How can we help?

You can also find more resources in our Help Center.

Computer Prt II

STUDY
PLAY
Which of the following is not a utility function like the ones shown in the accompanying figure?
controlling the keyboard
A ____ protector uses special electrical components to provide a stable current flow to the computer and other electronic equipment.
surge
he accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal computer ____ utility, identifies and fixes operating system problems, detects and repairs disk problems, and includes the capability of improving a computer's performance.
maintenance
If computer equipment is networked, a single power disturbance can damage multiple systems.
true
____ is a server outside a company's network that controls which communications pass into the company's network.
proxy server
in Windows 7, a(n) ____, is a utility that allows users to display, copy, and print the contents of a graphics file.
image viewer
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a personal ____, is a utility that detects and protects a personal computer from unauthorized intrusions.
firewall
Shrink-wrapped software from major developers does not need to be scanned for infections.
false
As shown in the accompanying figure, to perform a warm boot, click the ____ command in the Shut down button menu.
restart
A ____ boot is the process of using the operating system to restart a computer.
warm
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
social engineering
Currently, more than ____ Web sites can infect your computer with known viruses, worms, Trojan horses, rootkits, and other malware programs.
300,000
A(n) ____________________ program attempts to remove Internet junk mail like the kind shown in the accompanying figure before it reaches a user's inbox.
anti-spam
____ is a popular stand-alone file compression utility.
PKZIP
Computer ____ are the moral guidelines that govern the use of computers and information systems.
ethics
Screen savers originally were developed to prevent a problem called etching, in which images could be permanently etched on a monitor's screen.
false
Linux is an example of proprietary software, which means that its code is available to the public.
false
As shown in the accompanying figure, many Web sites require a user to enter a ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.
password
Which of the following is NOT an edition of Windows 7?
...
As shown in the accompanying figure, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.
spam
Encryption is the process of encoding data and information into an unreadable form.
true
Which of the following is an example of a possessed object?
badges and keys
Physical access controls, such as locked doors and windows, usually are adequate to protect computer equipment from hardware theft.
true
____ theft is the act of stealing computer equipment.
hardware
The term, cracker, originally was a complimentary word for a computer enthusiast.
false
Windows ____________________ is Microsoft's fastest, most efficient operating system to date, offering quicker application startup, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities.
7
Many systems implement access controls using a two-phase process called ____.
identification and authentication
A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites
phishing
For visually impaired users, the CAPTCHA text can be read aloud.
true
With a(n) ____________________, you interact with menus and visual images such as buttons and other graphical objects to issue commands.
graphical user interface
With a selective backup, users decide which folders and files to include in a backup.
true
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
privacy
All networked and online computer users should implement a ____, like the one shown in the accompanying figure.
firewall solution
A ____ has the same intent as a cracker but does not have the technical skills and knowledge.
script kiddie
A ____ is someone who uses e-mail as a vehicle for extortion.
cybdorextortionist
As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
name
Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.
true
Apple's latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
OS X
____ means the operating system automatically configures new devices as you install them.
plug and play
A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
security
With a ____, users interact with menus and visual images such as buttons and other graphical objects to issue commands.
GUI
The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
virus
With a license agreement, like the one shown in the accompanying figure, the user becomes the owner of the software.
false
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a screen ____, is a utility that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.
saver
Companies should review successful access attempts for irregularities.
true
Companies should review successful access attempts for irregularities.
queue
A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.
server
Uncompressing a file is the same as zipping a file.
false
The operating system on most PDAs and small devices, called a(n) ____________________ operating system, resides on a ROM chip.
embedded
In a ____, the user types commands or presses special keys on the keyboard to enter data and instructions.
command line interface
A(n) ____________________ is a program that hides within or looks like a legitimate program.
trojan horse
A ____ is someone who uses the Internet or network to destroy or damage computers for political reasons.
cyberterrorist
Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.
theft
Which method of encryption inserts characters between existing characters?
expansion
Any illegal act involving a computer generally is referred to as a ____.
computer crime
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____ utility, identifies computer problems but does not repair them.
diagnostic
Wireless access poses additional security risks.
true
To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.
license
A ____ is a private combination of characters associated with the user name that allows access to certain computer resources.
password
Which of the following is not an example of a biometric device?
smart card
A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
denial of service
To access a wireless network, perpetrators must be in the range of the wireless network.
true
If a password used on a site like the one shown in the accompanying figure is 4 characters long, the average time it would take a computer to discover the password is ____.
1 second
Virtual memory is faster than RAM.
false
____ is a scam in which a perpetrator attempts to obtain your personal and/or financial information.
phishing
Hackers use computer automated tools to assist them with guessing passwords, like the one shown in the accompanying figure.
true
____ occurs when someone steals personal or confidential information.
information theft
A ____ interface controls how you enter data and instructions and how information is displayed on the screen.
user
Windows Embedded CE is designed for use on computing devices with limited functionality.
true
Social engineers can obtain information by ____.
all of the above
Issues with copyright law led to the development of ____________________, a strategy designed to prevent illegal distribution of movies, music, and other digital content.
digital rights management
A(n) ____________________ is a separate area of a hard disk that holds the infected file until the infection can be removed.
quarantine
Palm OS is an example of a stand-alone operating system.
false
As illustrated in the accompanying figure, the process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.
spooling
If you disable cookie use, you will not be able to use many of the e-commerce Web sites.
true
____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
adware
Multiuser operating systems always process jobs on a first-come, first-served basis.
false
A(n) ____________________ like the one in the accompanying figure is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
utility
Which of the following is NOT a type of operating system?
wireless
To ____ a file, you restore a zipped file to its original form.
uncompress
opyright law gives the public fair use to copyrighted material.
true
Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory.
false
A ____ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
username
A(n) ____ device, like the one in the accompanying figure, authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
biometric
A virus hoax often is in the form of a(n) ____.
chain letter
Software users with a EULA, like the one in the accompanying figure, may make as many backup copies of the software as they want.
false
A network ____, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network.
administrator
While waiting for devices to become idle, the operating system places items in buffers.
true
Which of the following is not true of intrusion detection software?
it is inexpensive
All of the following are common ways computers become infected with malware, except ____.
installing from CDROM
Which of the following is not an operating system function?
...
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a(n) ____, is a utility that removes a program, as well as any associated entries in the system files.
uninstaller
As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.
firewall
Some operating systems, such as Windows, include personal firewalls, like the ones shown in the accompanying figure.
true
Most antivirus programs also protect against worms and Trojan horses.
true
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in the accompanying figure.
intrution
Once a Trojan horse is installed, its author can execute programs, change settings, monitor activity, and access files on the remote computer.
false
An anti-spam program restricts access to certain material on the Web.
false
____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access
encryption
When turning on a computer that has been powered off completely, you are performing a(n) ____________________.
cold boot
An encryption key often uses a combination of encryption methods.
true
On mobile devices, the operating system may reside on a RAM chip
false
The term ____ refers to online or Internet-based illegal acts.
cybercrime
The term ____ refers to online or Internet-based illegal acts.
blocker
A person breaking into a computer laboratory and smashing computers is an example of hardware
vandalism
A performance ____ is a program that assesses and reports information about various computer resources and devices.
monitor
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____, is a utility that performs functions related to file management.
manager
____________________ is a scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
pharming
Spam is a program placed on a computer without the user's knowledge that secretly collects information about the user.
false
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a file ____ utility, shrinks the size of a file.
compression
A(n) ____________________ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
virus
A ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.
stand alone
A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
false
Utility programs, like those shown in the accompanying figure, are considered to be application software.
false
____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
antivirus program
A(n) ____ is an operation the processor manages.
task
One drawback of multiprocessing is that it tends to reduce a computer's processing speed.
false
If you attach a new device to a computer, its driver must be installed before you can use the device.
TRUE
Windows 7 is available in several editions, which are grouped in two general categories: Embedded and Personal.
false
Some operating systems include a built-in firewall to protect the computer from unauthorized intrusions.
true
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk scanner, is a utility that removes a program from system files.
false
In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.
macros
____________________ memory is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM.
virtual
Linux is ____________________ software, which means its code is available to the public for use, modification, and redistribution.
open source
A ____ is the destructive event or prank malware is intended to deliver.
payload
A network administrator is a program that monitors network performance.
false
Fragmentation slows down disk access and the performance of the entire computer.
true
Most antivirus programs do not provide updated virus signature files for users.
FALSE
To protect sensitive data and information as it travels over a network, an operating system often ____________________ it.
encrypts
If an antivirus program cannot remove an infection, it often ____.
quarantines the infected file
A(n) ____________________ is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.
worm
The accompanying figure lists a few of the utilities available in Windows 7; one of the utilities available in Windows 7, a disk ____ utility searches for and removes unnecessary files.
cleanup
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
RSI
Software ____________________ is the unauthorized and illegal duplication of copyrighted software.
piracy
In a multitasking environment, many programs run in the foreground, while one program remains in the background.
false
The purpose of memory ____ is to optimize the use of RAM.
management
If a printer does not have its own internal memory or if its memory is full, the operating system's buffer holds the information waiting to print while the printer prints from the buffer at its own rate of speed.
true
Compressed files sometimes are called ____ files.
zipped
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of
information theft
To defragment a disk means to ____.
...
The boot process is similar for large and small computers.
true
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
spoofing
A(n) ____ is the prolonged malfunction of a computer.
system failure
Electrical power variation is one of the least common causes of system failure.
false
The first version of Windows was developed in the mid-____.
1980s
The operating system determines the order in which tasks are processed.
true
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of
information theft
The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities.
false
A(n) ____ filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.
phishing
To defragment a disk means to ____.
reorganize it