Advertisement Upgrade to remove ads

T

systems analysts design computer systems to be used within their companies.

F

The external hardware components are located inside the main box or system unit of the computer.

T

Despite efforts, the risk of prosecution, and the risk of accidentally downloading spyware, a computer virus, or a corrupted file when downloading a file from another person's PC, illegal file sharing continues.

F

The Internet is by far one of the most popular and one of the fastest-growing parts of the Web.

F

A computer does not always do whatever the instructions, or program, tell it to do.

T

Computer literacy is the knowing about and understanding computers and their uses.

T

A strategy that is sometimes used with keywords is the wildcard approach.

F

The Fair and Accurate Credit Transactions Act enacted in Dec 2003 enables all Americans to get one credit report per year for a small fee.

T

Unauthorized use involves using a computer resource for unauthorized activities.

T

A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.

F

Fortunately, identity theft is declining and does not pose a real danger to individuals today.

T

Many networks use a network server to manage the data flowing through the network devices and the resources on a network

F

Lack of feedback is a disadvantage of Web-based training and distance learning.

T

To identify a secure Web page, look for a URL that begins with https instead of http

F

Direct Internet connections are much slower than dial-up connections.

F

Wi-Fi security features work by default.

T

Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.

F

Application service providers (ASPs) supply the information that is available through the Internet.

F

Biometric authentication uses information that an individual should know or can easily remember.

T

A firewall is a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.

C

Online shopping and online investing are examples of:
A. online merchandising
B. online marketing
C. e-commerce
D. e-trade

D

__are businesses or other organizations that provide Internet access to others, typically for a fee.
A. application service providers
B. conferencing service providers
C. telephone service providers
D. Internet service providers

C

The term __ refers to the programs or instructions used to tell the computer hardware what to do.
A. hardware
B. port
C. software
D. adapter

B

__is a generic term that refers to any type of malicious software.
A. spamware
B. malware
C. spyware
D. badware

C

__is charged with such responsibilities as IP address allocation and domain name management.
A. National Center for Supercomputing Applications
B. web consortium (W3C)
C. ICANN (internet corporation for assigned names and numbers)
D. Internet society (ISOC)

A

__lines are high-speed (about 1.5 Mbps) dedicated lines that schools and large businesses often lease from the telephone company or an Internet service provider to provide a fast, direct connection to the Internet for the PCs on their networks.
a. T1
b. DSL
c. ISDN
d. Cable

B

A personal computer or __ is a small computer system designed to be used by one person at a time.
a. processor
b. microcomputer
c. microchip
d. small processor

B

__is the term used for any software program that is installed without the user's knowledge and that secretly gathers information about the user and transmits it through his internet connection.
a. malware
b. spyware
c. phishing software
d. adware

B

computer crime is sometimes referred to as __
a. hacking
b. cybercrime
c. cyberstalking
d. spoofing

A

when data is processed into a meaningful form, it becomes
a. information
b. code
c. a program
d. a database

D

__is the most widely used type of home broadband connection, with over 60% of the home broadband market.
a. DSL Internet access
b. fixed wireless internet access
c. mobile wireless internet access
d. cable internet access

B

the most common input devices today are the keyboard and __
a. printer
b. mouse
c. speaker
d. monitor

A

today the standard term for placing telephone calls over any type of data network (including the internet, as well as a lan, wan, or other type of data network) is__
a. VoIP
b. DSL
c. ISDN
d. BoF

D

a booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as__
a. e-cons
b. e-scams
c. dot frauds
d. dot cons

C

the main communications media used as the __ are typically owned by telecommunications companies, such as telephone and cable companies.
a. main internet
b. world net
c. internet backbone
d. super net

C

__are acts of malicious destruction to a computer or computer resource.
a. phishing
b. blocking attacks
c. computer sabotage
d. spoofing

A

a growing number of college campuses have wireles___ on campus that allow students to use their PCs to connect wirelessly...
a. hotspots
b. hotpoints
c. com spots
d. com points

C

__refers to the act of breaking into another computer system.
a. spamming
b. phishing
c. hacking
d. spoofing

B

to contact people using the Internet, you most often use their__
a. domain names
b. e-mail addresses
c. usernames
d. passwords

C

similarly to the way an ip address or domain name uniquely identifies a computer on the internet, a __ uniquely identifies a web page.
a. universal resource identifier
b. web ID
c. uniform resource locator
d. web resource identifier

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set