CIT 105 EXAM 3
The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
Creating and distributing ________ is one of the most widespread types of cybercrimes.
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
Which of the following digital image formats compresses the image file?
Data ________ helps to ensure data integrity by maintaining information in only one place.
An operating system for mobile devices
What is iOS?
The operating system of a cell phone is stored in ________.
A ________ is a virus that is triggered on a certain date.
microphone and touch pad
The primary input devices for smartphones are ________.
Google ________ is an online store that delivers software for Android devices.
A(n) ________ chip converts sound waves from a voice into digital signal.
digital signal processor chip
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
Analog-to-digital converter chip
A(n) ________ converts your voice’s sound waves into digital signals.
Which of the following uses radio waves to transmit data signals over short distances?
Many mobile devices include a micro ________ port.
short message service (SMS)
Text messaging is also called ________.
SMS messages are limited to a maximum of ________ characters.
multimedia message service (MMS)
You can send messages that include photos and videos between mobile devices using ________ technology.
An Internet connectivity plan is also known as a ________ plan.
excellent reliability during internet or power outages
All of the following are advantages of VoIP EXCEPT ________.
________ is a very well-known free VoIP provider.
The global positioning system is a network of 21 ________ plus 3 working spares.
A main difference between the tablet and the smartphone is the ________.
Which of the following mobile devices is the lightest?
The distance between two near field communication (NFC) devices is limited to about ________.
20% to 30%
In the United States, e-books account for about ________ of all book sales.
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
a cloud service
Your mobile device files can be synchronized using ________.
A portable media player can play files with all of the following file extensions EXCEPT ________.
digital rights management
________ allows only limited use of media that have been legally purchased.
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Which of the following is NOT a video file extension?
A(n) ________ cable carries all audio and video information from devices to a connected TV.
theft of services
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
people pretending to represent official organizations
FBI-related scams involve ________.
Which of the following is NOT a virus category?
installing a manufacturer’s printer driver
All of the following are ways that can infect your computer with a virus EXCEPT ________.
________ viruses are often transmitted by a flash drive left in a USB port.
A time bomb
Which type of virus was the famous Michelangelo virus?
A(n) ________ takes advantage of file transport methods to spread on its own.
A ________ is a virus that is attached to documents such as Word or Excel files.
Which of the following classifications of viruses can change its own code to avoid detection?
placing a found virus in a secure area on the hard drive
With regard to computer protection, quarantining is defined as ________.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
launch a denial of service (DoS) attack on your computer
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
logical port blocking
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
use a dictionary to find a lengthy word that is easy to remember
Rules for creating passwords include all of the following EXCEPT ________.
Completely Automated Public Turing Test to Tell Computers and Humans Apart
CAPTCHA stands for ________.
Adware and spyware are referred to collectively as ________.
________ is a program that gathers information about your surfing habits without your knowledge.
Cookies obtain your personal information by searching your hard drive
Which of the following statements about cookies is NOT true?
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.
Using your computer for non-work activities while you are being paid to work is known as ________.
A ________ is a group of related data that can be stored, sorted, organized, and queried.
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________.
Data ________ ensures that the data contained in a database is accurate and reliable.
In a database, the term ________ is synonymous with a category of information.
In a database, a group of related records is referred to as a(n) ________.
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field.
You can set a ________, which is automatically displayed in a field unless the user enters something different.
date of birth
Which of the following is NOT a likely primary key?
________ is used to ensure that data is organized most efficiently.
________ databases are the most frequently used electronic databases.
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
Data in a multidimensional database is organized in a ________ format.
A ________ check would be used to restrict the fines for speeding violations from $50 to $250.
A(n) ________ check determines whether a required field such as LastName was filled in.
A ________ check compares the values of data in two or more fields to see whether those values are reasonable.
You would use a ________ to temporarily display records of residents of the city of Boston.
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
________ involves putting data into an electronic file in a format that another application can recognize.
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization’s data in one place.
mining the data
Data staging consists of all of the following steps, EXCEPT ________.
office support system (OSS)
A(n) ________ is designed to improve communications and help employees complete their routine tasks.
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
Management information systems (MIS) provide reports called ________ reports, which show conditions that are unusual or need attention from users of the system.
natural language processing (NLP) system
The Siri personal assistant application on Apple’s iPhone 5s is an example of a ________.
________ is the branch of computer science that attempts to create computers that think like humans.
A ________ is a group of two or more computers, or nodes, designed to share information and resources.
A ________ network can contain servers as well as individual computers.
In a ________ network, each node connected to the network communicates directly with every other node.
The computers in a lab on a floor of a building would be connected using a ________.
A ________ uses the Internet communications infrastructure to build a secure and private network.
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
A(n) ________ server is a server that stores and manages files for network users.
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Which of the following is NOT a common network topology?
A ________ is a set of rules for how information and communication are exchanged.
Ring networks use the ________ method to avoid data collisions.
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
Which of the following is the most commonly used client/server network topology?
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
A ________ topology uses more than one topology when building a network.
________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
Which of the following is NOT a factor to consider when selecting network cabling?
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
For business networks, which of the following is NOT a main cable type?
unshielded twister pair
Most home networks use ________ cable, which is most susceptible to interference.
________ is the standard communications protocol used on most client/server networks.
media access control (MAC)
The physical address assigned each network adapter is called its ________.
A(n) ________ address is the address that external entities use when communicating with your network.
A ________ sends data from one collision domain to another.
A ________ sends data between two networks.
A ________ keeps your computer safe by determining who is trying to access it.
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
A(n) ________ server is a heavily secured server located between a company’s secure internal network and its firewall.
brute force attack
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.