Advertisement Upgrade to remove ads

Which of the following is not a utility function like the ones shown in the accompanying figure?

controlling the keyboard

A ____ protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment.

surge

he accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.

maintenance

If computer equipment is networked, a single power disturbance can damage multiple systems.

true

____ is a server outside a company's network that controls which communications pass into the company's network.

proxy server

in Windows 7, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file.

image viewer

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions.

firewall

Shrink-wrapped software from major developers does not need to be scanned for infections.

false

As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu.

restart

A ____ boot is the process of using the operating system to restart a computer.

warm

As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

social engineering

Currently, more than ____ Web sites can infect your computer with known viruses, worms, Trojan horses, rootkits, and other malware programs.

300,000

A(n) ____________________ program attempts to remove Internet junk mail like the kind shown in the accompanying figure before it reaches a user's inbox.

anti-spam

____ is a popular stand-alone file compression utility.

PKZIP

Computer ____ are the moral guidelines that govern the use of computers and information systems.

ethics

Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor's screen.

false

Linux is an example of proprietary software, which means that its code is available to the public.

false

As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.

password

Which of the following is NOT an edition of Windows 7?

...

As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.

spam

Encryption is the process of encoding data and information into an unreadable form.

true

Which of the following is an example of a possessed object?

badges and keys

Physical access controls, such as locked doors and windows, usually are adequate to protect computer equipment from hardware theft.

true

____ theft is the act of stealing computer equipment.

hardware

The term, cracker, originally was a complimentary word for a computer enthusiast.

false

Windows ____________________ is Microsoft's fastest, most efficient operating system to date, offering quicker application startup, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities.

7

Many systems implement access controls using a two-phase process called ____.

identification and authentication

A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites

phishing

For visually impaired users, the CAPTCHA text can be read aloud.

true

With a(n) ____________________, you interact with menus and visual images such as buttons and other graphical objects to issue commands.

graphical user interface

With a selective backup, users decide which folders and files to include in a backup.

true

Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

privacy

All networked and online computer users should implement a ____, like the one shown in the accompanying figure.

firewall solution

A ____ has the same intent as a cracker but does not have the technical skills and knowledge.

script kiddie

A ____ is someone who uses e-mail as a vehicle for extortion.

cybdorextortionist

As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

name

Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.

true

Apple's latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.

OS X

____ means the operating system automatically configures new devices as you install them.

plug and play

A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

security

With a ____, users interact with menus and visual images such as buttons and other graphical objects to issue commands.

GUI

The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

virus

With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.

false

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a screen ____, is a utility that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

saver

Companies should review successful access attempts for irregularities.

true

Companies should review successful access attempts for irregularities.

queue

A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.

server

Uncompressing a file is the same as zipping a file.

false

The operating system on most PDAs and small devices, called a(n) ____________________ operating system, resides on a ROM chip.

embedded

In a ____, the user types commands or presses special keys on the keyboard to enter data and instructions.

command line interface

A(n) ____________________ is a program that hides within or looks like a legitimate program.

trojan horse

A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.

cyberterrorist

Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.

theft

Which method of encryption inserts characters between existing characters?

expansion

Any illegal act involving a computer generally is referred to as a ____.

computer crime

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____ utility, identifies computer problems but does not repair them.

diagnostic

Wireless access poses additional security risks.

true

To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.

license

A ____ is a private combination of characters associated with the user name that allows access to certain computer resources.

password

Which of the following is not an example of a biometric device?

smart card

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.

denial of service

To access a wireless network, perpetrators must be in the range of the wireless network.

true

If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.

1 second

Virtual memory is faster than RAM.

false

____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.

phishing

Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.

true

____ occurs when someone steals personal or confidential information.

information theft

A ____ interface controls how you enter data and instructions and how information is displayed on the screen.

user

Windows Embedded CE is designed for use on computing devices with limited functionality.

true

Social engineers can obtain information by ____.

all of the above

Issues with copyright law led to the development of ____________________, a strategy designed to prevent illegal distribution of movies, music, and other digital content.

digital rights management

A(n) ____________________ is a separate area of a hard disk that holds the infected file until the infection can be removed.

quarantine

Palm OS is an example of a stand-alone operating system.

false

As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.

spooling

If you disable cookie use, you will not be able to use many of the e-commerce Web sites.

true

____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.

adware

Multiuser operating systems always process jobs on a first-come, first-served basis.

false

A(n) ____________________ like the one in the accompanying figure is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.

utility

Which of the following is NOT a type of operating system?

wireless

To ____ a file, you restore a zipped file to its original form.

uncompress

opyright law gives the public fair use to copyrighted material.

true

Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory.

false

A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

username

A(n) ____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

biometric

A virus hoax often is in the form of a(n) ____.

chain letter

Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.

false

A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network.

administrator

While waiting for devices to become idle, the operating system places items in buffers.

true

Which of the following is not true of intrusion detection software?

it is inexpensive

All of the following are common ways computers become infected with malware, except ____.

installing from CDROM

Which of the following is not an operating system function?

...

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.

uninstaller

As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.

firewall

Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.

true

Most antivirus programs also protect against worms and Trojan horses.

true

____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.

intrution

Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and access files on the remote computer.

false

An anti-spam program restricts access to certain material on the Web.

false

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access

encryption

When turning on a computer that has been powered off completely, you are performing a(n) ____________________.

cold boot

An encryption key often uses a combination of encryption methods.

true

On mobile devices, the operating system may reside on a RAM chip

false

The term ____ refers to online or Internet-based illegal acts.

cybercrime

The term ____ refers to online or Internet-based illegal acts.

blocker

A person breaking into a computer laboratory and smashing computers is an example of hardware

vandalism

A performance ____ is a program that assesses and reports information about various computer resources and devices.

monitor

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____, is a utility that performs functions related to file management.

manager

____________________ is a scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.

pharming

Spam is a program placed on a computer without the user's knowledge that secretly collects information about the user.

false

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file.

compression

A(n) ____________________ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

virus

A ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.

stand alone

A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

false

Utility programs, like those shown in the accompanying figure, are considered to be application software.

false

____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

antivirus program

A(n) ____ is an operation the processor manages.

task

One drawback of multiprocessing is that it tends to reduce a computer's processing speed.

false

If you attach a new device to a computer, its driver must be installed before you can use the device.

TRUE

Windows 7 is available in several editions, which are grouped in two general categories: Embedded and Personal.

false

Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions.

true

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk scanner, is a utility that removes a program from system files.

false

In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.

macros

____________________ memory is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM.

virtual

Linux is ____________________ software, which means its code is available to the public for use, modification, and redistribution.

open source

A ____ is the destructive event or prank malware is intended to deliver.

payload

A network administrator is a program that monitors network performance.

false

Fragmentation slows down disk access and the performance of the entire computer.

true

Most antivirus programs do not provide updated virus signature files for users.

FALSE

To protect sensitive data and information as it travels over a network, an operating system often ____________________ it.

encrypts

If an antivirus program cannot remove an infection, it often ____.

quarantines the infected file

A(n) ____________________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.

worm

The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files.

cleanup

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

RSI

Software ____________________ is the unauthorized and illegal duplication of copyrighted software.

piracy

In a multitasking environment, many programs run in the foreground, while one program remains in the background.

false

The purpose of memory ____ is to optimize the use of RAM.

management

If a printer does not have its own internal memory or if its memory is full, the operating system's buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed.

true

Compressed files sometimes are called ____ files.

zipped

A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of

information theft

To defragment a disk means to ____.

...

The boot process is similar for large and small computers.

true

____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

spoofing

A(n) ____ is the prolonged malfunction of a computer.

system failure

Electrical power variation is one of the least common causes of system failure.

false

The first version of Windows was developed in the mid-____.

1980s

The operating system determines the order in which tasks are processed.

true

A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of

information theft

The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities.

false

A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

phishing

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set