CIT 105 EXAM 3

KickstarterThe Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
Digital ConvergenceThe term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
An operating system for mobile devicesWhat is iOS?
ROMThe operating system of a cell phone is stored in ________.
microphone and touch padThe primary input devices for smartphones are ________.
PlayGoogle ________ is an online store that delivers software for Android devices.
Analog-to-digital converterA(n) ________ chip converts sound waves from a voice into digital signal.
digital signal processor chipA(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
Analog-to-digital converter chipA(n) ________ converts your voice’s sound waves into digital signals.
BluetoothWhich of the following uses radio waves to transmit data signals over short distances?
USBMany mobile devices include a micro ________ port.
short message service (SMS)Text messaging is also called ________.
160SMS messages are limited to a maximum of ________ characters.
multimedia message service (MMS)You can send messages that include photos and videos between mobile devices using ________ technology.
dataAn Internet connectivity plan is also known as a ________ plan.
excellent reliability during internet or power outagesAll of the following are advantages of VoIP EXCEPT ________.
Skype________ is a very well-known free VoIP provider.
satellitesThe global positioning system is a network of 21 ________ plus 3 working spares.
screen sizeA main difference between the tablet and the smartphone is the ________.
SmartphoneWhich of the following mobile devices is the lightest?
1.5 inchesThe distance between two near field communication (NFC) devices is limited to about ________.
20% to 30%In the United States, e-books account for about ________ of all book sales.
E-text________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
a cloud serviceYour mobile device files can be synchronized using ________.
.accdbA portable media player can play files with all of the following file extensions EXCEPT ________.
digital rights management________ allows only limited use of media that have been legally purchased.
sampling rateWhich of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
JPEGWhich of the following digital image formats compresses the image file?
.jpgWhich of the following is NOT a video file extension?
HDMIA(n) ________ cable carries all audio and video information from devices to a connected TV.
theft of servicesAll of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
CybercrimeWhich of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
FBI and National White Collar Crime CenterThe Internet Crime Complaint Center (IC3) is a partnership between the ________.
people pretending to represent official organizationsFBI-related scams involve ________.
computer virusesCreating and distributing ________ is one of the most widespread types of cybercrimes.
pharmingWhich of the following is NOT a virus category?
installing a manufacturer’s printer driverAll of the following are ways that can infect your computer with a virus EXCEPT ________.
Boot-sector________ viruses are often transmitted by a flash drive left in a USB port.
A time bombWhich type of virus was the famous Michelangelo virus?
time bombA ________ is a virus that is triggered on a certain date.
wormA(n) ________ takes advantage of file transport methods to spread on its own.
macro virusA ________ is a virus that is attached to documents such as Word or Excel files.
PolymorphicWhich of the following classifications of viruses can change its own code to avoid detection?
placing a found virus in a secure area on the hard driveWith regard to computer protection, quarantining is defined as ________.
virus signatureA(n) ________ is the portion of virus code that is unique to a particular computer virus.
White-hat________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
launch a denial of service (DoS) attack on your computerA packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
rootkitA ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
a firewallYou can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
A DDoS attack________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
logical port blockingConfiguring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
use a dictionary to find a lengthy word that is easy to rememberRules for creating passwords include all of the following EXCEPT ________.
Completely Automated Public Turing Test to Tell Computers and Humans ApartCAPTCHA stands for ________.
GraywareAdware and spyware are referred to collectively as ________.
Spyware________ is a program that gathers information about your surfing habits without your knowledge.
Cookies obtain your personal information by searching your hard driveWhich of the following statements about cookies is NOT true?
engineeringSocial ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
pharmingWhen malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.
cyberloafingUsing your computer for non-work activities while you are being paid to work is known as ________.
databaseA ________ is a group of related data that can be stored, sorted, organized, and queried.
redundancyIf a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________.
integrityData ________ ensures that the data contained in a database is accurate and reliable.
centralizationData ________ helps to ensure data integrity by maintaining information in only one place.
fieldIn a database, the term ________ is synonymous with a category of information.
tableIn a database, a group of related records is referred to as a(n) ________.
long textIn a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field.
default valueYou can set a ________, which is automatically displayed in a field unless the user enters something different.
date of birthWhich of the following is NOT a likely primary key?
normalization________ is used to ensure that data is organized most efficiently.
relational________ databases are the most frequently used electronic databases.
one-to-oneA ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
referential integrity________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
unstructuredNontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
cubeData in a multidimensional database is organized in a ________ format.
rangeA ________ check would be used to restrict the fines for speeding violations from $50 to $250.
completenessA(n) ________ check determines whether a required field such as LastName was filled in.
consistencyA ________ check compares the values of data in two or more fields to see whether those values are reasonable.
filterYou would use a ________ to temporarily display records of residents of the city of Boston.
queryA(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
select queryA ________ displays a subset of data from a table (or tables) based on the specified criteria.
relational algebraSQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
exporting________ involves putting data into an electronic file in a format that another application can recognize.
warehouseA data ________ is a large-scale electronic repository of data that contains and organizes all of an organization’s data in one place.
mining the dataData staging consists of all of the following steps, EXCEPT ________.
office support system (OSS)A(n) ________ is designed to improve communications and help employees complete their routine tasks.
real-timeIn a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing.
exceptionManagement information systems (MIS) provide reports called ________ reports, which show conditions that are unusual or need attention from users of the system.
natural language processing (NLP) systemThe Siri personal assistant application on Apple’s iPhone 5s is an example of a ________.
Artificial intelligence________ is the branch of computer science that attempts to create computers that think like humans.
networkA ________ is a group of two or more computers, or nodes, designed to share information and resources.
client/serverA ________ network can contain servers as well as individual computers.
peer-to-peerIn a ________ network, each node connected to the network communicates directly with every other node.
LANThe computers in a lab on a floor of a building would be connected using a ________.
VPNA ________ uses the Internet communications infrastructure to build a secure and private network.
authenticationA(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
fileA(n) ________ server is a server that stores and manages files for network users.
spoolerA print server uses a print ________ as a software holding area for jobs waiting to be printed.
clusterWhich of the following is NOT a common network topology?
protocolA ________ is a set of rules for how information and communication are exchanged.
tokenRing networks use the ________ method to avoid data collisions.
terminatorThe ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
busIn a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
starWhich of the following is the most commonly used client/server network topology?
jamIn an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
hybridA ________ topology uses more than one topology when building a network.
bandwidth________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
cable diameterWhich of the following is NOT a factor to consider when selecting network cabling?
fiber-optic________ cable is NOT subject to electromagnetic interference or radio frequency interference.
duplexFor business networks, which of the following is NOT a main cable type?
unshielded twister pairMost home networks use ________ cable, which is most susceptible to interference.
Ethernet________ is the standard communications protocol used on most client/server networks.
media access control (MAC)The physical address assigned each network adapter is called its ________.
IPA(n) ________ address is the address that external entities use when communicating with your network.
bridgeA ________ sends data from one collision domain to another.
routerA ________ sends data between two networks.
firewallA ________ keeps your computer safe by determining who is trying to access it.
screeningPacket ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
bastion hostA(n) ________ server is a heavily secured server located between a company’s secure internal network and its firewall.
brute force attackConfiguring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.