popularized a system that uses the \_________ symbol to mark keywords or topics in a message.
97
New cards
Cryptocurrency
is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.
98
New cards
attachments
If you want to include a file with your email message, it should be placed in the \_________ area.
99
New cards
crowdfunding
Kickstarter is known as a(n) \__________ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.
100
New cards
sharing
The \_________ economy is an expression that refers to the way in which the Internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.