• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/93

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

93 Cards in this Set

  • Front
  • Back
In a(n) ________ , data from more than one table can be combined.
A. file manager
B. XML
C. key field
D. relational database
D. relational database
________ processing is used when a large mail-order company accumulates orders and processes them together in one large set.
A. Interactive
B. Real-time
C. Batch
D. Group
C. Batch
A collection of information stored in an organized form in a computer is a(n):
A. DBMS.
B. utility.
C. operating system.
D. database.
D. database.
The following is an example of:
Select Student_ID From Students Where Major = Business and Credits >= 46
A. HTML language.
B. BASIC language.
C. query language.
D. a spreadsheet formula.
C. query language.
A(n) ________ is a good comparison to a database.
A. computerized calculator
B. computerized typewriter
C. office desktop
D. computerized file cabinet
D. computerized file cabinet
A key field must:
A. be located in a minimum of three tables.
B. uniquely identify a record.
C. be used to connect two tables in the database.
D. be common and used in many records.
B. uniquely identify a record.
In a database table, a ________ is a collection of data fields.
A. record
B. query
C. descriptor
D. vector
A. record
In a customer database, a customer's surname would be keyed into a:
A. record.
B. row.
C. computed field.
D. text field.
D. text field.
Software for organizing storage and retrieval of information is a(n):
A. database.
B. operating system.
C. database program.
D. data warehouse.
C. database program.
An ordered list of specific records and specific fields printed in an easy-to-read format is known as a(n):
A. query.
B. report.
C. inquiry.
D. sort.
B. report.
For a customer database, a good choice of key field would be:
A. phone number.
B. customer ID.
C. last name.
D. address.
B. customer ID.
In a typical client/server environment, the client can be any of the following EXCEPT a:
A. mainframe.
B. PDA.
C. desktop computer.
D. notebook.
A. mainframe.
When making an airline reservation through the Internet, you use ________ processing.
A. batch
B. digitization
C. group
D. interactive
D. interactive
In a customer database table, all of the information for one customer is kept in a:
A. field type.
B. record.
C. field.
D. column.
B. record.
Data mining is:
A. locating trends and patterns in information kept in large databases.
B. creating a database warehouse from many smaller databases.
C. batch processing using files stored on a mainframe computer.
D. querying databases used by the mining industry.
A. locating trends and patterns in information kept in large databases.
________ is perusing data in a database as if looking through pages in a notebook.
A. Scrubbing
B. Mining
C. Browsing
D. Cleansing
C. Browsing
In an object-oriented database, every object is an instance of a:
A. table.
B. class.
C. record.
D. field.
B. class.
A relational database is composed of one or more:
A. directories.
B. tables.
C. DBMS.
D. folders.
B. tables.
On Thursday, February 13, the instructor showed an image of the following animated character:
A. Mickey Mouse
B. Sailor Moon
C. Cartman
D. Brock Sampson
B. Sailor Moon
A set of parallel wires that carries digital signals among a computers components is called a(n):
A. port.
B. bus.
C. peripheral.
D. medium.
B. bus.
A(n) ________ converts a message from digital to analog or from analog to digital.
A. Ethernet
B. modem
C. switch
D. hub
B. modem
________ is a secure electronic tunnel through the Internet that prevents unauthorized access or eavesdropping.
A. VPN
B. MMORPG
C. NOS
D. Bluetooth
A. VPN
A(n) ________ cable uses light waves to transmit multimedia and voice data.
A. twisted-pair
B. coaxial
C. fiber-optic
D. copper
C. fiber-optic
Unwanted junk email is known as:
A. telephony.
B. spam.
C. IM.
D. avatar.
B. spam.
A(n) ________ port is faster and more flexible than a traditional serial or parallel port.
A. server
B. monitor
C. peripheral
D. USB
D. USB
A(n) ________ broadcasts messages to all devices connected to a LAN.
A. port
B. hub
C. node
D. switch
B. hub
_______ is defined as millions of bits.
A. Megabits
B. Megabytes
C. Kilobits
D. Kilobytes
A. Megabits
The collection of common pathways between networks on a WAN is known as a:
A. router.
B. backbone.
C. hub.
D. node.
B. backbone.
The three essential components of every computer system include all of the following EXCEPT:
A. cables.
B. software.
C. hardware.
D. people.
A. cables.
The ________ encryption scheme improves the security of wireless networks.
A. WEP
B. VPN
C. Ethernet
D. phishing
A. WEP
A(n) ________ is an invisible piece of code that notifies the sender that an email was opened and may even record other information about the users computer or email software.
A. Web bug
B. applet
C. pop-up
D. phish
A. Web bug
MMORPGs are:
A. software standards for wireless technology
B. online role-playing games involving hundreds of thousands of players
C. circuit boards for enhanced handling of multimedia
D. protocols for the internet.
B. online role-playing games involving hundreds of thousands of players
IM stands for:
A. international market.
B. instant messaging.
C. instantaneous messages.
D. internal messaging.
B. instant messaging.
The U.S. Department of Defense uses a(n) ________ , which is a specialized network used to determine locations, maps, and directions using signals from satellites that are orbiting the Earth.
A. mesh network
B. GPS
C. NIC
D. Ethernet
B. GPS
________ is new technology currently available in Japan, much of Europe, and some major US cities. It uses high-bandwidth connections to communicate multimedia over wireless networks.
A. 4GL
B. 3G
C. Wi-Fi
D. PDA
B. 3G
A personal area network is possible because of the wireless technology known as:
A. USB.
B. FireWire.
C. IEEE.
D. Bluetooth.
D. Bluetooth.
Remote access means that a:
A. user is connecting to a network through a phone line, television cable, or wireless link.
B. transaction is added to a batch that will be processed on a remote computer.
C. computer is linked directly to a network.
D. LAN is set up in an office in a remote location.
A. user is connecting to a network through a phone line, television cable, or wireless link.
On Tuesday, February 18, the instructor showed a short video featuring the following animated dragon:
A. Snookles the baby dragon
B. Trogdor the Burninator
C. Blue-Eyes White Dragon
D. Smaug the Magnificent
B. Trogdor the Burninator
Using Napster to make music files from one hard drive available to others rather than posting them on a central server is an example of:
A. LAN sharing.
B. client/server sharing.
C. peer-to-peer file sharing.
D. server/client software downloading.
C. peer-to-peer file sharing.
Web pages can be created using:
A. only Microsoft FrontPage or Macromedia Dreamweaver.
B. only Web authoring software.
C. any word processor.
D. only Microsoft products.
C. any word processor.
________ is used when information is delivered to a client computer through a server at the clients request.
A. Peer-to-peer file sharing
B. P2P computing
C. Pull technology
D. Push technology
C. Pull technology
Hundreds of universities, government entities, and research labs have formed:
A. Internet.
B. WWW.
C. TCP/IP.
D. Internet2.
D. Internet2.
Web authoring software includes all of the following EXCEPT:
A. Adobe Acrobat.
B. Microsoft FrontPage.
C. Macromedia Dreamweaver.
D. Adobe GoLive.
A. Adobe Acrobat.
A university might have a(n) ________ to manage the mail of students, faculty, and staff.
A. email and URL address
B. bridge
C. client server
D. email server
D. email server
Yahoo!, MSN, and Netscape are examples of:
A. bridges.
B. servers.
C. Web directories.
D. portals.
D. portals.
A recently created additional top-level domain name is:
A. .pro.
B. .business.
C. .school.
D. .plan.
A. .pro.
In what decade was ARPANET developed?
A. 1960s
B. 1970s
C. 1980s
D. 1950s
A. 1960s
This address doesnt change every day:
A. dynamic IP address.
B. common name and number.
C. static IP address.
D. unique IP address.
C. static IP address.
In a large organization LANs may be connected through a:
A. Broadband connection.
B. backbone network.
C. direct satellite connection.
D. dial-up connection.
B. backbone network.
All of the following are disadvantages of a DSL connection EXCEPT:
A. It is only offered in some areas.
B. It can be complicated to install.
C. It is fairly expensive.
D. It cannot share signals with a telephone line of voice traffic.
D. It cannot share signals with a telephone line of voice traffic.
Broadband connections include all of the following EXCEPT:
A. satellites.
B. DSL.
C. telephone modems.
D. cable modems.
C. telephone modems.
Every host computer on the Internet has a(n):
A. unique 15-digit number.
B. common name and number.
C. unique IP address.
D. similar IP address.
C. unique IP address.
FTP stands for:
A. folder transfer and protocol.
B. file transactions and procedures.
C. file transfer protocol.
D. first transfer preference.
C. file transfer protocol.
HTML commands, such as <H1>, are known as:
A. tickets.
B. tags.
C. browser requests.
D. labels.
B. tags.
________ is an XML form of sharing data:
A. Peer-to-peer file sharing
B. Internet2
C. RSS
D. Pull technology
C. RSS
An Internet diary or grouping of ongoing commentaries is known as a(n):
A. plug-in.
B. cookie.
C. blog.
D. electronic email.
C. blog.
Classes on Tuesday February 25 and Thursday February 27 consisted of:
A. Nothing. Due to illness on Tuesday and a power outage on Thursday there was no class held during this week.
B. Yet another lecture on net neutrality.
C. Three and a half hours of YouTube videos.
D. An ice cream social in the bowling alley.
A. Nothing. Due to illness on Tuesday and a power outage on Thursday there was no class held during this week.
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?
A. smart weapon
B. autonomous system
C. missile defense auto-system
D. independent system
B. autonomous system
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. encryption safe wall.
C. firewall.
D. hacker-resistant server.
C. firewall.
The scrambling of code is known as:
A. encryption.
B. scrambling.
C. password-proofing.
D. firewalling.
A. encryption.
The majority of computer crimes are committed by:
A. young teenage computer geniuses.
B. insiders.
C. overseas criminals.
D. hackers.
B. insiders.
Freeware ________ encrypts data.
A. PGP
B. encryption
C. private and public keys
D. firewall software
A. PGP
The common name for the crime of stealing passwords is:
A. spoofing.
B. spooling.
C. hacking.
D. identity theft.
A. spoofing.
Software programs that close potential security breaches in an operating system are known as:
A. security patches.
B. security breach fixes.
C. refresh patches.
D. security repairs.
A. security patches.
When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. time bomb.
C. Trojan horse.
D. virus.
B. time bomb.
The survey showed that these businesses lost more than ________ due to security breaches.
A. $1 million
B. $100,000 each
C. $377 million
D. five employees each
C. $377 million
What type of virus uses computer hosts to reproduce itself?
A. worm
B. macro virus
C. Melissa virus
D. time bomb
A. worm
A(n) ________ can shield electronic equipment from power spikes.
A. encryption program
B. UPS
C. firewall
D. surge protector
D. surge protector
Malicious software is known as:
A. maliciousware.
B. badware.
C. illegalware.
D. malware.
D. malware.
This virus that attaches itself to macros is called:
A. email virus.
B. time bomb.
C. macro virus.
D. Trojan horse.
C. macro virus.
The typical computer criminal is a(n):
A. trusted employee with no criminal record.
B. overseas young cracker.
C. trusted employee with a long, but unknown criminal record.
D. young hacker.
A. trusted employee with no criminal record.
Most computer systems rely solely on ________ for authentication.
A. lock and key
B. passwords
C. encryption
D. logins
B. passwords
Over ________ was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 100 billion dollars
D. 1 billion dollars
C. 100 billion dollars
A program that performs a useful task while simultaneously allowing destructive acts is a:
A. virus.
B. macro virus.
C. worm.
D. Trojan horse.
D. Trojan horse.
To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. UPS.
D. firewall.
C. UPS.
On Tuesday, March 4, the first 30 minutes or so of class discussion were devoted to:
A. Anita Sarkeesian's YouTube series "Tropes vs. Women in Video Games"
B. Wikileaks and the Bradley Manning trial.
C. Twitch plays Pokemon.
D. "Scratch" a simplified programming platform.
D. "Scratch" a simplified programming platform.
Structured Query Language
Available for many database management systems
Programmers and sophisticated users don’t need to learn new languages when they work with new systems
Graphical user interfaces allow point-and-click queries
Insulates users from the complexities of the query language
Structured Query Language
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
How is networking important?
People share computer hardware, thus reducing costs
People share data and software programs, thus increasing efficiency and production
People work together in ways that are otherwise difficult or impossible
Blake J. Robbins v Lower Merion School District (PA)
Sophomore disciplined by Vice Principal for “improper behavior in his home”.
Student was apparently “popping pills”
Was really eating “Mike and Ike” candy.
Used webcam photo as evidence.

High school students given MacBook laptops with remote access software installed.
Installed for “security purposes”, presumably to detect theft.
Letter from superintendant claimed that while still photos are possible, the software doesn’t enable full audio or video.
(So the little green “ON” light will flash, but not stay on.)

October 2010: Robbins’ class action suit settled for $610,000 from School District.
A local area network (LAN):
computers are physically close to each other, usually in the same building
Bandwidth
the quantity of information that can pass through a communications medium in a given amount of time
Bridges and gateways
hardware devices that can pass messages between networks
Often translate messages so they can be understood by networks that obey different software protocols
Routers
hardware devices or software programs that route messages as they travel between networks
Mesh networks
an alternative to traditional networks, creates individual nodes for communication.
Used to set up small, temporary communication systems
Example: emergency personnel use at fire scenes to coordinate actions
fiber optic connections
are replacing copper wires in the worldwide telephone network
A fiber optic network can rapidly and reliably transmit masses of multimedia data at the same time that it’s handling voice messages
VOIP
Voice over Internet protocol
Sending voice signals through the Internet, bypassing the phone companies (and their charges) altogether
Still working out some bugs:
Caller-ID can be faked
Calling 911 doesn’t always show caller’s location
Outside the US, some countries tax or criminalize VOIP, because the state makes so much money on traditional telephone service.
VOIP is not as legally secure against wiretapping
ARPANET
The Advanced Research Projects Agency NETwork,
the predecessor to the Internet:
Developed at the request of the Department of Defense by a team of visionary computer scientists
Launched in 1969
Its peer-to-peer networking philosophy and protocols were copied in other networks in the 1980s
Disbanded in 1990, having fulfilled its research mission, but its technology spawned the Internet
TCP
Transmission Control Protocol
breaks messages into packets
Each packet has all the information needed to travel from network to network
Host systems called routers determine how to route transmissions
IP
Internet Protocol is the address for the packets
Each Internet host computer has a unique IP address
Each address is comprised of four sets of numbers between 0 and 255 separated by periods, such as 128.114.113.19
Digital Millennium Copyright Act
Signed into law in October, 1998 by President Clinton

Passed Unanimously in US Congress.

Criminalized production and dissemination of technology whose primary purpose is to circumvent measures that control access to copyrighted works.

Also increased penalties for Copyright infringement on the Internet
Uninterruptible power supply (UPS)
can protect computers from data loss during power failures
Surge protectors
shield electronic equipment from power spikes