CIS 149 Final Exam Study Set Chapters 5-8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Which of the following is an example of how productivity suites can integrate content from one program to another?

including a spreadsheet in a report created with a word processor

2
New cards

A(n) _____ is a small application that cannot run on its own but can be used with other software products.

shared feature

3
New cards

Chapter 5 explains that the use of tabular lists and forms are two ways of viewing _____ in a database software program.

data

4
New cards

Chapter 5 mentions that a mail merge feature is included in many _____ applications.

word processor

5
New cards

In the computer industry, a flaw or failure in software that causes it to malfunction is known as a(n)

bug

6
New cards

In the examples given in Chapter 5, who uses spreadsheets to keep track of sales by customer?

salespeople

7
New cards

iWork is the productivity suite from

Apple.

8
New cards

Microsoft’s Outlook contains contact management features along with a _____ feature.

Calendar Storage and Email All of the choices are correct

9
New cards

Pages is an example of _____ software.

word processor

10
New cards

Presentation software such as Microsoft _____ and _____ for Mac, uses the concept of individual slides that collectively form a slideshow.

PowerPoint; KeyNote

11
New cards

A bandwidth measured at 1 Mbps refers to _____ per second, or _____ bits per second.

1 megabit; 1 million

12
New cards

A client/server network is considered to be a(n) _____ architecture.

distributed application

13
New cards

A network operating system includes programs that

Control the flow of data among clients, Manage individual user accounts, Restrict access to resources All of the choices are correct.

14
New cards

A peer-to-peer network is _____ to design and install, but _____ in a network with heavy user demand.

simple; won’t function well

15
New cards

A ______ joins several nodes together to coordinate message traffic in one LAN.

switch

16
New cards

A(n) _____ is a set of rules for how data is handled as it travels along a communications channel.

network protocol

17
New cards

Chapter 6 cites a forecast that predicts that monthly global mobile data traffic will reach 366.8 _____ by 2020.

exabytes

18
New cards

In network architecture, what does P2P stand for?

peer-to-peer

19
New cards

In Chapter 6, this type of network is described as essentially “a private internet within the company’s walls.”

intranet

20
New cards

This hardware enables the computer without built-in networking capability to connect to the network.

network interface card

21
New cards

Blog is a term derived from what two other words?

web and log

22
New cards

Chapter 7 lists several sites that launched within months of each other as the social networking phenomenon exploded, including each of the following except

Pinterest.

23
New cards

Many media sharing sites use live media streaming, a technology that allows them to send the content over the internet in

live broadcasts.

24
New cards

Online socializing began in the late _____ when services like Usenet appeared.

1970s

25
New cards

 Open content is 

the ability to freely share knowledge about topics in online collections.

26
New cards

SixDegrees.com was one of the first sites to combine the use of profiles with _____ in one service.

friends lists

27
New cards

Social bookmarking stores website information by using

tags.

28
New cards

Social technologies are primarily used for all of the following except

processing e-commerce transactions.

29
New cards

The media sharing trend began in the late 1990s with MP3 music file sharing through services such as _____ and _____.

apster; Gnutella

30
New cards

Which of the following types of communication exemplifies the social web?

two people messaging each other on Facebook

31
New cards

A computer that is being used by a hacker to perform a malicious task on the internet without the owner’s consent is called a(n)

zombie

32
New cards

A Trojan horse is different from other types of malware in that it

masquerades as a useful program.

33
New cards

A _____ attack targets a corporate system with continuous service requests.

denial-of-service

34
New cards

A _____ is a collection of zombie computers.

botnet

35
New cards

A _____ server is a spare server that can take over server functions in the event of a failure.

cold

36
New cards

A(n) _____ is a robust form of anti-malware program that offers network administrators a set of tools for controlling the system.

IPS

37
New cards

Biometric devices use a _____ to authenticate users.

Voice Face and Fingerprint All of the choices are correct.

38
New cards

Chapter 8 lists three security concerns for IoT devices, including cybercriminals’ attempts to do each of the following except

execute a ransomware attack.

39
New cards

Chapter 8 says this is your first line of defense in protecting your device and data if you travel with a mobile computer.

creating a secure password or passcode

40
New cards

Chapter 8 states that an important part of computer security is DLP, which stands for

data loss prevention.

41
New cards

Collectively, computer programs such as viruses and spyware are called

malware.

42
New cards

Con artists who try to talk employees into giving up corporate secrets or passwords are known as

social engineers.

43
New cards

Encryption is part of _____, which is the study of creating algorithms and codes to protect data.

cryptology

44
New cards

In public key encryption, a public key _____ the data, while a private key _____ the data.

encrypts; decrypts

45
New cards

Malware can be spread in many ways. Which type of malware can be spread by simply connecting your computer to an infected network?

worms

46
New cards

This device provides backup power in the event of an electrical outage.

UPS

47
New cards

This is a file stored on a user’s computer that is read by the browser when the user navigates to a particular website.

cookie

48
New cards

This is the term used to describe a method of authentication where you receive a text message with a code that you type in after you enter your account password.

two-factor authentication

49
New cards

This type of attack occurs when a cybercriminal intercepts login credentials sent by users through an unsecured or poorly secured Wi-Fi hotspot.

man-in-the-middle attack

50
New cards

_____ refers to the practice of sending email that appears to be from a legitimate organization but is really an attempt to scam the user into revealing information.

Phishing