How can we help?

You can also find more resources in our Help Center.

Computers Test 2

STUDY
PLAY
With ____ users type or send short messages on a mobile device
SMS
This is a coffee house or restraint that provides internet to its customers
cyber café
A type of communications device that connects the device to the communications channel
modem
A file server does what?
stores and manages files
A collection of data organized in a manner that controls access to that data
data base
This type of language consists of simple English like statements to specify to print or store
query language
This type of cable consist of one or more twisted pair wires bundled together
twisted pair cable
The amount of data instruction and info that can travel over a communications channel is called_________
the band width
This type of backup is a backup plan in which all data is backed up when a change is made
continuous back up
A check out clerk with this type of privileges to the email accounts in a discount warehouse data base could view them but not change them
read only access
This is processed data that is organized and useful
information
A measure of how well compute hardware or software can grow to meet increasing performance demands
scale ability
Validation ___ reduce data entry errors
rules
This type of data base stores documents such as schedules, calendars, manuals, memos, and reports
brute ware
To make collaboration possible among employees uses a document ____ system
management
A computer ___ risk is any action that can cause a loss of info, etc
security
Software___ is the unauthorized and illegal duplication of software
piracy
A personal ____ is a utility program that protects a personal computer from un authorized access
personal firewall
A system ___ is the prolonged malfunction of a computer
failure
Up-time is a measure of what?
availability
Sometimes a company uses a ____ which allows customers or suppliers access to part of its intra-net
extra-net
An applied science devoted to incorporating comfort, efficiency and comfort into design of the work place
ergonomics
This type of server as a complete computer server on a single card
blade server
Internet advertising firms often use this type of software to collect info about users web browsing habits
spy ware
Someone who uses email as a vehicle for extortion
cyber extortion
This allows users to share documents with each other in real time
online meeting
Microwave transmissions called ___ sometimes involve sending signals from one microwave station to another
fixed wireless
Many businesses use this to limit employee's web access
content filtering
A blank is a numeric password either assigned by a company or selected by a user
pin
Computer viruses such as worms Trojans, etc. are _____ that alter the computer programs without the users knowing
malware
A modem that sends digital data and information on phone lines
DSL
Digital ______ is a branch of science that deals with the recovery and investigation of material found in digital devices, often in relation to computer crime.
Forensics
A typical enterprise consists of hundreds operating entities called _____ which include departments, centers, and divisions
functional units
What are the benefits to using a database vs. a file processing system
easy access, reduces data redundancy and development time
Computer _____ occurs when a computer consumes someone's entire social life
addiction
A technique users use to make their network/internet transmission to look legitimate to a computer victim or network
spoofing
With this users invest in stocks, options, bonds, treasuries, etc. without using a broker
online trading
_____ are small terminal like computers that relay mostly on a server for data storage and processing
thin clients
enables wireless interconnections of access points in a network, allows a wireless network to be expanded using multiple access points
distribution syestem
The practice of sharing computing resources such as servers and storage devices
virtualization
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
IP
A(n) ____ network, the most recent network standard, conforms to the government security standards and uses more sophisticated encryption techniques than WPA.
802.11i
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
script kindle
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
spike
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
over voltage
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
Computer Matching and Privacy Protection Act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.
joule
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
web bug
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
privacy