Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
CL exam 2
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (82)
Usually does not have advanced computer and technical skills
=script kiddie
A group of compromised computer
= botnet
A program that restricts access to specified websites
= web filtering software
Most systems require that a user selects this on his or her own
= password
The owner of this kind of computer is unaware that it is being controlled remotely by an outsider
= zombie
An authorized person or company that issues and verifies digital certificates
=CA
Any event or action that could cause a loss of or damage to computer or mobile device hardware
= digital security risk
In the encryption process, the unencrypted, readable data
= plain text
In the encryption process, the encrypted, ( scrambled ) data
= ciphertext
Protects a network's resources from intrusion
= firewall
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
= digital signature
Protects any tangible form of expression
= copyright
A common infringement of copyright
= privacy
A notice that guarantees a user or website is legitimate
= digital certificate
A program that performs a repetitive task on a network
= bot
A scam in which a button or link on a website contains malicious program
= clickjacking
Biometric device used in high security areas
= iris recognition system
Makes it illegal to circumvent antipiracy schemes in commercial software
= Digital Millennium Copyright Act (DCMA)
Outlines the activities for which a computer or network may and may not be used
= AUP
An assault whose purpose is to disrupt computer access to an Internet service
= DoS attack
The term, PIN, is an acronym for which of the following?
= personal identification number
A(n) _______ is a placeholder for data whose contents can change.
field
The term CAPTCHA is ________________.
= a series of distorted characters that a user is required to enter correctly to continue using a website
A tag is an identifier that links a(n) _____ to a source
citation
Footnote text is ____.
=single-spaced, left-aligned, and a smaller font size than the text in the research paper
By default, the Normal style inserts a vertical space equal to _____ line(s) between each line of text.
1.08
Each time the ______key is pressed, the paragraph formatting in the previous paragraph is carried forward to the next paragraph.
ENTER
A(n) _________ objects is an object that is part of a paragraph.
inline (written)
A thesaurus can be used to look up a(n) _______, or a word similar in meaning to a given word.
synonym
Although you can use a dialog box to indent paragraphs, Word provides a quicker way through the _______.
horizontal ruler
In order to safeguard your personal information, which of the following is recommended ?
= Clear your history file when you are finished browsing
An entire table can be resized by dragging the __________, which is a small square that displays when pointing to a corner of a table.
table resize handle (written)
A(n) ___________ object is an object that can be positioned at a specific location in a document or in a layer over or behind text in a document.
= floating (written)
According to the MLA style, the _____ is a list of sources that are referenced directly in a research paper.
= work cited page
Headers print in the top margin ____ inch from the top of every page.
one-half
Consist of the original article and all subsequent related replies
= thread
One million characters
= megabyte
Uses the internet instead of the public switched telephone network to connect a party to one or more called parties
= VoIP
One billion characters
= gigabyte
When a message is sent to one of these, every person on the list receives a copy of the message in his or her mailbox.
= email list
To add your email name and address to a mailing list , do this
= subscribe
Many operating systems include these capabilities
= FTP
Your Internet service provider supplies this, for an email address
= domain name
The appearance of motion created by displaying a series of still images in sequence.
= animation
Particularly helpful in locating webpages about certain topics or in locating specific pages for which a user does not know the exact web address
= search engines
Its goal is to develop and test advanced technologies that will benefit Internet users in the future
= Internet2
Kind of network that uses radio signals to provide high-speed Internet connections through a telephone network via a DSL modern
= Wi-Fi
Type of broadband Internet service that uses fiber-optic cable to provides high-speed Internet access to home and business users
= FTTP
Type of broadband connection the provides high-speed Internet connections through a telephone network via a DSL modern
= DSL
Oversees research and sets standards and guidelines for many areas of the internet
= W3C
A business that provides individuals and organizations access to the internet free or for a fee
= access provider
Any computer that provides services and connections to other computers on a network
= servers
Provides high speed Internet connections using a dish-shaped antenna on a building to communicate with a lower location via radio signals
= fixed wireless
Transforms a smartphone or Internet-capable tablet into a portable communication device that shares its Internet access with other computers and devices wirelessly
= tethering
A number that uniquely identifies each computer or device connected to the Internet
= IP address
A(n) ____ is a book of synonyms.
thesaurus
A word __________ is a collection of rows and columns.
table (written)
Each cell in a Word table has a(n) _____________, which is a formatting mark that assist with selecting and formatting cells.
= end-of-cell mark (written)
A(n) ____________ is a location on the horizontal ruler that tells Word where to position the insertion point when you press the TAB key on the keyboard.
tab stop (written)
What occurs when someone steals personal or confidential information ?
information theft
By default, the Normal style places _____ points of blank space after each paragraph.
8
Having a current knowledge and understanding of computers and related technologies
= digital literacy ( f )
Thin, lightweight mobile computer with a screen in its lid and a keyboard in its base
= laptop ( o )
A thin, lightweight mobile computer with a touch screen
= tablet ( n )
An electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use.
= computer ( m )
A personal computer designed to be in a stationary location
= desktop ( p )
A computer dedicated to providing one or more services to other computers or devices on a network
= server ( k )
A computing device small enough to hold in hand
= mobile device ( l )
An internet-capable phone that usually also includes a calendar, an appointment book, and address book, a calculator, notepad, games, and several other apps.
= smartphones ( h )
Any hardware component that allows you to enter data and instructions into a computer or mobile device
= input device ( j )
Any hardware component that conveys information from a computer or mobile device to one or more people
= output device ( i )
Where a computer keeps data, instructions and information
= storage media ( a )
Removable flash memory
= memory card ( s )
A worldwide collection of computer networks that connects millions of business, government agencies, educational institutions, and individuals
= Internet ( t )
One of the more widely used Internet Services
= World Wide Web ( r)
A storage device that typically uses flash memory to store data, instructions, and information
= solid-state drive (b)
A named collection of stored data, instructions, or information
= file ( d )
A website that encourages members to share their interest, ideas, stories, photos, music, and videos with other users
= online social network ( q )
A series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them
= program ( c )
Software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
= search engine ( p )
Software that enables users with an internet connection to access and view webpages on a computer or mobile device
= browser ( e )
A digital forensics examiner must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, and the like.
= true
Other sets by this creator
fa 21 Restrictive and vascular pulmonary disorders
15 terms
fa 21 obstructive pulmonary disorders
15 terms
fa 20
15 terms
203 ati
10 terms
Other Quizlet sets
permit
62 terms
NASM Quiz Q's 7th Edition
51 terms
Religion Chapter 3
43 terms
Radiculopathies
19 terms