Term
|
Definition
Software such as _____ is used by both students and teachers to find plagiarism problems. |
|
|
Term
|
Definition
Online newspapers can be delivered through _____ to news readers. |
|
|
Term
|
Definition
Which of the following is an example of digital media? |
|
|
Term
|
Definition
Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless. |
|
|
Term
|
Definition
The digital _____ method of writing has made plagiarism easy and ever more common. |
|
|
Term
|
Definition
Which of the following organizations has been instrumental in fighting piracy through the use of lawsuits and legislation? |
|
|
Term
|
Definition
Companies such as _____ have connected with libraries to digitize millions of books |
|
|
Term
|
Definition
A general-purpose computer relies on the _____ being used to perform an activity. |
|
|
Term
|
Definition
The DMCA was drafted and passed by the _____. |
|
|
Term
|
Definition
_____ media is programming or music that can be accessed any time of the day, regardless of television and radio schedules. |
|
|
Term
|
Definition
A _____ gives the holder exclusive rights to use an invention for 20 years. |
|
|
Term
the length of the songs supported |
|
Definition
Services using DRM technology usually include all of the following restrictions EXCEPT _____. |
|
|
Term
It outlaws the distribution of software meant to crack DRM code |
|
Definition
Which of the following is true of the Digital Millennium Copyright Act? |
|
|
Term
|
Definition
A computer relies on the combination of _____ and _____ to turn input into output. |
|
|
Term
|
Definition
Due to the _____ of intellectual property, distribution of content is much faster and easier than it was in the past. |
|
|
Term
|
Definition
Which of the following will protect intellectual property for the life of the holder plus 70 years? |
|
|
Term
|
Definition
The term _____ best describes the level of technology skills needed in today’s business world. |
|
|
Term
|
Definition
The prefix Giga represents approximately one _____ units of information. |
|
|
Term
|
Definition
A _____ can represent a digit, a letter, or a color. |
|
|
Term
|
Definition
A computer uses _____ to display an image after it has been digitized. |
|
|
Term
|
Definition
ASCII is the encoding standard used to represent _____ in digital form. |
|
|
Term
|
Definition
The Unicode encoding scheme is used to add support for _____ character sets. |
|
|
Term
|
Definition
The _____ system is used to represent RGB color in digital graphics. |
|
|
Term
|
Definition
What two values represent the binary number system? |
|
|
Term
|
Definition
The _____ system, which uses only two digits, 1 and 0, is commonly used for representing values in computers. |
|
|
Term
|
Definition
Cloud computing is not possible without _____. |
|
|
Term
|
Definition
Windows cleaners maintain the _____ for more effective system operation. |
|
|
Term
|
Definition
Linux is _____ software, which means users can manipulate the source code to customize their operating system to their needs. |
|
|
Term
|
Definition
An advantage of _____ software is its ability to run more than one operating system on a computer. |
|
|
Term
|
Definition
A _____ provides content that is accessible on the World Wide Web. |
|
|
Term
|
Definition
Performing a system _____ utility rearranges your files on disk in an orderly fashion, resulting in faster access. |
|
|
Term
|
Definition
Through the use of _____, one physical server can run several server operating systems. |
|
|
Term
|
Definition
A popular term used to identify devices such as the iPad is _____. |
|
|
Term
|
Definition
When you combine a system's hardware configuration and operating system, it is sometimes called the computer's _____. |
|
|
Term
|
Definition
When a smart phone goes into _____ mode, pressing a button immediately turns it back on. |
|
|
Term
|
Definition
Users of iPods and iPhones are well acquainted with the process of _____ files. |
|
|
Term
|
Definition
A Kindle eBook reader is an example of a(n) _____ computer. |
|
|
Term
|
Definition
The largest servers are called _____ servers. |
|
|
Term
|
Definition
The large tower case that houses a desktop PC’s circuit boards is known as the _____. |
|
|
Term
|
Definition
The most powerful type of computer is a _____. |
|
|
Term
|
Definition
The purpose of the ____ is to store the boot process instructions for the computer to start up |
|
|
Term
|
Definition
Which of the following uses the New Technology File System (NTFS) for organizing and managing files? |
|
|
Term
|
Definition
The ____ operating system provides the technological foundation of the Mac OS X. |
|
|
Term
|
Definition
A cell phone’s ____ operating system is not released to users and developers. |
|
|
Term
|
Definition
A(n) ____ operating system is required to perform a command within a certain time frame. |
|
|
Term
|
Definition
Typing the word DEL on a prompt line to remove unwanted files on your computer is an example of using a ____ user interface. |
|
|
Term
|
Definition
A unique feature of ____ is that users can easily add enhancements to the operating system. |
|
|
Term
|
Definition
Using the web as a primary user interface to access such applications as Google Docs is an example of ____. |
|
|
Term
|
Definition
Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another. |
|
|
Term
|
Definition
Thanks to ____ files, a website can recognize you and cater to your individual tastes each time you visit. |
|
|
Term
|
Definition
The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate. |
|
|
Term
|
Definition
We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives. |
|
|
Term
|
Definition
Thanks to ____, you can watch a movie as it is being downloaded from the Internet. |
|
|
Term
|
Definition
A type of connection that provides Internet service through a phone line that services both the Internet and your phone is ____. |
|
|
Term
|
Definition
To acquire an online presence, you can subscribe to a web ____ service that will store your files for users to access. |
|
|
Term
|
Definition
Cookie files contain ____. |
|
|
Term
|
Definition
____ is credited with the development of the web. |
|
|
Term
|
Definition
The ____ oversees the setup, maintenance, and implementation of a network in a business environment. |
|
|
Term
|
Definition
Many cities have adopted ____ technology to provide faster Internet speed to their users. |
|
|
Term
|
Definition
Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n) ____. |
|
|
Term
|
Definition
One focus of the Internet2 is to improve ____. |
|
|
Term
|
Definition
____ technology enables you to connect to your cell phone through a display on your car’s dashboard. |
|
|
Term
|
Definition
Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience. |
|
|
Term
|
Definition
Bluetooth is an example of a technology used with a ____ area network. |
|
|
Term
|
Definition
Using ____ technologies, scientists are able to share virtual environments for research within a variety of locations. |
|
|
Term
|
Definition
Combining voice, video, and data communications into one interface is known as ____ communications. |
|
|
Term
|
Definition
____ is a popular software program that can be used to manage podcasts. |
|
|
Term
|
Definition
The ____ bill demonstrated the conflict between Internet snooping and Internet user privacy. |
|
|
Term
|
Definition
A(n) ____ is a company that provides a subscriber with access to the Internet. |
|
|
Term
|
Definition
____ is commonly used to enable web browsers to communicate with web servers. |
|
|
Term
|
Definition
A new fourth-generation technology called ____ is competing to become the wireless network of choice for high-speed connectivity. |
|
|
Term
|
Definition
A typical setup for a ____ network would include computer users sharing a single Internet connection. |
|
|
Term
|
Definition
A ____ network is used when a user wants to make his or her computer and others’ computers available for access. |
|
|
Term
|
Definition
It is much easier for people to remember ____ than IP addresses of websites. |
|
|
Term
|
Definition
The Internet backbone uses mostly ____ cabling for transmitting data between users. |
|
|
Term
|
Definition
____ defines how information travels across the Internet. |
|
|
Term
|
Definition
The job of the ____ computer is to support a large amount of user requests simultaneously. |
|
|
Term
|
Definition
Data ____ travel over the Internet from router to router until reaching their destinations. |
|
|
Term
|
Definition
All devices attached to a network are identified as ____. |
|
|
Term
|
Definition
Networks designed to serve an entire city are called ____ area networks. |
|
|
Term
|
Definition
A(n) ____ connects LANs and MANs between cities, across countries, and around the world. |
|
|
Term
|
Definition
Playing online Scrabble with others on the web at any given time is an example of a ____ gaming experience. |
|
|
Term
|
Definition
The popularity of ____ has encouraged everyday users to share events of the day. |
|
|
Term
|
Definition
The most popular search engines use ____ to store information about webpages. |
|
|
Term
|
Definition
When using ____ as a Service, a business does not have to oversee the storage, backup, or security of its data. |
|
|
Term
|
Definition
Google relies on ____ to relay information related to its mapped software. |
|
|
Term
|
Definition
Wikis encourage ____ to build content that can be constantly added, removed, and edited. |
|
|
Term
|
Definition
The reason online content cannot always be trusted is the lack of ____ on the web. |
|
|
Term
|
Definition
When evaluating information provided on the web, always consider the ____. |
|
|
Term
|
Definition
Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes. |
|
|
Term
|
Definition
The online retailer ____ is one of the largest suppliers of cloud services. |
|
|
Term
|
Definition
____________________ delivers a variety of computing resources from the Internet as a service to relieve users from the burden of installing, maintaining, and securing those resources themselves. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible |
|
|
Term
|
Definition
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____. |
|
|
Term
|
Definition
Google Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items |
|
|
Term
|
Definition
In the United States, the ____ oversees the handling of Internet traffic. |
|
|
Term
|
Definition
Which of the following is another name for ecash? |
|
|
Term
the digital information genetated about a person by organizations |
|
Definition
Each person’s digital shadow is ____. |
|
|
Term
|
Definition
Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications. |
|
|
Term
freely tag friends in your photos |
|
Definition
Some netiquette rules to consider when using social media include all of the following EXCEPT ____. |
|
|
Term
content-filtering software |
|
Definition
Net Nanny is an example of ____. |
|
|
Term
may increase the likelihood of violence in the real world, but to date the studies are not conclusive |
|
Definition
Violence in a virtual world ____. |
|
|
Term
|
Definition
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it’s not true. |
|
|
Term
at Macy's in New York City |
|
Definition
The first known flash mob happened ____. |
|
|
Term
with the advent of chat rooms and electronic mail |
|
Definition
The idea of digital etiquette came into being ____. |
|
|
Term
|
Definition
Which of the following is an example of a repetitive stress injury? |
|
|
Term
|
Definition
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults. |
|
|
Term
|
Definition
Of the following, ____ contains the most information about citizens of the United States. |
|
|
Term
|
Definition
An individual who illegally downloads copyright-protected software is referred to as a ____. |
|
|
Term
|
Definition
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. |
|
|
Term
|
Definition
An item such as a smart card is an example of the ____ form of authentication. |
|
|
Term
|
Definition
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. |
|
|
Term
|
Definition
____ favor(s) an Internet that is open, with packets unexamined and unfiltered |
|
|
Term
|
Definition
You can protect yourself from identity theft by using ____ when transmitting information over network connections. |
|
|
Term
|
Definition
|
|
Term
|
Definition
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted. |
|
|
Term
network behavioral targeting |
|
Definition
Of the following, ____ is considered the most invasive. |
|
|
Term
|
Definition
All of the following are examples of malware EXCEPT ____. |
|
|
Term
analyze large amounts of data |
|
Definition
A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. |
|
|
Term
|
Definition
Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____. |
|
|
Term
|
Definition
A common form of authentication is a ____. |
|
|
Term
|
Definition
____ can tell more about a person than all other kinds of electronic surveillance. |
|
|
Term
|
Definition
Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries. |
|
|
Term
|
Definition
An email with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of a ____ scam. |
|
|
Term
|
Definition
In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what’s kept about them is the ____. |
|
|
Term
|
Definition
____ is a form of traffic shaping. |
|
|
Term
|
Definition
A company called ____ provides digital certifications for web transactions. |
|
|
Term
|
Definition
____ permissions provide registered users with access to the files they need, while restricting access to private resources. |
|
|
Term
|
Definition
When using a public Wi-Fi network, when is it safe to send private information over the network? |
|
|
Term
|
Definition
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack. |
|
|
Term
developing software to analyze the massive amount of data |
|
Definition
The biggest challenge posed by Big Data is ____. |
|
|
Term
|
Definition
The ____ was established to secure and monitor security risks to U.S. networks and the Internet. |
|
|
Term
|
Definition
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data. |
|
|
Term
|
Definition
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources. |
|
|
Term
|
Definition
Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws. |
|
|
Term
Select strong passwords and change them regulary |
|
Definition
Which of the following is one realistic way to promote Internet security? |
|
|
Term
|
Definition
A ____ may be used to filter data that may be undesirable. |
|
|
Term
|
Definition
A ____ allows hackers to gain access to important code or information in a software program. |
|
|
Term
|
Definition
The https:// protocol in a URL indicates the use of a(n) ____ by the website. |
|
|
Term
|
Definition
Citizens of free and democratic nations expect, at the least, privacy ____. |
|
|
Term
the U.S. federal government |
|
Definition
The Total Information Awareness tracking information system was created by ____. |
|
|
Term
is still implemented by some states |
|
Definition
|
|
Term
Lack of funding and personnel |
|
Definition
____ is currently dampening the ability of government surveillance to grow. |
|
|
Term
|
Definition
IT Access for Everyone is an initiative for increasing access to digital technology for ____. |
|
|
Term
geographic positioning systems |
|
Definition
The introduction of _____ on cell phones was the first step toward realizing augmented reality. |
|
|
Term
|
Definition
Interactive media are most prominent in the _____ industry |
|
|
Term
|
Definition
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings |
|
|
Term
|
Definition
Programs such as ____ support energy conservation for electronic devices. |
|
|
Term
|
Definition
Personal computer ethics involves ____. |
|
|
Term
|
Definition
One use for a(n) ____ is to search a database for information pertaining to a specific query. |
|
|
Term
|
Definition
Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____. |
|
|
Term
|
Definition
Users can interact in a virtual reality environment through the use of _____. |
|
|
Term
|
Definition
Geographical technology advances to the iPhone such as user location and _____ software have improved augmented reality. |
|
|
Term
|
Definition
Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet. |
|
|
Term
They reduce the energy used in displays |
|
Definition
Why are LEDs used in green computing? |
|
|
Term
|
Definition
AI applications are ways in which AI methodologies are applied to ____ and provide services. |
|
|
Term
|
Definition
Searching the Web for the best deal on an airline flight is a good example of ____ at work. |
|
|
Term
|
Definition
_____ make up a large portion of the interactive media market. |
|
|
Term
the choices and behaviors made by individuals |
|
Definition
Personal ethics deals with ____. (Choose the best answer.) |
|
|
Term
|
Definition
The ability of people with disabilities to interact with and make use of computer resources is known as ____. |
|
|
Term
|
Definition
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds? |
|
|
Term
|
Definition
Ethics is a branch of philosophy that deals with issues of |
|
|
Term
U.S. Department of Education |
|
Definition
The _____________________ has developed requirements for Accessiblee Software Design to ensure that all software used in schools is accessible to all students, faculty, and staff. |
|
|
Term
|
Definition
The _________________ broke new ground for game consoles by introducing a wireless, motion-sensitive game controller. |
|
|
Term
|
Definition
_______________ have brought the gaming world to increasing numbers of adults. |
|
|
Term
|
Definition
|
|