In a database, title, author, publication date, and isbn are examples of ________.

The Internet was originally created as a communication system for the ________.
A) Department of Education
B) Department of Defense
C) U.S. Congress
D) University System

The nodes on the original Internet system were ________.
A) educational institutions
B) military bases
C) large corporations
D) marketing companies

What was the ARPANET?
A) A project of the Department of Transportation
B) The origins of the Internet
C) A network of two computers
D) A network originally authorized by President Truman

What is the Internet backbone?
A) A company's main connection to the Internet
B) The system of satellites that carry the Internet's signals
C) The four original nodes of the Internet
D) High speed connection between networks

The 4G network standard includes ________ technologies.
A) FTTH
B) DSL
C) LTE
D) FiOS

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.
A) Ethernet
B) Fiber
C) Wireless
D) Network

Which broadband service are you likely to use if you live in a very remote area?
A) Cable
B) Satellite
C) DSL
D) Fiber

The least expensive form of Internet connection is ________.
A) DSL
B) cable
C) FTTH
D) dial-up

Wireless access points that are available in public spaces are called ________.
A) Hyperlinks
B) Network Access Points
C) Internet protocols
D) Hotspots

________ is the authoring language that defines the structure of a webpage.
A) Hypertext
B) User-generated content
C) TLD
D) HTML

Programs that interpret HTML to display a webpage are called ________.
A) interpreters
B) translators
C) compilers
D) web browsers

Adding a browser ________ gives you quick access to the features of the application that installed it.
A) add-on
B) toolbar
C) plug-in
D) home page

________ technologies use telephone lines to carry digital signals.
A) FTTH
B) DSL
C) FiOS
D) WiMAX

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.
A) toolbar
B) add-on
C) tab
D) plug-in

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.
A) toolbar
B) add-on
C) plug-in
D) taskbar

In the URL http://www.irs.gov, http is the ________.
A) TLD
B) subdomain
C) domain name
D) protocol

In the URL http://www.irs.gov, irs is the ________.
A) TLD
B) protocol
C) subdomain
D) domain name

The backbone of the Internet is composed of numerous Internet ________ Points around the world.
A) Exchange
B) Connection
C) Hyperlink
D) Relay

The FTP protocol is used to ________.
A) log in to a secure webpage
B) transfer files
C) surf the web
D) verify an email address

The s in https stands for ________.
A) sponsored
B) secure
C) system
D) service

198.168.0.1 is an example of a(n) ________.
A) protocol
B) domain name
C) DNS
D) IP address

Which organization coordinates the Internet naming system?
A) FCC
B) WWW
C) W3C
D) ICANN

The ________ enables users to enter a friendly name like whitehouse.gov instead of an address like 74.125.224.72.
A) IP
B) TLD
C) DNS
D) ISP

Which operator is used to return results that includes two specific words?
A) NOT
B) BUT
C) AND
D) OR

Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.
A) Broadband
B) Regional
C) Municipal
D) Corporate

.com is an example of a(n) ________.
A) DNS
B) TLD
C) LTE
D) NAP

Which of the following is a method of synchronous online communication?
A) Instant Messaging
B) Email
C) Forum
D) Newsgroup

A moderated chat room ensures that ________.
A) parental controls are in effect
B) all content is screened
C) only subscribers participate
D) no one under the age of 18 is online

________ allows you to communicate with one person at a time.
A) Instant messaging
B) Really Simple Syndication (RSS)
C) User generated content
D) Secure Sockets Layer (SSL)

________ communication allows you to send a message to someone who is not online at the same time.
A) Static
B) Dynamic
C) Asynchronous
D) Synchronous

________ is an example of asynchronous communication.
A) Skype
B) Email
C) Chat
D) VoIP

________ technology is used for sending email messages.
A) Forward-and-push
B) Store-and-forward
C) Get-and-put
D) Push-and-pull

Which statement about email is FALSE?
A) Copies of your email may exist on several servers even after the recipient deletes it.
B) Your employer may read your email at your work.
C) It cannot be accessed by hackers.
D) Email can be used for targeted marketing.

A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.
A) password
B) captcha
C) signature
D) verification

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.
A) To:
B) Cc:
C) Subject
D) Bcc:

An email ________ is a block of text that is automatically put at the end of your messages.
A) closing
B) salutation
C) identifier
D) signature

The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.
A) methods
B) channels
C) connections
D) media

All the information someone can find out about you by searching the web is called your ________.
A) avatar
B) folksonomy
C) tagged information
D) digital footprint

________ is a social network that is designed for business connections.
A) Facebook
B) Twitter
C) LinkedIn
D) Yahoo!

In a virtual community, you can communicate with other people by using a(n) ________.
A) captcha
B) profile
C) alias
D) avatar

________ is the largest online video-hosting site in the world.
A) Flickr
B) MySpace
C) Skype
D) YouTube

________ is the largest online image-sharing site in the world.
A) Flickr
B) MySpace
C) Skype
D) LinkedIn

________ recommends music to you based on your listening preferences.
A) Picasa
B) Pandora
C) Flickr
D) SnapDrago

A ________ is similar to an online journal, in which you can write about anything you want to share.
A) bulletin
B) log
C) chronicle
D) blog

________ is an example of a microblogging site that allows a limited number of characters in a post.
A) The Blogosphere
B) Blogger
C) Twitter
D) Flickr

Tweets are limited to ________ characters each.
A) 50
B) 140
C) 230
D) 340

Podcasts allow time ________, so you can listen on your own schedule.
A) lagging
B) shifting
C) delay
D) warping

You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.
A) NSS
B) DNS
C) RSS
D) PSS

________ raises money from multiple small investors rather than a few large ones.
A) Crowdresourcing
B) Crowdbrowing
C) Crowdfunding
D) Crowdsourcing

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.
A) crowdresourcing
B) crowdsourcing
C) crowdsampling
D) crowdreferencing

Wikis are designed for ________, which is allowing people to contribute more than just posting a response.
A) collaboration
B) expert opinions
C) asynchronous communication
D) synchronous communication

You can use a social ________ site to save and share your favorites online.
A) news
B) media marketing
C) review
D) bookmarking

________ sites let users evaluate hotels, movies, games, books, and other products and services.
A) Social bookmarking
B) Really Simple Syndication
C) Captcha
D) Social review

Which is an example of a social news site?
A) Facebook
B) Yelp
C) LinkedIn
D) reddit

Using social media to sell services is called ________.
A) Short Message Service (SMS)
B) Social media marketing (SMM)
C) Secure Sockets Layer (SSL)
D) Really Simple Syndication (RSS)

When one business provides services for another, it is a type of e-commerce called ________.
A) C2B
B) C2C
C) B2B
D) B2C

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.
A) B2B
B) C2A
C) A2C
D) B2C

________ e-commerce allows anyone to sell or trade items online.
A) C2C
B) C2B
C) B2C
D) B2B

What happens when you click the padlock icon on a webpage?
A) You can turn off the security setting of the website.
B) You can turn on the security setting of the website.
C) You can get a security report about the website.
D) There is no padlock icon on a webpage.

________ is one of the most popular C2C websites.
A) eBay
B) Amazon
C) Google Checkout
D) PayPal

A Facebook ________ is used to promote an organization, a product, or a service.
A) Page
B) Account
C) profile
D) user

The # symbol used by Twitter is called a(n) ________.
A) hashtag
B) avatar
C) forum
D) digital footprint

________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.
A) RSS
B) SMM
C) SEO
D) IM

P2P networks are normally found in ________.
A) corporations
B) universities
C) homes
D) libraries

Each computer is considered equal in a ________ network.
A) client-server
B) wide area
C) virtual private
D) peer-to-peer

Which of the following statements about P2P networks is FALSE?
A) They can only support a small number of devices.
B) The services and security are centralized.
C) All computers are considered equals.
D) They can share a printer.

A ________ network is a network in which all computers are considered equal.
A) peer-to-peer
B) homegroup
C) client-server
D) workgroup

A ________ network is one that has at least one computer that provides centralized management, resources, and security.
A) homegroup
B) peer-to-peer
C) workgroup
D) client-server

For a company that uses only two floors of an office building, all of the company's computers and printers will be connected by a ________.
A) WAN
B) MAN
C) LAN
D) PAN

In a WLAN, devices are connected by ________.
A) ultraviolet
B) Bluetooth
C) Wi-Fi
D) RFID

To connect peripherals at short ranges, you would use the ________ wireless technology.
A) Ultraviolet
B) Bluetooth
C) Infrared
D) RFID

One of the most important reasons for Ethernet standards is it ________.
A) can prevent unauthorized users from accessing the Internet
B) allows the government to keep tabs on what you are doing
C) assures equipment from different manufacturers is compatible
D) prevents overburdening your computer

Which of the following transmission media is NOT used to transmit signals on an Ethernet network?
A) Topology
B) Twisted-pair
C) Fiber-optic
D) Wi-Fi

A ________ is a device that connects two or more networks together.
A) router
B) hub
C) switch
D) modem

Which of the following is NOT a common LAN topology?
A) Star
B) Bus
C) Hierarchical
D) Ring

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
A) PAN
B) WLAN
C) WAN
D) MAN

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
A) PAN
B) LAN
C) VPN
D) WLAN

Network speeds are measured in ________ per second.
A) bits
B) hertz
C) nanos
D) bytes

Wi-Fi networks used in homes and public hotspots use the ________.
A) W3C standards
B) IEEE 802.11 standards
C) POP protocols
D) SMTP protocols

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
A) repeater
B) router
C) terminator
D) switch

A ________ is a device that connects multiple devices on a LAN.
A) bus
B) switch
C) router
D) repeater

Most home routers also include a built-in ________.
A) range extender
B) switch
C) hub
D) network interface card

A ________ can be set by an employer to prevent you from accessing eBay.
A) switch
B) firewall
C) router
D) wireless access point

A ________ is a network composed of a group of clients and servers under the control of one central security database.
A) homegroup
B) workgroup
C) domain
D) client

The rules for communication between devices are called ________.
A) firewalls
B) protocols
C) packets
D) domains

The ________ protocol resolves the domain name amazon.com to an IP address.
A) SMTP
B) DHCP
C) DNS
D) FTP

When you decide to use your neighbor's open wireless network without permission, you are ________.
A) hacking
B) trolling
C) wardriving
D) piggybacking

Moving through a neighborhood trying to locate open wireless access points is called ________.
A) surfing
B) trolling
C) hacking
D) wardriving

Which cybercrime is considered to be a form of harassment?
A) Pharming
B) Clickjacking
C) Cyber-stalking
D) Phishing

The cyberbullying of one adult by another adult, using a computer is known as ________.
A) pharming
B) phishing
C) cyberbullying
D) cyber-harassment

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
A) pharming
B) cyber-stalking
C) cyberbullying
D) phishing

Clickjacking results in ________.
A) sending spam to your friends' email accounts
B) malware posting unwanted links on your Facebook page
C) you sending money to get more money in return
D) your Facebook account being closed without your knowledge

An email claiming that you have won a lottery might be an example of ________.
A) cyberbullying
B) computer fraud
C) cyber-stalking
D) cyber-harassment

________ redirects you to a phony website by hijacking a domain name.
A) Phishing
B) Clickjacking
C) Shill bidding
D) Pharming

________ is an unlawful attack on computers or networks done to intimidate a government or its people.
A) Cybercrime
B) Computer fraud
C) Cyber-stalking
D) Cyber-terrorism

When a company pays people to hack into its own system, it calls in ________ hackers.
A) green-hat
B) black-hat
C) gray-hat
D) white-hat

________ hackers hack into systems to steal or vandalize.
A) Red-hat
B) Black-hat
C) Gray-hat
D) White-hat

Hacking to make a political statement is called ________.
A) politicking
B) sneaking
C) cracking
D) hacktivism

Which statement about cookies is FALSE?
A) They are used by websites to identify you.
B) It is a small text file.
C) They cannot collect information you do not want to share.
D) They can be installed without your knowledge.

The difference between a virus and a worm is a ________.
A) worm is a threat to your computer, but a virus is not
B) virus needs a host file, but a worm does not
C) virus replicates itself, but a worm cannot self-replicate
D) virus is a threat to your computer, but a worm is not

Another name for the actual attack caused by a virus is a ________.
A) worm
B) payload
C) logic bomb
D) hoax

Which statement about a logic bomb is FALSE?
A) They are often planted by disgruntled IT workers.
B) It can spread to other machines.
C) It can lay dormant until specific conditions are met.
D) It can be triggered on a specific date

If your computer has a ________, someone else can gain access to it undetected.
A) zombie
B) logic bomb
C) rootkit
D) botnet

A ________ changes your home page and redirects you to other websites.
A) zombie
B) browser hijacker
C) rootkit
D) botnet

A ________ appears to be a legitimate program, but is actually something malicious.
A) Trojan horse
B) worm
C) rootkit
D) botnet

Antivirus software uses ________ to search for known viruses.
A) virus checks
B) stop-and-search checks
C) definition date checks
D) signature checking

A ________ connects two or more computers in a network.
A) repeater
B) hub
C) router
D) switch

A router is a form of security because it ________.
A) scans your email for malicious content
B) implements User Account Control (UAC)
C) scans webpages before displaying the content
D) acts like a firewall

When you set up your wireless router, you should change the ________, which is also called the wireless network name.
A) WAP
B) SSID
C) NAT
D) WEP

To secure your wireless network at home, you should ________.
A) back up the computers on the network
B) password-protect important document files
C) set the SSID to CLOSED
D) use wireless encryption with a difficult passphrase

Which device on a network performs network address translation?
A) Repeater
B) Router
C) Splitter
D) Hub

You should use a(n) ________ account for everyday computing on a computer running Windows.
A) guest
B) standard
C) visitor
D) administrator

When using Windows, to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
A) client
B) guest
C) administrator
D) master

Which would be the strongest password?
A) customer
B) p22w0r6
C) p@55W0?d
D) p@ssw*rd

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
A) https
B) http
C) shttp
D) ssl

In an office acceptable use policy (AUP), which of the following might be prohibited?
A) Checking work email
B) Purchasing business supplies online
C) Logging in to eBay
D) Viewing an associate's electronic calendar

The ________ was created in an effort to make it easier for victims to report cybercrimes.
A) USA PATRIOT Act
B) Internet Crime Complaint Center
C) Homeland Security Act
D) Computer Fraud and Abuse Act

The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
A) USA PATRIOT
B) Cyber Security Enhancement
C) Computer Fraud and Abuse
D) Cybersecurity

A database is a collection of ________ that has been organized in a meaningful way.
A) spreadsheets
B) files
C) information
D) data

In a database, a ________ stores data in rows and columns.
A) field
B) table
C) cell
D) matrix

A ________ contains the information for a single entity in the database.
A) table
B) record
C) field
D) cell

Which would make the best primary key in a table?
A) Last name
B) Social Security number
C) First name
D) Street Address

In a database, title, author, publication date, and ISBN are examples of ________.
A) records
B) fields
C) tables
D) queries

________ make data entry easier because they can be set up to match the layout of a paper document.
A) Reports
B) Records
C) Forms
D) Queries

A ________ could be used to retrieve all the phone numbers from a student database.
A) table
B) report
C) query
D) form

To print data or display it in an easy to read format, a ________ can be used.
A) report
B) table
C) record
D) form

An Excel spreadsheet is an example of a(n) ________ database.
A) object-oriented
B) flat
C) relational
D) hierarchical

In a relational vehicle database, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.
A) simple query
B) many-to-many
C) one-to-one
D) one-to-many

In a one-to-one relationship, both tables use the same ________ to link two records.
A) query
B) primary key
C) foreign key
D) form

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?
A) ARPANET
B) Integrated Automated Fingerprint Identification System
C) Combined DNA Index System
D) Human Genome Project

Which is a type of data that can be stored in an object-oriented database?
A) Documents and spreadsheets
B) Documents
C) Spreadsheets
D) Images, audio, and video

Data in a(n) ________ database are stored in data cubes.
A) multidimensional
B) relational
C) hierarchical
D) flat

________ allows the user to selectively extract data from different viewpoints.
A) An office support system (OSS)
B) A transaction-processing system (TPS)
C) Online analytical processing (OLAP)
D) A decision support system (DSS)

The ________ database is the most popular type used by businesses.
A) hierarchical
B) relational
C) multidimensional
D) flat

The science and telecommunication industries would most likely use the ________ database type.
A) multidimensional
B) relational
C) flat
D) object-oriented

Which is NOT an advantage of data normalization?
A) Makes it easier to update records
B) Increases query speed
C) Reduces the database size
D) Increases database development time

A data ________ rule would prevent a user from entering text in a date/time field.
A) manipulation
B) validation
C) monitoring
D) redundancy

A data ________ defines the fields in a database and the type of data that each field contains.
A) mine
B) dictionary
C) warehouse
D) reference

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.
A) lookup
B) Find feature
C) master
D) inference

Microsoft Office is an example of a(n) ________.
A) geographic information system (GIS)
B) office support system (OSS)
C) transaction-processing system (TPS)
D) Structured Query Language (SQL)

Which is NOT a SQL relational keyword?
A) WHERE
B) QUIT
C) FROM
D) SELECT

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.
A) consistency
B) isolation
C) atomicity
D) durability

An expert system is a computer programmed to ________.
A) use SQL statements to respond to requests
B) make decisions in real-life situations
C) search the web for experts
D) present possible decision outcomes

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.
A) difference engine
B) cognitive computing system
C) decision support system
D) inference engine

A(n) ________ improves over time by learning from its interactions.
A) knowledge base
B) cognitive computing system
C) decision support system
D) inference engine

Which is NOT a CODIS index?
A) Arrestee
B) Forensic
C) Missing Persons
D) Victims

________ is the application of information technology to the field of biology.
A) Biofeedback
B) Biocoenosis
C) Bioinformatics
D) Bioengineering

GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.
A) sets
B) information
C) datacaches
D) layers

GIS can be used by local municipalities to ________.
A) capture criminals
B) budget for waste management facilities
C) warn citizens of weather-related events
D) design emergency routes

The SDLC follows the development of a system from planning to the final stage, ________.
A) maintenance
B) implementation
C) analysis
D) design

Which database object makes it easier to enter data into a database and displays information in an easy to read layout?

form—A database object that makes it easier to enter data into a database, and displays information in an easy to read layout. GIS (Geographic Information System)—An information system that combines layers, or datasets of geographically referenced information about the surface of the earth.

When information is duplicated in multiple places it is known as data redundancy True False?

Data redundancy occurs when the same piece of data is stored in two or more separate places and is a common occurrence in many businesses.

Which would make the best primary key in a table?

Integer (number) data types are the best choice for primary key, followed by fixed-length character data types. SQL Server processes number data type values faster than character data type values because it converts characters to ASCII equivalent values before processing, which is an extra step.

Is a set of rules that are used to apply a knowledge base to each situation?

inference engine: A set of rules for applying a knowledge base to each particular situation.