Computers Test 2
With ____ users type or send short messages on a mobile device
This is a coffee house or restraint that provides internet to its customers
A type of communications device that connects the device to the communications channel
A file server does what?
stores and manages files
A collection of data organized in a manner that controls access to that data
This type of language consists of simple English like statements to specify to print or store
This type of cable consist of one or more twisted pair wires bundled together
twisted pair cable
The amount of data instruction and info that can travel over a communications channel is called_________
the band width
This type of backup is a backup plan in which all data is backed up when a change is made
continuous back up
A check out clerk with this type of privileges to the email accounts in a discount warehouse data base could view them but not change them
read only access
This is processed data that is organized and useful
A measure of how well compute hardware or software can grow to meet increasing performance demands
Validation ___ reduce data entry errors
This type of data base stores documents such as schedules, calendars, manuals, memos, and reports
To make collaboration possible among employees uses a document ____ system
A computer ___ risk is any action that can cause a loss of info, etc
Software___ is the unauthorized and illegal duplication of software
A personal ____ is a utility program that protects a personal computer from un authorized access
A system ___ is the prolonged malfunction of a computer
Up-time is a measure of what?
Sometimes a company uses a ____ which allows customers or suppliers access to part of its intra-net
An applied science devoted to incorporating comfort, efficiency and comfort into design of the work place
This type of server as a complete computer server on a single card
Internet advertising firms often use this type of software to collect info about users web browsing habits
Someone who uses email as a vehicle for extortion
This allows users to share documents with each other in real time
Microwave transmissions called ___ sometimes involve sending signals from one microwave station to another
Many businesses use this to limit employee's web access
A blank is a numeric password either assigned by a company or selected by a user
Computer viruses such as worms Trojans, etc. are _____ that alter the computer programs without the users knowing
A modem that sends digital data and information on phone lines
Digital ______ is a branch of science that deals with the recovery and investigation of material found in digital devices, often in relation to computer crime.
A typical enterprise consists of hundreds operating entities called _____ which include departments, centers, and divisions
What are the benefits to using a database vs. a file processing system
easy access, reduces data redundancy and development time
Computer _____ occurs when a computer consumes someone's entire social life
A technique users use to make their network/internet transmission to look legitimate to a computer victim or network
With this users invest in stocks, options, bonds, treasuries, etc. without using a broker
_____ are small terminal like computers that relay mostly on a server for data storage and processing
enables wireless interconnections of access points in a network, allows a wireless network to be expanded using multiple access points
The practice of sharing computing resources such as servers and storage devices
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
A(n) ____ network, the most recent network standard, conforms to the government security standards and uses more sophisticated encryption techniques than WPA.
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
Computer Matching and Privacy Protection Act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
A ____ is the unit of energy a surge protection device can absorb before it can be damaged.
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.