Shared Flashcard Set

Details

cyber crime chapter 2
multiple choice
20
Computer Science
Undergraduate 2
10/18/2014

Additional Computer Science Flashcards

 


 

Cards

Term

For what purpose did British scientists build Colossus I?

    
 
word processing
exact_answer none 16016
 
 
    
 
forensic analysis
exact_answer none 15263
 
 
    
             
census tabulation
exact_answer none 16181
 
 
 
   
 
cryptanalysis
 
Definition

 

 

cryptanalysis

 

Term

What is the term used to describe the final destination of discarded, lost, or destroyed data?

    
 
dead bit office
exact_answer none 11097
 
 
    
 
back door
exact_answer none 78162
 
 
   
             
bit bucket
exact_answer none 36867
 
 
 
    
 
sneaker closet
 
Definition

 

 

bit bucket

 

Term

What is the most important component of a computer?

   
 
CPU
exact_answer none 33270
 
 
    
 
random access memory
 
exact_answer none 16138
 
 
             
motherboard
exact_answer none 86913
 
 
 
    
 
universal serial bus
Definition

 

 

motherboard

 

Term

Which of the following tells the computer in which order to access drives?

 
             
boot sequence
exact_answer none 25908
 
 
 
   
 
operating system
exact_answer none 35012
 
 
    
 
random access memory
exact_answer none 75668
 
 
   
 
application software
 
Definition

 

 

boot sequence

 

Term

What is the purpose of random access memory in the computer system?

    
 
to store easily accessible information permanently
exact_answer none 44928
 
 
   
 
to transfer several bits of data simultaneiously
exact_answer none 26527
 
 
   
 
to monitor data usage
exact_answer none 9295
 
 
 
            
to temporarily store information
 
Definition
 
 
to temporarily store information
 

 

Term

Which Windows operating system paved the way for the development of peer-to-peer networks?

   
            
Windows NT 3.1
exact_answer none 18934
 
 
 
   
 
Windows 95
exact_answer none 90021
 
 
    
 
Windows 2.0
exact_answer none 44942
 
 
    
 
Windows 98 SE
 
Definition

   

 
Windows NT 3.1
 

 

Term

Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

 

 
Trojan Horse

 

 
malware


 
worm
Definition
 
worm
Term

What is Gopher?


 
an information retrieval tool
 
an Internet service provider
 
an e-mail system
 
a low-cost video conferencing facility
Definition
 
an information retrieval tool
Term

Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?


 
hyptertext transfer protocol
 
shell
 
World Wide Web
 
packets
Definition
 
World Wide Web
Term

Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

 
cheaper than printed publications
 
perception of Second Amendment protection
 
lack of regulations
 
possibility of complete globalization
Definition
 
perception of Second Amendment protection
Term

Which of the following refers to the unauthorized attempt to gain access to information about a system?

 

 
clickjacking

 

 
baud

 


 
banner grabbing


 
probe
Definition
 
probe
Term

How are websites identified?

 
through post office protocol
 
through domain name system

through uniform resource locator
 
through Internet message access protocal
Definition
 
through uniform resource locator
Term

Which of the following is structured to allow users to participate in real-time conversations?


 
chat rooms
 
news service
 
websites
 
video feeds
Definition
 
chat rooms
Term

Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

 

 
John Atanasoff and Cliff Berry

 

 
Charles Babbage and Herman Hollerith

 

 
John W. Mauchly and John Presper Eckert

 

Max Newman and Steve Wazniak

 

Definition
 
John W. Mauchly and John Presper Eckert
Term

In which Mac OS did Apple introduce its first Unix-based operating system?


 
Mac OS X
 
System 7
 
Mac OS 8
 
System 2.1
Definition

 
Mac OS X
Term

Which of the following interprets program instructions and processes data in the computer?

 
universal serial bus
 
central processing unit
 
random access memory

 

graphical user interface
Definition
 
central processing unit
Term

What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

 
spoofing
brute force
 
phreaking
 
Vulcan nerve pinch
Definition
 
brute force
Term

Which of the following devices introduces commands and information to the computer?

 

 
scanner

 

 
modem

 

 
printer
 
keyboard
Definition
 
keyboard
Term

What does the term wetware refer to?


 
humans operating computers
 
evil crakcers
 
“good” hackers
 
a system vulnerability
Definition
 
humans operating computers
Term

Who was the first person to successfully introduce a device exclusively designed for data processing?

 
Charles Babbage
 
Herman Hollerith
 
John Atanasoff
 
Clifford Berry
Definition
 
Herman Hollerith
Supporting users have an ad free experience!