A _____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data to produce information and store the information for future use.
Computer
2
New cards
The basic premise of ___ is that objects can be tagged, tracked, and monitored through a local network or across the internet.
IoT
3
New cards
With _____ an attacker who presents to be from a legitimate research firm asks for personal information.
Pretexting
4
New cards
A company’s computers monitor assembly lines and equipment using _____________ communications to communicate between machines, equipment, and devices to perform tasks.
Machine-to-Machine (M2M)
5
New cards
Use humorous or informal names for your account profiles, blog, or domain name.
False
6
New cards
Electronic components in computers process data using instructions, which are the steps that tell the computer how to perform a particular task.
False
7
New cards
A ____ is anyone who interacts with a computer or mobile device, or utilized the information it generates.
User
8
New cards
______ includes the code of acceptable behaviors users should follow while on the internet.
Netiquette
9
New cards
The internet makes it easier to pirate, copy, or use someone else’s work and claim it as your own.
False
10
New cards
__________ displays scrolling text for dialogue in a video.
captioning software
11
New cards
Web-based training site where students can check their progress in a course, take practice tests, and exchange messages with the instructor or other students
Learning Management System (LMS)
12
New cards
Type of desktop computer that does not contain a tower and instead used the same case to house the display and the processing circuitry.
all-in-one
13
New cards
an environment where processors are embedded in every product imaginable, and the products communicate with one another via the Internet or wireless networks
Internet of Things
14
New cards
a chip that contains a central processing unit
Processor
15
New cards
a document that lists guidelines and repercussions of use of the Internet and other digital company resources, including network storage, and email servers
Acceptable Use Policy
16
New cards
series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them
App
17
New cards
a policy enabling employees to use their personal devices to conduct business
BYOD
18
New cards
a freestanding booth usually placed in a public area that can contain a display device used to show information to the public or event attendees
Kiosk
19
New cards
thin, light-weight mobile computer that has a touch screen
tablet
20
New cards
term that describes the trend of computers and devices with technologies that overlap
convergence
21
New cards
No single person or government agency controls or owns the Internet.
True
22
New cards
______webpages may contain customized content, such as the current date and time of day, desired stock quotes, weather for a region, or ticket availability for flights.
Dynamic
23
New cards
Before you can connect to the Internet, you must identify the network using its _____
service set identifier (SSID)
24
New cards
A ____ is a descriptive text used to categorize media and invite comments.
tag
25
New cards
The “s” in https stands for
Secure
26
New cards
Two uses can have the same email address?
False
27
New cards
A ________ on a social media site provides a listing of the most recent content posted to the network.
new or activity feed
28
New cards
______Â comb the web to find webpages and add new data about them to the database.
crawlers
29
New cards
To broaden a search, you can use a_______ which is the base of a word.
word stem
30
New cards
A ________ gives authors and artists the legal right to sell, publish, or distribute an original work.
copyright
31
New cards
characters, words, or symbols that refine a search
**Boolean operator**
32
New cards
real-time typed conversations by two or more people who are online at the same time
chat
33
New cards
website or web app that gathers, organizes, and then distributes web content
curation website
34
New cards
preferred websites that you can access with a click or selecting an icon from a folder
favorite
35
New cards
portion of a URL that identifies one or more IP addresses
domain name
36
New cards
term used to refer to the major carriers of network traffic
Internet Backbone
37
New cards
descriptive text used to categorize media and invite comments
tag
38
New cards
technique that transforms a smartphone or Internet-capable tablet into a portable communications device that shares its internet access with other computers and devices wirelessly
tethering
39
New cards
computer that delivers requested webpages to your computer or mobile device
web server
40
New cards
a collaborative website where you and your colleagues can modify and publish content on a webpage
wiki
41
New cards
usually require simple hardware and can rely on the operating system’s features to connect to other devices on the network.
smaller networks
42
New cards
Most of today’s Internet connections are
broadband connections
43
New cards
A P2P network typically requires a network administrator
False
44
New cards
For computers and devices to successfully communicate on a network, they ______ to support the same network standards.
have
45
New cards
You can use Bluetooth to establish a ____
PAN
46
New cards
A ______ uses existing standard copper telephone wiring to send and receive digital data.
DSL modem
47
New cards
A _______ is a type of always-on physical connection that is TRUE established between two communications devices.
dedicated line
48
New cards
The number of devices, as well as the operating system or platform on which the devices operate will determine the speed and strength needed to run your wireless network.
True
49
New cards
_________ settings usually can be changed by accessing the wireless router with a browser.
Wireless networkÂ
50
New cards
USENIX developed a code of conduct for program developers.
False
51
New cards
allows users connected to a network to exchange money from one account to another via transmission media
EFT
52
New cards
the method by which computers and devices are physically arranged on a network
topology
53
New cards
third-party business that provides networking services, such as EDI services, secure data and information transfer, storage, or email
Value-Added_Network (VAN)
54
New cards
specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used
network standards
55
New cards
internal network that uses Internet technologies
intranet
56
New cards
connects a network to the Internet
modem
57
New cards
an amplifier used to improve reception
booster
58
New cards
the logical design of all devices on a network
network architecture
59
New cards
a series of numbers and/or letters used to encrypt data sent between devices
wireless network key
60
New cards
common set of rules for exchanging information
protocol
61
New cards
Data travels in and out of the CPU through imbedded wires called a motherboard.
False
62
New cards
____ is information processed into a useful form, such as text, graphics, audio, video, or any combination of these.
Output
63
New cards
_____ is a form of cyberbullying in which documents (doc) are shared digitally that give private or personal information about a people, such as their contact information or medical records.Â
Doxxing
64
New cards
A _____is the smallest unit of time a process can measure.
cycle
65
New cards
_______is an electrical disturbance that can degrade communications.
Noise
66
New cards
A _______ is a test run by a laboratory or other organization to determine processor speed and other performance factors.Â
benchmark
67
New cards
A ________ is a device that maintains power to computer equipment in case of an interruption in the primary electrical source.Â
surge suppressor
68
New cards
_______involves storing electronic files on the internet, not on a local computer.
cloud storage
69
New cards
A ______ is a device that connects two or more networks and directs the flow of information along the networks.
router
70
New cards
The four steps in the __________ are: fetching, decoding, executing, and storing.
machine cycle
71
New cards
memory that loses its power when power is removed
volatile
72
New cards
raw facts, such as text or numbers
data
73
New cards
specifies the design and arrangement of items that you use so that you interact with the items effieciently and safely
ergonomics
74
New cards
determines the speed at which data travels
Bus Width
75
New cards
used to defend equipment form spikes, surges, and noises
surge protectors
76
New cards
a hard drive without moving parts
solid-state drive
77
New cards
often contains toxic metals such as lead or mercury
e-waste
78
New cards
a communications device that connects a communications channel, such as the Internet, to a sending or receiving device, such as a computer
modem
79
New cards
contains many microscopic pathways capable of carrying elecrtical current
integrated circuit
80
New cards
game controller with a handheld vertical lever, mounted on a base, that you move in diffferent directions to control the actions of a simulated vehicle or player
joystick
81
New cards
_______is the software that runs a computer, including the operating system.
System Software
82
New cards
Menus are windows with controls that let you tell the operating system how you want to complete a command.
False
83
New cards
Every program or app, including the operating system, requiresÂ
RAM
84
New cards
AÂ ____Â is an area of memory that stores data and information waiting to be sent to an input or output device.Â
Buff
85
New cards
iOS is an example of a desktop operating system.
False
86
New cards
____ operating systems are distributed online for a monthly subscription or an annual fee.
SaaS
87
New cards
When you save a file, the program or app assigns the _____.
File Extension
88
New cards
A ________ displays the contents of a folder, drive, or device.
Program Window
89
New cards
On a networked computer, such as at your school or workplace, you will not have access to the administrator account.
True
90
New cards
A ______ is a section of a hard disk that functions like a separate disk.Â
Partition
91
New cards
allows an operating system to temporarily store data on a storage medium until it can be “swapped” into RAM
Virtual Memory
92
New cards
the components required to perform work, including the processor, RAM, storage space, and connected devices
Resources
93
New cards
define who can access certain resources and when they can access those resources
Permissions
94
New cards
**enables a computer or device to run another operating system in addition to the one installed**
VM
95
New cards
a special folder that catalogues specific files and folders in a central location
library
96
New cards
will run on newer versions of an operating system
Upward compatible
97
New cards
Linux-based operating system designed to work primarily with web apps
Chrome OS
98
New cards
a type of graphic file
.jpg
99
New cards
the practice of sharing computing resources, such as servers or storage devices, among computers and devices on a network
virtualization
100
New cards
Which of the following is the temporary storage area that holds selections you copy or cut?