1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is an example of how productivity suites can integrate content from one program to another?
including a spreadsheet in a report created with a word processor
A(n) _____ is a small application that cannot run on its own but can be used with other software products.
shared feature
Chapter 5 explains that the use of tabular lists and forms are two ways of viewing _____ in a database software program.
data
Chapter 5 mentions that a mail merge feature is included in many _____ applications.
word processor
In the computer industry, a flaw or failure in software that causes it to malfunction is known as a(n)
bug
In the examples given in Chapter 5, who uses spreadsheets to keep track of sales by customer?
salespeople
iWork is the productivity suite from
Apple.
Microsoft’s Outlook contains contact management features along with a _____ feature.
Calendar Storage and Email All of the choices are correct
Pages is an example of _____ software.
word processor
Presentation software such as Microsoft _____ and _____ for Mac, uses the concept of individual slides that collectively form a slideshow.
PowerPoint; KeyNote
A bandwidth measured at 1 Mbps refers to _____ per second, or _____ bits per second.
1 megabit; 1 million
A client/server network is considered to be a(n) _____ architecture.
distributed application
A network operating system includes programs that
Control the flow of data among clients, Manage individual user accounts, Restrict access to resources All of the choices are correct.
A peer-to-peer network is _____ to design and install, but _____ in a network with heavy user demand.
simple; won’t function well
A ______ joins several nodes together to coordinate message traffic in one LAN.
switch
A(n) _____ is a set of rules for how data is handled as it travels along a communications channel.
network protocol
Chapter 6 cites a forecast that predicts that monthly global mobile data traffic will reach 366.8 _____ by 2020.
exabytes
In network architecture, what does P2P stand for?
peer-to-peer
In Chapter 6, this type of network is described as essentially “a private internet within the company’s walls.”
intranet
This hardware enables the computer without built-in networking capability to connect to the network.
network interface card
Blog is a term derived from what two other words?
web and log
Chapter 7 lists several sites that launched within months of each other as the social networking phenomenon exploded, including each of the following except
Pinterest.
Many media sharing sites use live media streaming, a technology that allows them to send the content over the internet in
live broadcasts.
Online socializing began in the late _____ when services like Usenet appeared.
1970s
Open content is
the ability to freely share knowledge about topics in online collections.
SixDegrees.com was one of the first sites to combine the use of profiles with _____ in one service.
friends lists
Social bookmarking stores website information by using
tags.
Social technologies are primarily used for all of the following except
processing e-commerce transactions.
The media sharing trend began in the late 1990s with MP3 music file sharing through services such as _____ and _____.
apster; Gnutella
Which of the following types of communication exemplifies the social web?
two people messaging each other on Facebook
A computer that is being used by a hacker to perform a malicious task on the internet without the owner’s consent is called a(n)
zombie
A Trojan horse is different from other types of malware in that it
masquerades as a useful program.
A _____ attack targets a corporate system with continuous service requests.
denial-of-service
A _____ is a collection of zombie computers.
botnet
A _____ server is a spare server that can take over server functions in the event of a failure.
cold
A(n) _____ is a robust form of anti-malware program that offers network administrators a set of tools for controlling the system.
IPS
Biometric devices use a _____ to authenticate users.
Voice Face and Fingerprint All of the choices are correct.
Chapter 8 lists three security concerns for IoT devices, including cybercriminals’ attempts to do each of the following except
execute a ransomware attack.
Chapter 8 says this is your first line of defense in protecting your device and data if you travel with a mobile computer.
creating a secure password or passcode
Chapter 8 states that an important part of computer security is DLP, which stands for
data loss prevention.
Collectively, computer programs such as viruses and spyware are called
malware.
Con artists who try to talk employees into giving up corporate secrets or passwords are known as
social engineers.
Encryption is part of _____, which is the study of creating algorithms and codes to protect data.
cryptology
In public key encryption, a public key _____ the data, while a private key _____ the data.
encrypts; decrypts
Malware can be spread in many ways. Which type of malware can be spread by simply connecting your computer to an infected network?
worms
This device provides backup power in the event of an electrical outage.
UPS
This is a file stored on a user’s computer that is read by the browser when the user navigates to a particular website.
cookie
This is the term used to describe a method of authentication where you receive a text message with a code that you type in after you enter your account password.
two-factor authentication
This type of attack occurs when a cybercriminal intercepts login credentials sent by users through an unsecured or poorly secured Wi-Fi hotspot.
man-in-the-middle attack
_____ refers to the practice of sending email that appears to be from a legitimate organization but is really an attempt to scam the user into revealing information.
Phishing