logo image

CIT 105 EXAM 3

Kickstarter
The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
computer viruses
Creating and distributing ________ is one of the most widespread types of cybercrimes.
Digital Convergence
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
JPEG
Which of the following digital image formats compresses the image file?
centralization
Data ________ helps to ensure data integrity by maintaining information in only one place.
An operating system for mobile devices
What is iOS?
ROM
The operating system of a cell phone is stored in ________.
time bomb
A ________ is a virus that is triggered on a certain date.
microphone and touch pad
The primary input devices for smartphones are ________.
Play
Google ________ is an online store that delivers software for Android devices.
Analog-to-digital converter
A(n) ________ chip converts sound waves from a voice into digital signal.
digital signal processor chip
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
Analog-to-digital converter chip
A(n) ________ converts your voice’s sound waves into digital signals.
Bluetooth
Which of the following uses radio waves to transmit data signals over short distances?
USB
Many mobile devices include a micro ________ port.
short message service (SMS)
Text messaging is also called ________.
160
SMS messages are limited to a maximum of ________ characters.
multimedia message service (MMS)
You can send messages that include photos and videos between mobile devices using ________ technology.
data
An Internet connectivity plan is also known as a ________ plan.
excellent reliability during internet or power outages
All of the following are advantages of VoIP EXCEPT ________.
Skype
________ is a very well-known free VoIP provider.
satellites
The global positioning system is a network of 21 ________ plus 3 working spares.
screen size
A main difference between the tablet and the smartphone is the ________.
Smartphone
Which of the following mobile devices is the lightest?
1.5 inches
The distance between two near field communication (NFC) devices is limited to about ________.
20% to 30%
In the United States, e-books account for about ________ of all book sales.
E-text
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
a cloud service
Your mobile device files can be synchronized using ________.
.accdb
A portable media player can play files with all of the following file extensions EXCEPT ________.
digital rights management
________ allows only limited use of media that have been legally purchased.
sampling rate
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
.jpg
Which of the following is NOT a video file extension?
HDMI
A(n) ________ cable carries all audio and video information from devices to a connected TV.
theft of services
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
Cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
people pretending to represent official organizations
FBI-related scams involve ________.
pharming
Which of the following is NOT a virus category?
installing a manufacturer’s printer driver
All of the following are ways that can infect your computer with a virus EXCEPT ________.
Boot-sector
________ viruses are often transmitted by a flash drive left in a USB port.
A time bomb
Which type of virus was the famous Michelangelo virus?
worm
A(n) ________ takes advantage of file transport methods to spread on its own.
macro virus
A ________ is a virus that is attached to documents such as Word or Excel files.
Polymorphic
Which of the following classifications of viruses can change its own code to avoid detection?
placing a found virus in a secure area on the hard drive
With regard to computer protection, quarantining is defined as ________.
virus signature
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
White-hat
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
launch a denial of service (DoS) attack on your computer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
rootkit
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
a firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
logical port blocking
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
use a dictionary to find a lengthy word that is easy to remember
Rules for creating passwords include all of the following EXCEPT ________.
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA stands for ________.
Grayware
Adware and spyware are referred to collectively as ________.
Spyware
________ is a program that gathers information about your surfing habits without your knowledge.
Cookies obtain your personal information by searching your hard drive
Which of the following statements about cookies is NOT true?
engineering
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
pharming
When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.
cyberloafing
Using your computer for non-work activities while you are being paid to work is known as ________.
database
A ________ is a group of related data that can be stored, sorted, organized, and queried.
redundancy
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________.
integrity
Data ________ ensures that the data contained in a database is accurate and reliable.
field
In a database, the term ________ is synonymous with a category of information.
table
In a database, a group of related records is referred to as a(n) ________.
long text
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field.
default value
You can set a ________, which is automatically displayed in a field unless the user enters something different.
date of birth
Which of the following is NOT a likely primary key?
normalization
________ is used to ensure that data is organized most efficiently.
relational
________ databases are the most frequently used electronic databases.
one-to-one
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
referential integrity
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
unstructured
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
cube
Data in a multidimensional database is organized in a ________ format.
range
A ________ check would be used to restrict the fines for speeding violations from $50 to $250.
completeness
A(n) ________ check determines whether a required field such as LastName was filled in.
consistency
A ________ check compares the values of data in two or more fields to see whether those values are reasonable.
filter
You would use a ________ to temporarily display records of residents of the city of Boston.
query
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
select query
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
relational algebra
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
exporting
________ involves putting data into an electronic file in a format that another application can recognize.
warehouse
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization’s data in one place.
mining the data
Data staging consists of all of the following steps, EXCEPT ________.
office support system (OSS)
A(n) ________ is designed to improve communications and help employees complete their routine tasks.
real-time
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
exception
Management information systems (MIS) provide reports called ________ reports, which show conditions that are unusual or need attention from users of the system.
natural language processing (NLP) system
The Siri personal assistant application on Apple’s iPhone 5s is an example of a ________.
Artificial intelligence
________ is the branch of computer science that attempts to create computers that think like humans.
network
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
client/server
A ________ network can contain servers as well as individual computers.
peer-to-peer
In a ________ network, each node connected to the network communicates directly with every other node.
LAN
The computers in a lab on a floor of a building would be connected using a ________.
VPN
A ________ uses the Internet communications infrastructure to build a secure and private network.
authentication
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
file
A(n) ________ server is a server that stores and manages files for network users.
spooler
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
cluster
Which of the following is NOT a common network topology?
protocol
A ________ is a set of rules for how information and communication are exchanged.
token
Ring networks use the ________ method to avoid data collisions.
terminator
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
bus
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
star
Which of the following is the most commonly used client/server network topology?
jam
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
hybrid
A ________ topology uses more than one topology when building a network.
bandwidth
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
cable diameter
Which of the following is NOT a factor to consider when selecting network cabling?
fiber-optic
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
duplex
For business networks, which of the following is NOT a main cable type?
unshielded twister pair
Most home networks use ________ cable, which is most susceptible to interference.
Ethernet
________ is the standard communications protocol used on most client/server networks.
media access control (MAC)
The physical address assigned each network adapter is called its ________.
IP
A(n) ________ address is the address that external entities use when communicating with your network.
bridge
A ________ sends data from one collision domain to another.
router
A ________ sends data between two networks.
firewall
A ________ keeps your computer safe by determining who is trying to access it.
screening
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
bastion host
A(n) ________ server is a heavily secured server located between a company’s secure internal network and its firewall.
brute force attack
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy close
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy