Which of the following is NOT true of a Wi-Fi network? (Page-59)
Many home users set them up.
A Wi-Fi's Internet service can be dial-up access.
Wi-Fi networks send signals to a communications device that is connected to a high-speed Internet service.
Many public locations are Wi-Fi hot spots.
2. Multiple Choice
2 minutes
1 pt
What is the term for an electronic document on the web that can contain text, graphics, animation, audio (sound), and video? (Page-65)
Webpage
Web reader
Webnet
Web host
3. Multiple Choice
2 minutes
1 pt
Which of the following is a collection of related webpages and associated items, such as documents and pictures, stored on a web server? (page-65)
Website
Internet host
server reader
browser app
4. Multiple Choice
2 minutes
1 pt
Which of the following is application software that allows users to access and view webpages? (Page-65)
reader
host
browser
server
5. Multiple Choice
2 minutes
1 pt
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites? (Page-66)
spoofing
proxy
pop-up
phishing
6. Multiple Choice
2 minutes
1 pt
Which of the following is a program that finds websites and webpages? (Page-71)
microbrowser
web finder
location utility
search engine
7. Multiple Choice
2 minutes
1 pt
Which of the following is a program that extends the capability of a browser? (Page-88)
player
rebrowser
plug-in
publisher
8. Multiple Choice
2 minutes
1 pt
For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages? (Page-90)
email
FTP
instant messaging
all are corrects
9. Multiple Choice
2 minutes
1 pt
Which of the following is true of VoIP? (Page-92)
It uses a slow speed dial-up connection.
It uses the public switched telephone network.
Skype is an example of VoIP software.
all are corrects
10. Multiple Choice
2 minutes
1 pt
Which of the following is the process of transferring files from a computer to a server on the Internet? (Page-92)
uploading
downloading
streaming
flowing
11. Multiple Choice
2 minutes
1 pt
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online? (Page-94)
netiquette
web politesse
internet behavior
web civility
12. Multiple Choice
2 minutes
1 pt
What is the term for characters, such as :) or :( , used to express emotion in an email message or newsgroup article? (Page-94)
spam
emoticons
FAQs
flames
13. Multiple Choice
2 minutes
1 pt
If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the web, which of the following is she using? (Page-59)
FFT
a hot spot
SIS
Fixed Limited Online Access Transport (FLOAT)
14. Multiple Choice
2 minutes
1 pt
What is the purpose of an Internet Protocol address (IP address)? (Page-62)
It specifies whether a computer is using a broadband network or a direct-dial network.
It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data.
It contains the protocol schema used to identify whether the computer is on a wired or wireless network.
It uniquely identifies the location of each computer or device connected to the Internet.
15. Multiple Choice
2 minutes
1 pt
In Internet terminology, what is the term, google.com, called? (Page-63)
domain name
webpage protocol
Internet service provider
TLD
16. Multiple Choice
2 minutes
1 pt
Which of the following are valid TLDs? (Page-63)
com, net, bmk
gov, org, net
mil, com, ipv
www, edu, com
17. Multiple Choice
2 minutes
1 pt
What is the World Wide Web? (Page-65)
a database of every document stored on computers worldwide
the wiring and cabling used to connect computers on the Internet
a worldwide collection of electronic documents
a set of electronic documents diagramming and charting all the worldwide Internet connections
18. Multiple Choice
2 minutes
1 pt
A Uniform Resource Locator(URL) is the same as which of the following? (Page-67)
client DNS
push-pull mechanism
Web address
Hypertext Transfer Protocol (HTTP)
19. Multiple Choice
2 minutes
1 pt
You have a new application that is taking full advantage of the features of your smartphone, including the touch screen and an embedded GPS receiver. What kind of application is this? (Page-69)
desktop app
mobile app
web app
tablet app
20. Multiple Choice
2 minutes
1 pt
What is the difference between a wiki and a blog? (Page-78)
Businesses create blogs but they do not create wikis.
Home users can use blogs but not wikis.
Blogs allow the sharing of ideas from all people while wikis allow sharing from only a single person.
Users can modify posts in a wiki but they cannot modify posts made by a blogger.
21. Multiple Choice
2 minutes
1 pt
If someone displays a webpage in a browser and the page indicates Flash Player is needed, what is Flash Player? (Page-87)
a plug in
a media compesator
a streamer
a different browser than the one being used
22. Multiple Choice
2 minutes
1 pt
. If someone’s boss wanted to send a message to an employee that contains both a video and a Word processing document, which Internet service would be the most appropriate for her to use? (Page-88)
instant messaging
VoIP
chat
email
23. Multiple Choice
2 minutes
1 pt
IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY? (Page-94)
THE EMAIL IS IMPORTANT.
THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY.
THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.
THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING.
24. Multiple Choice
2 minutes
1 pt
What term is used to describe the harassment of computer users through various forms of Internet communications? (Page-94)
online harassment
real-time terrorism
internet oppression
cyberbullying
25. Multiple Choice
2 minutes
1 pt
Which of the following is an example of an operating system? (Page-108)
C++
C#
windows
visual basic
26. Multiple Choice
2 minutes
1 pt
Which of the following is the term for unsolicited mail messages? (Page-110)
e-junk
malware
spam
mail output
27. Multiple Choice
30 seconds
1 pt
Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer? (Page-143)
lower back pain
high blood pressure
emotional fatique
muscle fatique
28. Multiple Choice
2 minutes
1 pt
Which of the following do you need to verify that you are the holder of the bank card at your local bank branch? (page-118)
skimmer
PIN
account code
transaction ID
29. Multiple Choice
30 seconds
1 pt
A thief has unfortunately captured your ATM card number by placing a panel on top of the face of an ATM, which was virtually undetectable to you. What is this technology called? (Page-119)
skimmer
digimask
PIN CAPTCHA
transaction thief
30. Multiple Choice
2 minutes
1 pt
Recent photos you captured are low in quality. What is one of the first things to check? (Page-127)
batteries
resolution
lens cap
distance
31. Multiple Choice
2 minutes
1 pt
Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace of mind when it comes to a reliable power source for your computer. Which of the following could help? (Page-141)
GPS
UPS
Wi-Fi
server virtualization
32. Multiple Choice
2 minutes
1 pt
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks? (Page-158)
application
operating
utility
system
33. Multiple Choice
2 minutes
1 pt
What is the term for a square-shaped coded graphic that corresponds to a web address or other information? (Page-178)
ISBN code
USPS code
bar code
QR code
34. Multiple Choice
2 minutes
1 pt
Which of the following is a utility that detects and protects a computer from unauthorized intrusions? (Page-189)
personal firewall
threat neutralizer
antihacker
protection utility
35. Multiple Choice
2 minutes
1 pt
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service? (page-192)
spyware
adware
phishing
trojan horse
36. Multiple Choice
2 minutes
1 pt
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox? (page-193)
email
filtering
sieve
anti-spam
37. Multiple Choice
2 minutes
1 pt
Which the following is a filtering program that stops pop-up ads from displaying on web pages? (page-193)
firewall
pop-up remover
pop-up filter
pop-up blocker
38. Multiple Choice
2 minutes
1 pt
Which of the following is a utility that removes a program, as well as any associated entries in the system files? (Page-195)
application remover
uninstaller
application purger
antiapp utilituy
39. Multiple Choice
2 minutes
1 pt
Which of the following are uses for application software? (page-158)
to make users more productive
to serve as the interface between the user and the computer hardware
to assist users with controlling or maintaining the operation of a computer
to make business activities more difficult and, therefore, more secure
40. Multiple Choice
2 minutes
1 pt
Which type of software has no restrictions from the copyright holder regarding modifications of the software’s internal instructions and its redistribution? (Page-161)
shareware
open source software
custom software
system software
41. Multiple Choice
2 minutes
1 pt
You compose a new song and you now have exclusive rights to sell your song. Of which of the following is this an example? (Page-161)
trademarking
private domain
intellectual publication
copyright
42. Multiple Choice
2 minutes
1 pt
What kind of file does Adobe Reader allow you to view? (Page-176)
FFT
PDF
DOC
PDT
43. Multiple Choice
2 minutes
1 pt
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? (Page-190)
a virus
a Trojan horse
a worm
a rootkit
44. Multiple Choice
2 minutes
1 pt
Antivirus programs look for a specific pattern of virus code. What is this pattern called? (page-192)
virus map
virus index
virus signature
virus identifier
45. Multiple Choice
2 minutes
1 pt
A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this? (Page-191)
adware
spyware
phishing application
filter
46. Multiple Choice
2 minutes
1 pt
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability? (page 212)
digital security risk
technical terrorism
information liability
network compromise
47. Multiple Choice
2 minutes
1 pt
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? (Page-214)
hacker
cyberextortionist
script kiddie
cyberterrorist
48. Multiple Choice
2 minutes
1 pt
Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons? (Page-214)
hacker
cyberextortionist
script kiddie
cyberterrorist
49. Multiple Choice
2 minutes
1 pt
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following? (page-215)
malware
threats
untrusted sources
cybermalls
50. Multiple Choice
2 minutes
1 pt
What is the term for a program that performs a repetitive task on a network? (page-216)
zombie
botnet
rootkit
Trojan horse
51. Multiple Choice
2 minutes
1 pt
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? (page-217)
rebuking
transmitting
spoofing
victtimizing
52. Multiple Choice
2 minutes
1 pt
Which of the following is a program or set of instructions in a program that allows users to bypass security controls? (Page-217)
keygens
rootkit
indices
backdoor
53. Multiple Choice
2 minutes
1 pt
Which of the following is not a security product developer? (page-220)
Adobe
McAfee
AVG
Symantec
54. Multiple Choice
2 minutes
1 pt
Which of the following can transmit germs? (Page-226)
iris recognition systems
face recognition systems
hand geometry systems
digital forensics systems
55. Multiple Choice
2 minutes
1 pt
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process? (Page-229)
re-securing
assessment
decryption
digization
56. Multiple Choice
2 minutes
1 pt
What occurs when someone steals personal or confidential information? (page-229)
information theft
fraud
corruption
compaction
57. Multiple Choice
2 minutes
1 pt
Which of the following provides the mobile user with a secure connection to the company network server? (page-230)
XPN
TPN
SPN
VPN
58. Multiple Choice
2 minutes
1 pt
Which of the following categories are the rights to which creators are entitled for their work? (Page-240)
community property
creative
intellectual property
ethical
59. Multiple Choice
2 minutes
1 pt
Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials? (page-240)
intellectual property deed
access right
content license
copyright
60. Multiple Choice
2 minutes
1 pt
Internet advertising firms often use which of the following to collect information about users web browsing habits? (page-245)
comware
spyware
postware
billware
61. Multiple Choice
2 minutes
1 pt
Which of the following best describes the term, cybercrime? (Page-212)
online or Internet-based illegal acts
any illegal act involving a computer
a type of gaming software that simulates criminal acts
using the Internet to apprehend and prosecute criminals
62. Multiple Choice
2 minutes
1 pt
Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action? (Page-214)
script kiddie
cyberextortionist
cracker
cyberterrorist
63. Multiple Choice
2 minutes
1 pt
Which of the following statements is not true about Internet and network attacks? (page-214)
No central administrator is present on the Internet.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
64. Multiple Choice
2 minutes
1 pt
The term, zombie, is _____________. (Page-216)
a program that performs a repetitive task on a network
spam sent via email to spread viruses or commit a distributed denial of service attack
a group of compromised computers connected to a network that attacks other networks
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
65. Multiple Choice
2 minutes
1 pt
The term firewall is _____________. (page-219)
the access point a hacker uses to intrude on a computer or network
a program that searches for cybercriminals by looking for patterns in attacks
hardware and/or software that protects a network’s resources from intrusion
a virus that prevents the computer or network from accessing outside resources
66. Multiple Choice
2 minutes
1 pt
Which of the following does your daughter's daycare use to verify the identity of parents who pick up their children? (page-225)
face recognition system
iris recognition system
digital forensics system
hand geometry system
67. Multiple Choice
2 minutes
1 pt
The term, PIN, is an acronym for which of the following? (page-223)
personal identification number
possessed information number
private Internet notification
personal information network
68. Multiple Choice
2 minutes
1 pt
Which of the following does your new smartphone use to unlock the device? (page-225)
hand geometry system
iris recognition system
face recognition system
digital forensics system
69. Multiple Choice
2 minutes
1 pt
Which of the following does your financial service institution use to secure the transactions you make using their phone banking service? (page-225)
digital forensics system
iris recognition system
voice verification system
hand geometry system
70. Multiple Choice
2 minutes
1 pt
Which of the following statements is not true about biometric devices? (page-226)
Personal characteristics are unique and cannot be forgotten or misplaced.
Biometric devices are an unreliable method of identification and notification.
Examples include fingerprint readers and hand geometry systems.
Biometric devices translate a personal characteristic into a digital code.
71. Multiple Choice
2 minutes
1 pt
Which of the following statements is not true about intellectual property rights? (page-240)
The term fair use refers to the rights which creators are entitled for their work.
Intellectual property refers to unique and original works such as ideas, inventions, company logos, and more.
A copyright protects any tangible form of expression.
Digital rights management is a strategy designed to prevent illegal distribution of digital content.