Review Ch. 8,9,10
What is the name of the project that led to the development of the internet? A. ARPANET B. NSFNet C. UUNET D. DARPA
Who developed the concept of the World Wide Web?
A. Marc Andreessen B. Robert Metcalfe C.Mitch Kapor D. Dr. Tim Berners-Lee
What part of the internet was provided by the NSF?
A. Trunkline B. Backbone C. Nodes D. Branches
The interface software that is used to explore the internet is called a: A. Surfer B. Linker C. Searcher D. Browser
A message to be sent over the internet is divided into uniformly sized packages called: A. Packets B. Units C. Applets D. Bundles
This service provides the server computer and the software to connect the internet: A. Internet Service Provider B. Browser Service Provider C. Internet Link Provider D. Client Server Provider
The most used top level domain is:
.net .edu .gov .com
Another name for tunneling is:
Portal Cabling Encapsulation Bandwidth
What is the initial page of the web site for the company that created your browser called? A. Link page B. Hyperlink page C. Home page D. Start page
A string of letters and symbols that is the unique address of a web page is called a(n): A. HTML B. URL C. TCP D. XML
This is an informal network of computers that allow the posting and reading of messages in newsgroups that focus on specific topics: A. Netiquette B. Telnet C. Usenet D. Newsreader
Computers on the internet have a standard way to transfer copies of files called: A. FTP B. VPN C. FAQ D. WAP
The general rules of good behavior on the internet is called: A. Golden rule B. Netiquette C. Flaming D. Statutes
The protocol that allows remote users to log into a host computer and use it as if they were sitting at the computer is: A. Usenet B. World Wide Web C. VPN D. Telnet
The most commonly used feature of the internet is:
A. Email B. World Wide Web C. Newsgroups D. E-commerce
The type of e-commerce that occurs on many auction sites such as eBay is: A. Business to business (B2B) B. Business to Consumer (B2C) C. Consumer to Consumer (C2C) D. Security Socket Layer
The following is an example of a pure play retailer:
A. The Gap B. Sears C. Amazon D. Barnes and Noble
What major issues separates the haves from the have-nots?
Ergonomics The digital divide Healthy computing Green computing
What refers to human factors related to the use of computers? Child monitoring Energy management Employee monitoring Ergonomics
What refers to addressing the environmental impact of computer use in
an environmentally responsible manner? Green computing Fair use Cybersquatting Ethical computing
What standards do many organizations require all newly purchased computer equipment to meet? HUD DNR Energy Star ACM
What features do current operating systems contain that reduce the power requirements of computer systems? Power boosters Energy management features Energy logos Surge protectors
What is the legislation that prohibits any new taxes that single out Internet transactions, such as taxes on Internet service? The Neighborhood Children’s Internet
Protection Act The Internet Nondiscrimination Act The Communications Decency Act The U.S. Copyright Act
Which of the following is not ergonomically correct?
Working in a brightly lit room Keeping wrists straight when typing Taking frequent breaks Sitting with your back straight and feet
flat on the floor
Carpal Tunnel Syndrome is an example of:
DMCA RSI COPPA NCIPA
What software attempts to prevent children from accessing objectionable sites? Prevention software Desktop management software Anti-virus software Blocking software
What legislation attempted to prevent people from preying on children on the Internet, but was struck down by the Supreme Court? The Digital Millennium Copyright Act The Communications Decency Act The Internet Nondiscrimination Act The U.S. Copyright Act
What refers to results of intellectual activity in the industrial, scientific, literary, or artistic fields?
Patents Trademarks Intellectual property (IP) Copyrights
What involves registering common words and phrases as domain names, with the intention of selling the domain name at a profit to a company that wanted a catchy,
easily remembered URL? Domain theft Identity theft Cybersquatting Cyber theft
Standards of moral conduct are called:
Rules Protocols Ethics Codes
When customers are notified of the privacy policy and must specifically agree before their data can be released, they are using a(n):
Opt-in policy Opt-out policy Uniform Resource Locater Data agreement
The representation of someone else’s words or ideas as your own Patents Trademark Copyright Plagiarism
The law that authorizes criminal prosecutions against anyone who willfully reproduces or distributes copyrighted material by electronic means, regardless of
the purpose or motive Communications Decency Act No Electronic Theft Act Internet Nondiscrimination Act Digital Millennium Copyright Act
What term usually describes a person who gains access to computer systems illegally? Con artist Shacker Hacker Breaker
What causes a program to trigger damage under certain conditions? A scavenger A trapdoor A zapper A bomb
What term describes highly trained technical people who are paid to try to break into a computer system before anyone else does? Piggybacks White-hat hackers Hit teams Hired hands
What is the name of the computer crime law that was passed by Congress in 1986? Computer Crime Act Cyber Crime Act of 1986 Computer Fraud and Abuse Act Computer Criminals Act
What term refers to uncovering computer-stored information suitable for use as evidence in courts of law? Computer forensics Computer detective work Computer investigation Computer probing
What is a system of safeguards designed to protect a computer system and data from deliberate or accidental damage or access by unauthorized persons? Piggybacking Data diddling Data screening Security
What is a method of restoring computer processing operations if they are halted by major damage or destruction? A contingency plan A loss recovery plan A disaster recovery plan A computer recovery plan
What is a fully equipped computer facility with hardware, environmental controls, security, and communications equipment in place?
A hot site A turnkey site A model site A loaded site
What is a device that prevents electrical problems from affecting computer data files? A full backup A surge protector A differential backup An incremental backup
What is a set of illicit instructions that passes itself on to other programs with which it comes in contact? A retrovirus A virus An antivirus A germ
An attack that occurs when hackers bombard a site with more requests for service than it can possibly handle, preventing legitimate users from accessing the site. Denial of Service Bomb Trapdoor Slicing
An embezzlement technique reflects the small “slices” of money that may be squirreled away undetected from a large financial system. Salami Bomb Cracking Data diddling
The generic term that refers to a variety of software designed to bypass all security systems. Cracking Social Engineering Zapping Hacking
The science of measuring individual body characteristics is: Biometrics Bionics Biostatistics Biomeasurements
A device that includes both surge protection and battery backup Surge protector Uninterruptable Power Supply (UPS) Consortium Computer Battery System(CBS)
A program that transfers itself from computer to computer over a network and plants itself as a separate file on the target computer’s disks Virus Retrovirus Worm Freeware
Persuading unsuspecting people to give away their passwords over the phone is an example of: Social Engineering Password cracking Data diddling Biometrics
The Anti-Cybersquatting Consumer Protection Act prevents people from: Spending too much time at a
particular web site Copying and distributing software over
the internet Plagiarizing trademarked or
copyrighted material from the web Registering domain names using
someone else’s trademark
The act of bombarding a system with such a high volume of requests that it results in an inability to allow legitimate users to access the system is called: Bombing Data diddling Denial of Service Zapping
A set of illegal instructions inserted into a legitimate computer program is a(n): Trapdoor Trojan horse Worm Bomb
Zapping software is designed to:
Destroy or “zap” sensitive data files Search for viruses on the system Bypass security systems Prevent email spamming
A white hat hacker is someone who:
Engages in dangerous computer fraud Helps identify security leaks on a
system Engages in computer forensics in
order to solve computer crimes Uses unlawful system entry for fun
and profit
Identification of a human user to control access to a building, room, or computer system is accomplished by all of the following except: Biometrics Active tags Passwords Digital signatures
Which of the following is the most devastating loss to a company? Loss of hardware Loss of data Loss of software Loss of printouts
A company that wishes to ensure continuation of services in the event of fires or floods should make sure to
develop a: Security audit Database Disaster recovery plan Fire escape
The term hot site refers to:
A web site that will be used as backup An empty shell that can be used for a
new computer system if needed A web site that contains sensitive
information A fully equipped computer center that
can be used in the event of disaster
A transaction log is an example of which form of data security?
Auditor checks Internal controls Applicant screening Built-in software protection
___is the process of copying backed up data back to the operational hard disk Restoration Backup copy Disaster recovery Forward pass
The difference between a worm and a virus is that:
One causes damage and the other does not
One is transmitted over the web and the other is only passed via diskette
One is a program and the other is a set of instructions embedded in a file
There is no difference, they are synonymous
The virus known for wiping out the entire contents of a computer’s hard disk was called:
Melissa Michaelangelo Jerusalem B Cascade
Which of the following pieces of legislation ensures that private citizens have access to data about themselves that is held by federal agencies? Fair Credit Reporting Act Freedom of Information Act Federal Citizens Privacy Act Computer Matching and Privacy
Protection Act
The combination of hardware and software that facilitates the security of a company’s network by blocking unauthorized access by internet users is: Blocking software Private key encryption Software lock Firewall
A cookie is:
A program that helps the browser communicate with the web server
A file stored on the web server for sending information to the browser
A file stored on the client machine for sending information to the server
An enhancement to the browser, similar to a plug-in
_____ is a form of unsolicited email, often used for the purpose of mass advertisement. A cookie A flame A banner Spam
Top Related