Cosc 1301 Ch 5 & 6 exam Newest
_____ are the ruling bodies of countries that can pass laws that impact both the
II II II II II II II II II II II II II II
information available via the Web and the access their citizens have to the Internet. -
II II II II II II II II II II II II II II II II II
Governments
II
Bluewood Hospital uses a connection that allows its patients and visitors to connect their
II II II II II II II II II II II II II II
devices wirelessly to the Internet. Here, Bluewood Hospital has created a _____. - Wi-Fi
II II II II II II II II II II II II II II II II
hotspot
II
In the accompanying figure, boxes _____ denote the transfer of an email from a sender's
II II II II II II II II II II II II II II II
mail server to a receiver's mail server. - B-D
II II II II II II II II II II II
To avoid plagiarizing Web page content, one should credit Web page sources when they
II II II II II II II II II II II II II II
are used in papers, on Web pages, or in other documents. - True
II II II II II II II II II II II II II II II
II _____ is the complete malfunction of a computer. - System failure
II II II II II II II II II II II II
John has a laptop that has survived many drops over concrete and withstood extreme
II II II II II II II II II II II II II II
temperature variations. John's laptop can be categorized as a _____. - ruggedized
II II II II II II II II II II II II II II
device
II
Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop.
II II II II II II II II II II II II II II II II
Therefore, she decides to install closed-circuit security cameras in her shop to prevent
II II II II II II II II II II II II II
future robberies. Identify the technology Helen has used. - Video surveillance
II II II II II II II II II II II II II
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus
II II II II II II II II II II II II II II II II II
Web site set up by a person to obtain users' personal information. - Pharming
II II II II II II II II II II II II II II II II
Which of the following is a recorded audio or video file that can be downloaded via the
II II II II II II II II II II II II II II II II II
Internet? - A podcast
II II II II II II
According to the online version of the Merriam-Webster Dictionary, the term _____
II II II II II II II II II II II II
means "to steal and pass off the ideas or words of another as one's own." - plagiarize
II II II II II II II II II II II II II II II II II II II
Two of the most common ways individuals are harassed online are cyberbullying and
II II II II II II II II II II II II II
_____. - cyberstalking
II II II II II
Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of
II II II II II II II II II II II II II II II
the hacker at that time. - False
II II II II II II II II II
Which of the following provides leadership in addressing issues that may impact the
II II II II II II II II II II II II II
future of the Internet? - The Internet society
II II II II II II II II II II
, In the accompanying figure, box _____ denotes the area where the email sent by a user
II II II II II II II II II II II II II II II II
is stored until the recipient opens the email. - D
II II II II II II II II II II II II
Denial of service attacks today are often directed toward popular or controversial sites
II II II II II II II II II II II II II
and typically are carried out via multiple computers. This is known as a concentrated
II II II II II II II II II II II II II II
denial of service attack. - False
II II II II II II II II
II Facebook is an example of a(n) _____. - social networking site II II II II II II II II II II II II
The best protection against many dot cons is to protect any identifying information about
II II II II II II II II II II II II II II
oneself that could be used in fraudulent activities. - True
II II II II II II II II II II II II
_________ involves maneuvering in a car with a portable device looking for unsecured
II II II II II II II II II II II II II
Wi-Fi networks to connect to. - War driving
II II II II II II II II II II
Keisha decides to set up a cable Internet connection. She will require a _____ for this
II II II II II II II II II II II II II II II II
cable service. - cable modem
II II II II II II II
A user has to provide a valid password to gain access to a vault in a bank. In addition to
II II II II II II II II II II II II II II II II II II II II
this, the vault opens only when the user's fingerprint matches the fingerprint data stored in
II II II II II II II II II II II II II II II
the database or when a valid smartcard is swiped. The authentication method used here
II II II II II II II II II II II II II II
is _____. - two-factor authentication
II II II II II II II
Pablo, a content writer, receives a text message, on his cellphone, containing details
II II II II II II II II II II II II II
about a job offer. The type of message received by Pablo is called _____. - Short
II II II II II II II II II II II II II II II II II II
Message Service (SMS)
II II II
According to the online version of the Merriam-Webster Dictionary, the term plagiarize
II II II II II II II II II II II II
means "to use another's production by crediting the source." - False
II II II II II II II II II II II II II
Rihanna owns a publication in New Jersey. She uses a Web-based software, Open
II II II II II II II II II II II II II
Journals, to manage her publication works. She often downloads many Web-based
II II II II II II II II II II II
applications needed for her work. Here, _____ are the companies that distribute Web-
II II II II II II II II II II II II II
based software facilities to Rihanna over the Internet. - application service providers
II II II II II II II II II II II II II
Heidi wants to create a collaborative Web page that allows modification by multiple
II II II II II II II II II II II II II
individuals. Here, Heidi is creating a ____. - wiki
II II II II II II II II II II II
Pharming most often takes place via a company's DNS server, which routes Web page
II II II II II II II II II II II II II II
requests corresponding to company URLs. - True
II II II II II II II II II
According to the FBI, organized crime organizations in many countries are increasingly
II II II II II II II II II II II II
turning to computer crime to target millions of potential victims. - True
II II II II II II II II II II II II II II
_________ occurs whenever an individual gains admission to a computer, network, file,
II II II II II II II II II II II II
or other computing resource without permission. - Unauthorized access
II II II II II II II II II II II
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ScholarSuccess. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.