100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cosc 1301 Ch 5 & 6 exam Newest $10.49   Add to cart

Exam (elaborations)

Cosc 1301 Ch 5 & 6 exam Newest

 2 views  0 purchase
  • Course
  • Cosc 1301
  • Institution
  • Cosc 1301

Cosc 1301 Ch 5 & 6 exam Newest

Preview 2 out of 8  pages

  • August 24, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cosc 1301
  • Cosc 1301
avatar-seller
ScholarSuccess
Cosc 1301 Ch 5 & 6 exam Newest
_____ are the ruling bodies of countries that can pass laws that impact both the
II II II II II II II II II II II II II II



information available via the Web and the access their citizens have to the Internet. -
II II II II II II II II II II II II II II II II II



Governments
II




Bluewood Hospital uses a connection that allows its patients and visitors to connect their
II II II II II II II II II II II II II II



devices wirelessly to the Internet. Here, Bluewood Hospital has created a _____. - Wi-Fi
II II II II II II II II II II II II II II II II



hotspot
II




In the accompanying figure, boxes _____ denote the transfer of an email from a sender's
II II II II II II II II II II II II II II II



mail server to a receiver's mail server. - B-D
II II II II II II II II II II II




To avoid plagiarizing Web page content, one should credit Web page sources when they
II II II II II II II II II II II II II II



are used in papers, on Web pages, or in other documents. - True
II II II II II II II II II II II II II II II




II _____ is the complete malfunction of a computer. - System failure
II II II II II II II II II II II II




John has a laptop that has survived many drops over concrete and withstood extreme
II II II II II II II II II II II II II II



temperature variations. John's laptop can be categorized as a _____. - ruggedized
II II II II II II II II II II II II II II



device
II




Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop.
II II II II II II II II II II II II II II II II



Therefore, she decides to install closed-circuit security cameras in her shop to prevent
II II II II II II II II II II II II II



future robberies. Identify the technology Helen has used. - Video surveillance
II II II II II II II II II II II II II




_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus
II II II II II II II II II II II II II II II II II



Web site set up by a person to obtain users' personal information. - Pharming
II II II II II II II II II II II II II II II II




Which of the following is a recorded audio or video file that can be downloaded via the
II II II II II II II II II II II II II II II II II



Internet? - A podcast
II II II II II II




According to the online version of the Merriam-Webster Dictionary, the term _____
II II II II II II II II II II II II



means "to steal and pass off the ideas or words of another as one's own." - plagiarize
II II II II II II II II II II II II II II II II II II II




Two of the most common ways individuals are harassed online are cyberbullying and
II II II II II II II II II II II II II



_____. - cyberstalking
II II II II II




Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location of
II II II II II II II II II II II II II II II



the hacker at that time. - False
II II II II II II II II II




Which of the following provides leadership in addressing issues that may impact the
II II II II II II II II II II II II II



future of the Internet? - The Internet society
II II II II II II II II II II

, In the accompanying figure, box _____ denotes the area where the email sent by a user
II II II II II II II II II II II II II II II II



is stored until the recipient opens the email. - D
II II II II II II II II II II II II




Denial of service attacks today are often directed toward popular or controversial sites
II II II II II II II II II II II II II



and typically are carried out via multiple computers. This is known as a concentrated
II II II II II II II II II II II II II II



denial of service attack. - False
II II II II II II II II




II Facebook is an example of a(n) _____. - social networking site II II II II II II II II II II II II




The best protection against many dot cons is to protect any identifying information about
II II II II II II II II II II II II II II



oneself that could be used in fraudulent activities. - True
II II II II II II II II II II II II




_________ involves maneuvering in a car with a portable device looking for unsecured
II II II II II II II II II II II II II



Wi-Fi networks to connect to. - War driving
II II II II II II II II II II




Keisha decides to set up a cable Internet connection. She will require a _____ for this
II II II II II II II II II II II II II II II II



cable service. - cable modem
II II II II II II II




A user has to provide a valid password to gain access to a vault in a bank. In addition to
II II II II II II II II II II II II II II II II II II II II



this, the vault opens only when the user's fingerprint matches the fingerprint data stored in
II II II II II II II II II II II II II II II



the database or when a valid smartcard is swiped. The authentication method used here
II II II II II II II II II II II II II II



is _____. - two-factor authentication
II II II II II II II




Pablo, a content writer, receives a text message, on his cellphone, containing details
II II II II II II II II II II II II II



about a job offer. The type of message received by Pablo is called _____. - Short
II II II II II II II II II II II II II II II II II II



Message Service (SMS)
II II II




According to the online version of the Merriam-Webster Dictionary, the term plagiarize
II II II II II II II II II II II II



means "to use another's production by crediting the source." - False
II II II II II II II II II II II II II




Rihanna owns a publication in New Jersey. She uses a Web-based software, Open
II II II II II II II II II II II II II



Journals, to manage her publication works. She often downloads many Web-based
II II II II II II II II II II II



applications needed for her work. Here, _____ are the companies that distribute Web-
II II II II II II II II II II II II II



based software facilities to Rihanna over the Internet. - application service providers
II II II II II II II II II II II II II




Heidi wants to create a collaborative Web page that allows modification by multiple
II II II II II II II II II II II II II



individuals. Here, Heidi is creating a ____. - wiki
II II II II II II II II II II II




Pharming most often takes place via a company's DNS server, which routes Web page
II II II II II II II II II II II II II II



requests corresponding to company URLs. - True
II II II II II II II II II




According to the FBI, organized crime organizations in many countries are increasingly
II II II II II II II II II II II II



turning to computer crime to target millions of potential victims. - True
II II II II II II II II II II II II II II




_________ occurs whenever an individual gains admission to a computer, network, file,
II II II II II II II II II II II II



or other computing resource without permission. - Unauthorized access
II II II II II II II II II II II

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ScholarSuccess. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart