Term
|
Definition
| Software such as _____ is used by both students and teachers to find plagiarism problems. |
|
|
Term
|
Definition
| Online newspapers can be delivered through _____ to news readers. |
|
|
Term
|
Definition
| Which of the following is an example of digital media? |
|
|
Term
|
Definition
| Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless. |
|
|
Term
|
Definition
| The digital _____ method of writing has made plagiarism easy and ever more common. |
|
|
Term
|
Definition
| Which of the following organizations has been instrumental in fighting piracy through the use of lawsuits and legislation? |
|
|
Term
|
Definition
| Companies such as _____ have connected with libraries to digitize millions of books |
|
|
Term
|
Definition
| A general-purpose computer relies on the _____ being used to perform an activity. |
|
|
Term
|
Definition
| The DMCA was drafted and passed by the _____. |
|
|
Term
|
Definition
| _____ media is programming or music that can be accessed any time of the day, regardless of television and radio schedules. |
|
|
Term
|
Definition
| A _____ gives the holder exclusive rights to use an invention for 20 years. |
|
|
Term
| the length of the songs supported |
|
Definition
| Services using DRM technology usually include all of the following restrictions EXCEPT _____. |
|
|
Term
| It outlaws the distribution of software meant to crack DRM code |
|
Definition
| Which of the following is true of the Digital Millennium Copyright Act? |
|
|
Term
|
Definition
| A computer relies on the combination of _____ and _____ to turn input into output. |
|
|
Term
|
Definition
| Due to the _____ of intellectual property, distribution of content is much faster and easier than it was in the past. |
|
|
Term
|
Definition
| Which of the following will protect intellectual property for the life of the holder plus 70 years? |
|
|
Term
|
Definition
| The term _____ best describes the level of technology skills needed in today’s business world. |
|
|
Term
|
Definition
| The prefix Giga represents approximately one _____ units of information. |
|
|
Term
|
Definition
| A _____ can represent a digit, a letter, or a color. |
|
|
Term
|
Definition
| A computer uses _____ to display an image after it has been digitized. |
|
|
Term
|
Definition
| ASCII is the encoding standard used to represent _____ in digital form. |
|
|
Term
|
Definition
| The Unicode encoding scheme is used to add support for _____ character sets. |
|
|
Term
|
Definition
| The _____ system is used to represent RGB color in digital graphics. |
|
|
Term
|
Definition
| What two values represent the binary number system? |
|
|
Term
|
Definition
| The _____ system, which uses only two digits, 1 and 0, is commonly used for representing values in computers. |
|
|
Term
|
Definition
| Cloud computing is not possible without _____. |
|
|
Term
|
Definition
| Windows cleaners maintain the _____ for more effective system operation. |
|
|
Term
|
Definition
| Linux is _____ software, which means users can manipulate the source code to customize their operating system to their needs. |
|
|
Term
|
Definition
| An advantage of _____ software is its ability to run more than one operating system on a computer. |
|
|
Term
|
Definition
| A _____ provides content that is accessible on the World Wide Web. |
|
|
Term
|
Definition
| Performing a system _____ utility rearranges your files on disk in an orderly fashion, resulting in faster access. |
|
|
Term
|
Definition
| Through the use of _____, one physical server can run several server operating systems. |
|
|
Term
|
Definition
| A popular term used to identify devices such as the iPad is _____. |
|
|
Term
|
Definition
| When you combine a system's hardware configuration and operating system, it is sometimes called the computer's _____. |
|
|
Term
|
Definition
| When a smart phone goes into _____ mode, pressing a button immediately turns it back on. |
|
|
Term
|
Definition
| Users of iPods and iPhones are well acquainted with the process of _____ files. |
|
|
Term
|
Definition
| A Kindle eBook reader is an example of a(n) _____ computer. |
|
|
Term
|
Definition
| The largest servers are called _____ servers. |
|
|
Term
|
Definition
| The large tower case that houses a desktop PC’s circuit boards is known as the _____. |
|
|
Term
|
Definition
| The most powerful type of computer is a _____. |
|
|
Term
|
Definition
| The purpose of the ____ is to store the boot process instructions for the computer to start up |
|
|
Term
|
Definition
| Which of the following uses the New Technology File System (NTFS) for organizing and managing files? |
|
|
Term
|
Definition
| The ____ operating system provides the technological foundation of the Mac OS X. |
|
|
Term
|
Definition
| A cell phone’s ____ operating system is not released to users and developers. |
|
|
Term
|
Definition
| A(n) ____ operating system is required to perform a command within a certain time frame. |
|
|
Term
|
Definition
| Typing the word DEL on a prompt line to remove unwanted files on your computer is an example of using a ____ user interface. |
|
|
Term
|
Definition
| A unique feature of ____ is that users can easily add enhancements to the operating system. |
|
|
Term
|
Definition
| Using the web as a primary user interface to access such applications as Google Docs is an example of ____. |
|
|
Term
|
Definition
| Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another. |
|
|
Term
|
Definition
| Thanks to ____ files, a website can recognize you and cater to your individual tastes each time you visit. |
|
|
Term
|
Definition
| The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate. |
|
|
Term
|
Definition
| We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives. |
|
|
Term
|
Definition
| Thanks to ____, you can watch a movie as it is being downloaded from the Internet. |
|
|
Term
|
Definition
| A type of connection that provides Internet service through a phone line that services both the Internet and your phone is ____. |
|
|
Term
|
Definition
| To acquire an online presence, you can subscribe to a web ____ service that will store your files for users to access. |
|
|
Term
|
Definition
| Cookie files contain ____. |
|
|
Term
|
Definition
| ____ is credited with the development of the web. |
|
|
Term
|
Definition
| The ____ oversees the setup, maintenance, and implementation of a network in a business environment. |
|
|
Term
|
Definition
| Many cities have adopted ____ technology to provide faster Internet speed to their users. |
|
|
Term
|
Definition
| Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n) ____. |
|
|
Term
|
Definition
| One focus of the Internet2 is to improve ____. |
|
|
Term
|
Definition
| ____ technology enables you to connect to your cell phone through a display on your car’s dashboard. |
|
|
Term
|
Definition
| Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience. |
|
|
Term
|
Definition
| Bluetooth is an example of a technology used with a ____ area network. |
|
|
Term
|
Definition
| Using ____ technologies, scientists are able to share virtual environments for research within a variety of locations. |
|
|
Term
|
Definition
| Combining voice, video, and data communications into one interface is known as ____ communications. |
|
|
Term
|
Definition
| ____ is a popular software program that can be used to manage podcasts. |
|
|
Term
|
Definition
| The ____ bill demonstrated the conflict between Internet snooping and Internet user privacy. |
|
|
Term
|
Definition
| A(n) ____ is a company that provides a subscriber with access to the Internet. |
|
|
Term
|
Definition
| ____ is commonly used to enable web browsers to communicate with web servers. |
|
|
Term
|
Definition
| A new fourth-generation technology called ____ is competing to become the wireless network of choice for high-speed connectivity. |
|
|
Term
|
Definition
| A typical setup for a ____ network would include computer users sharing a single Internet connection. |
|
|
Term
|
Definition
| A ____ network is used when a user wants to make his or her computer and others’ computers available for access. |
|
|
Term
|
Definition
| It is much easier for people to remember ____ than IP addresses of websites. |
|
|
Term
|
Definition
| The Internet backbone uses mostly ____ cabling for transmitting data between users. |
|
|
Term
|
Definition
| ____ defines how information travels across the Internet. |
|
|
Term
|
Definition
| The job of the ____ computer is to support a large amount of user requests simultaneously. |
|
|
Term
|
Definition
| Data ____ travel over the Internet from router to router until reaching their destinations. |
|
|
Term
|
Definition
| All devices attached to a network are identified as ____. |
|
|
Term
|
Definition
| Networks designed to serve an entire city are called ____ area networks. |
|
|
Term
|
Definition
| A(n) ____ connects LANs and MANs between cities, across countries, and around the world. |
|
|
Term
|
Definition
| Playing online Scrabble with others on the web at any given time is an example of a ____ gaming experience. |
|
|
Term
|
Definition
| The popularity of ____ has encouraged everyday users to share events of the day. |
|
|
Term
|
Definition
| The most popular search engines use ____ to store information about webpages. |
|
|
Term
|
Definition
| When using ____ as a Service, a business does not have to oversee the storage, backup, or security of its data. |
|
|
Term
|
Definition
| Google relies on ____ to relay information related to its mapped software. |
|
|
Term
|
Definition
| Wikis encourage ____ to build content that can be constantly added, removed, and edited. |
|
|
Term
|
Definition
| The reason online content cannot always be trusted is the lack of ____ on the web. |
|
|
Term
|
Definition
| When evaluating information provided on the web, always consider the ____. |
|
|
Term
|
Definition
| Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes. |
|
|
Term
|
Definition
| The online retailer ____ is one of the largest suppliers of cloud services. |
|
|
Term
|
Definition
| ____________________ delivers a variety of computing resources from the Internet as a service to relieve users from the burden of installing, maintaining, and securing those resources themselves. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Ecommerce technologies include software and systems that support safe and secure transactions over _____ and the Internet, and make ecommerce possible |
|
|
Term
|
Definition
| FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____. |
|
|
Term
|
Definition
| Google Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items |
|
|
Term
|
Definition
| In the United States, the ____ oversees the handling of Internet traffic. |
|
|
Term
|
Definition
| Which of the following is another name for ecash? |
|
|
Term
| the digital information genetated about a person by organizations |
|
Definition
| Each person’s digital shadow is ____. |
|
|
Term
|
Definition
| Ecommerce hosting companies offer _____ that provide all the necessary software tools to deliver ecommerce applications. |
|
|
Term
| freely tag friends in your photos |
|
Definition
| Some netiquette rules to consider when using social media include all of the following EXCEPT ____. |
|
|
Term
| content-filtering software |
|
Definition
| Net Nanny is an example of ____. |
|
|
Term
| may increase the likelihood of violence in the real world, but to date the studies are not conclusive |
|
Definition
| Violence in a virtual world ____. |
|
|
Term
|
Definition
| An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it’s not true. |
|
|
Term
| at Macy's in New York City |
|
Definition
| The first known flash mob happened ____. |
|
|
Term
| with the advent of chat rooms and electronic mail |
|
Definition
| The idea of digital etiquette came into being ____. |
|
|
Term
|
Definition
| Which of the following is an example of a repetitive stress injury? |
|
|
Term
|
Definition
| The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults. |
|
|
Term
|
Definition
| Of the following, ____ contains the most information about citizens of the United States. |
|
|
Term
|
Definition
| An individual who illegally downloads copyright-protected software is referred to as a ____. |
|
|
Term
|
Definition
| In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. |
|
|
Term
|
Definition
| An item such as a smart card is an example of the ____ form of authentication. |
|
|
Term
|
Definition
| A(n) ____ certificate confirms your credentials when conducting business or other transactions on the web. |
|
|
Term
|
Definition
| ____ favor(s) an Internet that is open, with packets unexamined and unfiltered |
|
|
Term
|
Definition
| You can protect yourself from identity theft by using ____ when transmitting information over network connections. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted. |
|
|
Term
| network behavioral targeting |
|
Definition
| Of the following, ____ is considered the most invasive. |
|
|
Term
|
Definition
| All of the following are examples of malware EXCEPT ____. |
|
|
Term
| analyze large amounts of data |
|
Definition
| A challenge for companies such as Google and Facebook is building software that can ____ over the next few years. |
|
|
Term
|
Definition
| Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____. |
|
|
Term
|
Definition
| A common form of authentication is a ____. |
|
|
Term
|
Definition
| ____ can tell more about a person than all other kinds of electronic surveillance. |
|
|
Term
|
Definition
| Through the use of ____, governments can keep an eye on criminals and monitor regions in their own countries. |
|
|
Term
|
Definition
| An email with a subject heading “Urgent Security Update” that requests a username and password followed by a link to “re-login and resolve the issue” is a good example of a ____ scam. |
|
|
Term
|
Definition
| In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what’s kept about them is the ____. |
|
|
Term
|
Definition
| ____ is a form of traffic shaping. |
|
|
Term
|
Definition
| A company called ____ provides digital certifications for web transactions. |
|
|
Term
|
Definition
| ____ permissions provide registered users with access to the files they need, while restricting access to private resources. |
|
|
Term
|
Definition
| When using a public Wi-Fi network, when is it safe to send private information over the network? |
|
|
Term
|
Definition
| Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack. |
|
|
Term
| developing software to analyze the massive amount of data |
|
Definition
| The biggest challenge posed by Big Data is ____. |
|
|
Term
|
Definition
| The ____ was established to secure and monitor security risks to U.S. networks and the Internet. |
|
|
Term
|
Definition
| An important function of a firewall is to protect all the ____ of a network or computer from undesirable data. |
|
|
Term
|
Definition
| When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources. |
|
|
Term
|
Definition
| Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws. |
|
|
Term
| Select strong passwords and change them regulary |
|
Definition
| Which of the following is one realistic way to promote Internet security? |
|
|
Term
|
Definition
| A ____ may be used to filter data that may be undesirable. |
|
|
Term
|
Definition
| A ____ allows hackers to gain access to important code or information in a software program. |
|
|
Term
|
Definition
| The https:// protocol in a URL indicates the use of a(n) ____ by the website. |
|
|
Term
|
Definition
| Citizens of free and democratic nations expect, at the least, privacy ____. |
|
|
Term
| the U.S. federal government |
|
Definition
| The Total Information Awareness tracking information system was created by ____. |
|
|
Term
| is still implemented by some states |
|
Definition
|
|
Term
| Lack of funding and personnel |
|
Definition
| ____ is currently dampening the ability of government surveillance to grow. |
|
|
Term
|
Definition
| IT Access for Everyone is an initiative for increasing access to digital technology for ____. |
|
|
Term
| geographic positioning systems |
|
Definition
| The introduction of _____ on cell phones was the first step toward realizing augmented reality. |
|
|
Term
|
Definition
| Interactive media are most prominent in the _____ industry |
|
|
Term
|
Definition
| One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings |
|
|
Term
|
Definition
| Programs such as ____ support energy conservation for electronic devices. |
|
|
Term
|
Definition
| Personal computer ethics involves ____. |
|
|
Term
|
Definition
| One use for a(n) ____ is to search a database for information pertaining to a specific query. |
|
|
Term
|
Definition
| Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____. |
|
|
Term
|
Definition
| Users can interact in a virtual reality environment through the use of _____. |
|
|
Term
|
Definition
| Geographical technology advances to the iPhone such as user location and _____ software have improved augmented reality. |
|
|
Term
|
Definition
| Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet. |
|
|
Term
| They reduce the energy used in displays |
|
Definition
| Why are LEDs used in green computing? |
|
|
Term
|
Definition
| AI applications are ways in which AI methodologies are applied to ____ and provide services. |
|
|
Term
|
Definition
| Searching the Web for the best deal on an airline flight is a good example of ____ at work. |
|
|
Term
|
Definition
| _____ make up a large portion of the interactive media market. |
|
|
Term
| the choices and behaviors made by individuals |
|
Definition
| Personal ethics deals with ____. (Choose the best answer.) |
|
|
Term
|
Definition
| The ability of people with disabilities to interact with and make use of computer resources is known as ____. |
|
|
Term
|
Definition
| Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds? |
|
|
Term
|
Definition
| Ethics is a branch of philosophy that deals with issues of |
|
|
Term
| U.S. Department of Education |
|
Definition
| The _____________________ has developed requirements for Accessiblee Software Design to ensure that all software used in schools is accessible to all students, faculty, and staff. |
|
|
Term
|
Definition
| The _________________ broke new ground for game consoles by introducing a wireless, motion-sensitive game controller. |
|
|
Term
|
Definition
| _______________ have brought the gaming world to increasing numbers of adults. |
|
|
Term
|
Definition
|
|