1.
____ provides Internet access and have many members-only features that offer a variety of special content and services.
Correct Answer
C. OSPs
Explanation
OSPs, or Online Service Providers, are platforms or companies that provide internet access and offer exclusive features and services to their members. These OSPs typically have a range of special content, such as online communities, forums, chat rooms, and other interactive features, that are only accessible to their members. Additionally, they may offer additional services like email accounts, online storage, and personalized content. Overall, OSPs play a significant role in providing internet access and enhancing the online experience for their members.
2.
___ provides wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices.
Correct Answer
B. WSPs
Explanation
WSPs, or Wireless Service Providers, provide wireless Internet access to users with wireless modems or Web-enabled handheld computers or devices. These providers offer connectivity through wireless networks, allowing users to access the internet without the need for physical connections or cables. WSPs typically operate by installing wireless access points in specific locations, such as cafes, airports, or homes, and users can connect to these access points using their wireless devices.
3.
The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.
Correct Answer
B. Www.scsite.com/
Explanation
The domain name in the given URL is www.scsite.com. It is the part of the URL that identifies the specific website or web page that the user wants to access. In this case, the domain name is followed by additional directories (dc2003/ch2) that specify the specific location within the website.
4.
____ program reads pages on Web sites in order to create an index of hits.
Correct Answer
B. Directory
Explanation
A directory program is responsible for reading pages on websites to create an index of hits. This means that it scans the content of web pages and gathers information about them, such as keywords or relevant data, to create a searchable index. Unlike search engines that use algorithms to rank and display search results, a directory program focuses on organizing and categorizing web pages into specific directories or categories.
5.
Web pages that list as the result of a search are called ____.
Correct Answer
D. Keywords
Explanation
Web pages that list as the result of a search are called "keywords" because keywords are the specific words or phrases that users enter into a search engine to find relevant information. When a search is performed, the search engine scans through its database and retrieves web pages that contain these keywords. The search engine then displays these web pages as search results, allowing users to find the information they are looking for. Therefore, the term "keywords" accurately describes the web pages that appear as search results.
6.
A built-in connection to another related Web page or part of a Web page is called a ____.
Correct Answer
C. Hyperlink
Explanation
A built-in connection to another related Web page or part of a Web page is called a hyperlink. Hyperlinks are clickable elements on a website that allow users to navigate to different pages or sections within the same page. They are commonly represented by underlined text or clickable buttons. By clicking on a hyperlink, users are redirected to the linked content, enabling easy and convenient navigation throughout the web.
7.
When you want to transfer files between computers, the best Internet service to use is
Correct Answer
B. FTP
Explanation
FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. FTP is specifically designed for file transfer and allows users to easily upload, download, and manage files on remote servers. Unlike instant messaging, chat, or Usenet, FTP is dedicated solely to file transfer and offers more reliable and efficient transfer speeds. Therefore, FTP is the most suitable and effective option for transferring files between computers over the Internet.
8.
In networking, bandwidth refers to
Correct Answer
D. The carrying capacity of the transmission media for sending information
Explanation
Bandwidth in networking refers to the maximum amount of data that can be transmitted over a network in a given amount of time. It represents the carrying capacity of the transmission media, such as cables or wireless connections, for sending information. The higher the bandwidth, the more data can be transmitted at a faster speed. Therefore, the correct answer is "The carrying capacity of the transmission media for sending information."
9.
If you want to connect your home computer so that you can view your school's website, in addition to your computer and modem you will need
Correct Answer
A. DSL, a browser, and the correct protocols
Explanation
To connect your home computer and view your school's website, you will need DSL, a browser, and the correct protocols. DSL (Digital Subscriber Line) is a type of internet connection that uses telephone lines to transmit data. A browser is a software application used to access and view websites. The correct protocols refer to the set of rules and procedures that govern the communication between devices on a network. These protocols ensure that data is transmitted and received correctly. Therefore, having DSL, a browser, and the correct protocols is necessary to establish a connection and access your school's website.
10.
Listservers are useful in helping teachers keep up with new ideas by:
Correct Answer
C. Automatically sending information to your email box
Explanation
Listservers are online mailing lists that automatically send information and updates to subscribers' email boxes. This allows teachers to stay informed about new ideas, resources, and services without actively searching for them. Real-time chats and community bulletin boards may also be helpful, but the most direct and efficient way for teachers to keep up with new ideas is through the automatic delivery of information to their email boxes.
11.
What is the name for a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document?
Correct Answer
B. Virus
Explanation
A virus is a program or programming code that replicates itself by being copied or initiating its copying to another program, computer boot sector, or document. Unlike spyware, which collects information without the user's consent, or a firewall, which protects against unauthorized access, a virus is specifically designed to replicate and spread, often causing harm to the infected system. A Trojan Horse, on the other hand, disguises itself as a legitimate program but contains malicious code, which is different from a virus that replicates itself.
12.
What do you call a program used to detect unsolicited and unwanted e-mail and prevents those messages from getting to a user's inbox?
Correct Answer
A. Anti-spammer
Explanation
The correct answer is "Spam filter". A spam filter is a program that is used to detect and prevent unsolicited and unwanted emails from reaching a user's inbox. It helps in reducing the amount of spam that a user receives by filtering out these unwanted messages. The term "anti-spammer" refers to a person or entity that actively works against sending spam emails, rather than being a program used for detecting and preventing spam. "Email guard" and "Virus filter" are not specifically related to the prevention of spam emails.
13.
What type of attack relies on the trusting nature of employees and the art of deception?
Correct Answer
A. Social Engineering
Explanation
Social engineering is a type of attack that exploits the trusting nature of employees and relies on the art of deception. It involves manipulating individuals into divulging sensitive information or performing actions that may compromise security. This can be achieved through various techniques such as impersonation, phishing, or psychological manipulation. The attacker takes advantage of human vulnerabilities to gain unauthorized access to systems or obtain confidential information.
14.
What can a firewall protect against?
Correct Answer
B. Unauthenticated interactive logins from the outside world
Explanation
A firewall can protect against unauthenticated interactive logins from the outside world. This means that it can prevent unauthorized access to a network or system from external sources. By filtering incoming connections and verifying user credentials, a firewall acts as a barrier between the internal network and external threats, ensuring that only authenticated users can access the system. This helps to prevent unauthorized access, data breaches, and potential security risks.
15.
Which of the following is an example of a strong password?
Correct Answer
B. J*p2le04>F
Explanation
The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password through brute force or dictionary attacks. Additionally, the password is sufficiently long, which further enhances its strength.
16.
The majority of computer crimes are committed by:
Correct Answer
B. Insiders
Explanation
Insiders are the correct answer because they have access to sensitive information and systems within an organization, making it easier for them to commit computer crimes. They may include disgruntled employees, contractors, or anyone with authorized access to the organization's network. Insiders have the knowledge and familiarity with the organization's systems, making it harder to detect their actions and easier for them to cover their tracks. This makes them a significant threat when it comes to computer crimes.
17.
The common name for the crime of stealing passwords is:
Correct Answer
C. Spoofing
Explanation
Spoofing refers to the act of disguising oneself or faking one's identity in order to deceive others. In the context of stealing passwords, spoofing involves creating a fake website or email that appears legitimate, tricking the user into entering their login credentials. This allows the attacker to gain unauthorized access to the user's account or personal information. Therefore, spoofing is the common name for the crime of stealing passwords.
18.
Collecting personal information and effectively posing as another individual is known as the crime of:
Correct Answer
B. Identity theft
Explanation
Identity theft refers to the act of collecting personal information and impersonating someone else. This crime involves fraudulently obtaining and using someone's personal data, such as their social security number or credit card information, for financial gain or other malicious purposes. The perpetrator may use this stolen identity to make unauthorized transactions, open fraudulent accounts, or commit other illegal activities. Therefore, identity theft is the correct answer in this case.
19.
A program that performs a useful task while simultaneously allowing destructive acts is a:
Correct Answer
B. Trojan Horse
Explanation
A Trojan Horse is a type of malicious software that appears to be legitimate or useful, but actually contains hidden destructive elements. Unlike viruses or worms, which can spread on their own, a Trojan Horse relies on the user to unknowingly install or execute it. Once inside a system, it can perform a useful task to deceive the user, while also carrying out destructive acts in the background without the user's knowledge or consent. This makes the Trojan Horse a particularly dangerous and deceptive form of malware.
20.
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Correct Answer
B. Virus
Explanation
A virus is a type of malicious software that is designed to replicate itself and spread from one computer to another. It can infect programs or files, causing them to become corrupted or malfunction. Unlike Trojan horses, viruses have the ability to self-replicate and spread without the user's knowledge or consent. Therefore, a virus is the correct answer for the given question.
21.
What type of virus uses computer hosts to reproduce itself?
Correct Answer
B. Worm
Explanation
A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms can spread without any human action and can replicate themselves across networks. They exploit vulnerabilities in computer systems to gain access and then use the host's resources to create copies of themselves and spread to other computers. Worms can cause significant damage by consuming network bandwidth and resources, slowing down or crashing systems, and even deleting or modifying files. They are known for their ability to quickly propagate and infect large numbers of computers.
22.
What is the name of an application program that gathers user information and sends it to someone through the Internet?
Correct Answer
B. Spybot
Explanation
A spybot is an application program that gathers user information and sends it to someone through the Internet. Unlike a virus or logic bomb, which may cause harm to a computer system, a spybot is specifically designed to collect and transmit user data without the user's knowledge or consent. It is a form of malware that invades privacy and can be used for malicious purposes such as identity theft or unauthorized surveillance. A security patch, on the other hand, is a software update designed to fix vulnerabilities or improve security in an application or operating system.
23.
HTML viruses infect:
Correct Answer
B. A web page in HTML code
Explanation
HTML viruses infect a web page in HTML code. HTML (Hypertext Markup Language) is the standard language used to create web pages. Viruses that target HTML code can insert malicious scripts or code into web pages, which can then infect the computers of users who visit those pages. This type of virus can spread through websites, emails, or other means of transmitting HTML code. It does not directly infect the computer itself, but rather exploits vulnerabilities in the HTML code of web pages to infect the computers of users who access those pages.
24.
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
Correct Answer
D. A denial of service attack
Explanation
A denial of service attack refers to the situation when a website becomes inaccessible to its customers due to an overwhelming amount of fake traffic. This attack floods the website's server with an excessive number of requests, causing it to slow down or crash. Unlike viruses or Trojan horses, which are malicious software, a denial of service attack does not involve the installation of any harmful programs on the target system. Instead, it disrupts the normal functioning of the website by overwhelming its resources with fake requests, making it impossible for genuine users to access it.
25.
___ is the measurement of things such as fingerprints and retinal scans used for security access.
Correct Answer
A. Biometrics
Explanation
Biometrics refers to the measurement and analysis of unique physical or behavioral characteristics, such as fingerprints and retinal scans, for the purpose of identification and security access. It is a widely used method in computer security systems to ensure authorized access to sensitive information or restricted areas. Biometrics offers a high level of accuracy and reliability in verifying an individual's identity, making it an effective tool for enhancing security measures.
26.
What is the most common tool used to restrict access to a computer system?
Correct Answer
B. Passwords
Explanation
Passwords are the most common tool used to restrict access to a computer system. They serve as a form of authentication, ensuring that only authorized individuals can gain entry. By requiring users to input a specific combination of characters, passwords act as a barrier against unauthorized access and protect sensitive information. They are widely used across various platforms and applications, making them an essential component of computer system security.
27.
The most common passwords in the U.S. or Britain include all EXCEPT:
Correct Answer
D. 123
Explanation
The given options consist of common passwords, but the exception is "123". This is because "123" is a simple and easily guessable password that does not meet the criteria of a strong and secure password. On the other hand, "love", "Fred", and "God" are also commonly used passwords, but they are not excluded in this case.
28.
The scrambling of code is known as:
Correct Answer
A. Encryption
Explanation
Encryption refers to the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access. It involves using algorithms and keys to transform the data into an unreadable format, which can only be decrypted with the correct key. Scrambling, password-proofing, and firewalls may provide some level of security, but they are not specifically related to the process of code scrambling. Encryption is the correct term for this process.
29.
If you want to secure a message, use a(n):
Correct Answer
D. Cryptosystem
Explanation
A cryptosystem is the most appropriate choice for securing a message because it is a complete system that includes encryption, decryption, and key management. It provides a comprehensive approach to protecting the confidentiality and integrity of the message. Cryptology source refers to a source of knowledge about cryptography, not a tool for securing a message. An encryption key is a component of a cryptosystem, but it alone is not sufficient for securing a message. Similarly, an encryption software package is a tool that can be used within a cryptosystem, but it is not the entire system itself.
30.
_____ is defined as any crime completed through the use of computer technology.
Correct Answer
B. Computer Crimes
Explanation
Computer Crimes is defined as any crime completed through the use of computer technology. This term encompasses a wide range of illegal activities that involve the manipulation, theft, or destruction of data, as well as unauthorized access to computer systems. Examples of computer crimes include hacking, identity theft, phishing, and spreading malware. These crimes exploit vulnerabilities in computer networks and systems, causing harm to individuals, organizations, and even governments. The term "Computer Crimes" emphasizes the criminal nature of these activities when they are carried out using computer technology.
31.
Most computer systems rely solely on ___________ for authentication.
Correct Answer
B. Passwords
Explanation
In most computer systems, passwords are commonly used for authentication. Users are required to enter a specific password that matches their account in order to gain access to the system. This is a widely used method as it provides a level of security by ensuring that only authorized individuals can log in and access the system's resources.
32.
Creating strong computer security to prevent computer crime usually simultaneously helps protect :
Correct Answer
A. Privacy rights
Explanation
Creating strong computer security measures such as encryption, firewalls, and secure authentication methods can help prevent unauthorized access to personal information and data. By safeguarding sensitive information, computer security measures contribute to protecting privacy rights. This ensures that individuals have control over their personal information and are not subject to unauthorized surveillance or data breaches. Therefore, creating strong computer security usually simultaneously helps protect privacy rights.
33.
In the world of computing, the essential element that controls how computers are used is
Correct Answer
A. Ethics
Explanation
Ethics is the correct answer because it refers to the moral principles that govern the behavior and decisions of individuals and organizations. In the world of computing, ethics play a crucial role in determining how computers are used. It involves considering the impact of technology on society, protecting user privacy, ensuring fairness and equality, and promoting responsible use of technology. Adhering to ethical principles helps in creating a positive and trustworthy computing environment and ensures that computers are used in a way that benefits society as a whole.
34.
The guidelines for the morally acceptable use of computers in society are
Correct Answer
A. Computer ethics
Explanation
Computer ethics refers to the ethical principles and guidelines that govern the use of computers and technology in society. It involves understanding and addressing ethical issues related to privacy, security, intellectual property, and the impact of technology on individuals and society as a whole. Computer ethics provides a framework for individuals and organizations to make morally acceptable decisions and actions regarding the use of computers and technology. It ensures that technology is used responsibly, ethically, and in a way that respects the rights and well-being of individuals and society.
35.
The issues that deal with the collection and use of data about individuals is
Correct Answer
D. Privacy
Explanation
The correct answer is privacy. This is because privacy refers to the protection of personal information and the control individuals have over how their data is collected, used, and shared. It involves ensuring that individuals have the right to keep their personal information confidential and that organizations handle their data in a secure and responsible manner. Privacy issues are concerned with maintaining the privacy rights of individuals and preventing unauthorized access or misuse of their personal data.
36.
The ethical issue concerned with the correctness of data collected is
Correct Answer
C. Exactness
Explanation
The ethical issue concerned with the correctness of data collected is "exactness". This refers to the accuracy and precision of the data that is being collected. Ensuring that the data is collected and recorded accurately is important for maintaining the integrity of any research or study. Inaccurate data can lead to incorrect conclusions and potentially harm individuals or organizations that rely on the data for decision-making. Therefore, it is ethically important to prioritize the exactness of the data collected to ensure its reliability and validity.
37.
The ethical issue that involves who is able to read and use data is
Correct Answer
A. Access
Explanation
Access is the correct answer because the ethical issue mentioned in the question is related to who has the ability to read and use data. Access refers to the permission or authority granted to individuals or entities to access and use certain data. This ethical issue raises concerns about who should have access to sensitive or private data, and whether it should be restricted to certain individuals or organizations. It also relates to issues of data ownership and control.
38.
Small files that are deposited on a user’s hard drive when they visit a Web site are best described as
Correct Answer
A. Cookies
Explanation
Small files that are deposited on a user's hard drive when they visit a website are known as cookies. These cookies store information about the user's browsing activity and preferences, allowing the website to remember certain settings and provide a personalized experience. Cookies are commonly used for tracking user behavior, maintaining user sessions, and delivering targeted advertisements.
39.
People who gain unauthorized access to computers for the fun of it, but do not intentionally do damage, are __________.
Correct Answer
B. Hackers
Explanation
Hackers are individuals who gain unauthorized access to computers for the fun of it, but do not intentionally cause harm. They are often motivated by curiosity and a desire to explore and understand computer systems. Unlike crackers, who exploit vulnerabilities for malicious purposes, hackers typically engage in activities like exploring networks, finding security flaws, and enhancing their technical skills. While their actions may still be illegal and unethical, hackers generally do not have malicious intent and may even contribute positively to the field of cybersecurity by identifying vulnerabilities that need to be addressed.
40.
A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.
Correct Answer
A. Viruses
Explanation
A program that migrates through networks and operating systems and attaches itself to different programs and databases is known as a virus. Viruses are malicious software that can replicate themselves and spread to other systems, causing harm by corrupting or deleting files, stealing personal information, or disrupting the normal functioning of a computer. Unlike worms, which are self-replicating and do not require a host program to spread, viruses rely on attaching themselves to existing programs or files in order to propagate. Denial-of-service attacks and damage do not involve the same characteristics of migrating and attaching to different programs and databases.
41.
A program that fills a computer system with self-replicating information thus clogging the system is called a __________.
Correct Answer
B. Worms
Explanation
A program that fills a computer system with self-replicating information thus clogging the system is called worms. Worms are malicious software that can spread across networks and computers, replicating themselves and consuming system resources. Unlike viruses, worms do not require a host program to attach themselves to, making them capable of spreading independently. They can cause significant damage by slowing down or crashing computer systems, stealing sensitive information, or creating backdoors for hackers to exploit. Denial-of-service attacks, on the other hand, involve overwhelming a system with traffic to make it inaccessible, while damage is a general term that can refer to any harm caused to a computer system.
42.
Which statement best describes a worm?
Correct Answer
C. a virus that doesn’t attach itself to programs and databases
Explanation
A worm is a type of virus that does not attach itself to programs and databases. Unlike other viruses, worms are standalone programs that can replicate themselves and spread to other computers through network connections. They do not require a host program to infect and can cause harm by consuming network bandwidth, slowing down systems, or carrying out malicious activities such as data theft or denial of service attacks.
43.
Programs that come into a computer system disguised as something else are called
Correct Answer
D. Trojan Horse
Explanation
A Trojan Horse is a type of malicious program that disguises itself as something else to gain access to a computer system. It tricks users into thinking it is a legitimate program or file, but once installed, it can perform harmful actions such as stealing personal information, damaging files, or providing unauthorized access to the attacker. Unlike spoofers, loggers, and defacers, which may have different objectives, a Trojan Horse specifically focuses on deceptive infiltration and malicious activities.
44.
An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a
Correct Answer
C. Denial-of-service attack
Explanation
A denial-of-service attack is a deliberate attempt to overwhelm a computer system or network by flooding it with requests for information, thereby slowing down or completely stopping its normal functioning. This can be done by sending a massive amount of traffic or requests to the targeted system, causing it to become overloaded and unable to respond to legitimate requests. Unlike viruses, worms, and Trojan Horses, which are malicious software designed to infiltrate and damage systems, a denial-of-service attack focuses on disrupting the availability of a system rather than causing direct harm.
45.
A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a
Correct Answer
D. Scam
Explanation
A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are typically carried out by individuals or organizations with the intention of defrauding or deceiving unsuspecting victims. They often involve false promises, fake products or services, or misleading information in order to manipulate people into giving up their money or personal information. Scams can take various forms, such as online scams, phone scams, or email scams, and they can have serious financial and emotional consequences for those who fall victim to them.
46.
Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?
Correct Answer
B. Piracy
Explanation
Piracy is the act of illegally copying and distributing software without the permission of the owner. This involves making unauthorized copies of software and sharing them with others, which is a violation of copyright laws. Freeware refers to software that is available for free, shareware refers to software that can be downloaded and used for a trial period before purchasing, and public domain refers to software that is not protected by copyright and can be freely used and distributed. Therefore, piracy is the most appropriate term to describe the act of copying and distributing software without permission.
47.
When a hard disk crashes, it is an example of a __________ type of computer security threat.
Correct Answer
C. Technological failure
Explanation
A hard disk crash refers to a situation where the storage device of a computer fails, resulting in the loss of data and the inability to access information. This failure is caused by a technical problem within the computer system, such as a malfunctioning component or software error. It is not related to criminal activity or civil strife, which involve intentional actions by individuals or groups. Therefore, a hard disk crash is considered a technological failure rather than a security threat posed by criminals or external factors.
48.
A common way to protect information being sent over a network, when long distance is involved, is
Correct Answer
D. Encrypting
Explanation
Encrypting is a common way to protect information being sent over a network, especially when long distance is involved. Encryption involves converting the original information into a coded form that can only be decoded by authorized parties who possess the decryption key. This ensures that even if the information is intercepted by unauthorized individuals, they will not be able to understand or access the sensitive data. Encrypting provides an additional layer of security and helps safeguard the confidentiality and integrity of the transmitted information.
49.
A __________ acts as a security buffer between a company’s private network and all external networks.
Correct Answer
A. Firewall
Explanation
A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By examining the data packets, a firewall can block unauthorized access, prevent malicious attacks, and protect sensitive information from being compromised. It serves as a first line of defense against potential threats and helps maintain the confidentiality, integrity, and availability of the company's network resources.
50.
The study of fitting computers to people is called __________.
Correct Answer
C. Ergonomics
Explanation
Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems and workspaces in a way that maximizes efficiency, comfort, and safety for the individuals using them. It involves considering factors such as posture, lighting, equipment placement, and user interaction to optimize productivity and prevent musculoskeletal injuries.