1. Affixing a special tag or number to your computer may:
A. help deter use by unauthorized individuals.
B. help to identify your computer if it is stolen.
C. protect your computer from damage.
D. invalidate the warranty.
2. Tracking software may help to recover a stolen laptop because it:
A. sends the user’s IP address out over the Internet.
B. emits a high-pitched beep detectable by special tools.
C. sends an email to the rightful owner when the laptop is used.
D. records every place the thief has taken it.
3. The highest cost associated with computer theft is:
A. replacement equipment costs.
B. insurance fees.
C. criminal investigation costs.
D. the time needed to recreate lost data.
4. Which of the following is NOT an example of a standard backup procedure for a corporation?
A. Make daily backups
B. Employees must back up individual work files
C. Back up files every time they change
D. Store backup files offsite
5. The most common way to protect against unauthorized computer access is:
A. to always lock the computer room.
B. by requiring a user name and password.
C. through the use of biometrics.
D. by requiring an ID card.
6. Fingerprint and iris identification are examples of:
A. optical recognition.
B. database security.
C. object possession.
D. biometrics.
7. The author recommends safeguarding interactive ID cards by:
A. making a photocopy of the card for safekeeping.
B. storing them in a metal box to avoid unwanted activation.
C. keeping a duplicate card in a secure location.
D. storing them out of direct sunlight.
8. The ____________ group is the most powerful group on a corporate network.
A. executive
B. administrator
C. user
D. network
9. The ____________ uses client-server software but does not connect to the Internet.
A. extranet
B. VPN
C. intranet
D. network subsystem
10. Which of the following statements best describes a proxy server?
A. A proxy server handles traffic and maintains logs of Internet activity.
B. A proxy server enables a home computer to act as a Web server.
C. Applets are detected and disabled by proxy servers.
D. For security purposes, proxy servers are usually kept in an off-site location.
11. A gateway or ____________ can provide additional security for a home network.
A. Ethernet card
B. cable modem
C. shield
D. router
12. All of the following statements about viruses are true, EXCEPT:
A. a virus is a small program.
B. a virus with a payload is used to access financial records.
C. a virus creates multiple copies of itself and transmits them to other computers.
D. viruses use computer resources for replication.
13. A macro virus is:
A. more destructive than a regular virus.
B. associated with certain application programs.
C. set to run automatically in Word or Excel.
D. also known as a Trojan horse.
14. Commonly found in pirated software, a(n) ____________ is often disguised as something else.
A. Trojan horse
B. worm
C. virus
D. payload
15. Which of the following is an example of spoofing?
A. Downloading a computer game that contains a Trojan horse
B. The search a worm conducts for a security hole
C. A virus sending out an e-mail and infected attachment using another person’s name
D. Sending an e-mail with allegedly true instructions that will actually harm a computer
16. The science of ____________ has resulted in tools that enable computers to produce messages that are difficult to decipher rapidly.
A. encryption
B. cryptography
C. cryptanalysis
D. decipherment
17. If a message uses symmetric-key encryption:
A. the key must be an even-numbered binary number.
B. only the sender needs to know the key.
C. the deciphering process is slower than other encryption methods.
D. the same key is used to encrypt and decrypt the message.
18. Which of the following is NOT a suggested method to help control spam?
A. Obtain a free, Web-based e-mail account and use this address instead of your personal e-mail account with your ISP.
B. Read a Web site’s privacy policy before providing personal information.
C. Purchase software to block spam and scan incoming e-mail.
D. Be careful not to leave your personal e-mail address behind when using public computers.
19. An example of ____________ is when a Web site remembers your previous purchases and recommends a similar item at your next visit.
A. spam
B. presence technology
C. profiling
D. user recognition
20. A(n) ____________ is a tool that places a cookie on your computer without your knowledge to track your browsing and Web surfing habits.
A. web bug
B. banner ad
C. virus
D. profile
21. Which of the following statements is NOT true about adware?
A. Adware tracks all of your Web browsing activity.
B. Adware transmits your Internet visits to their servers via your Internet connection.
C. Adware can accompany commercially purchased software.
D. It is possible to scan your computer and remove adware.
22. Which of the following statements is true about pop-up windows?
A. Pop-up windows are only used for targeted advertising.
B. Pop-up windows are triggered by web bugs.
C. Useful information may appear in pop-up windows.
D. It is not possible to stop pop-up windows from appearing.
23. ____________ can report when you are using your computer and your geographic location.
A. Spyware
B. Profiling activators
C. Cyber locators
D. Presence technology
24. Which of the following is NOT a major initiative of the National Strategy for Homeland Security?
A. Develop separate data standards for individual divisions within the federal government.
B. Integrate information sharing across the federal government.
C. Improve public safety emergency communications.
D. Integrate information sharing across state and local governments, private industry, and citizens.
25. The time period during which mainframe computers were dominant was the:
A. 1950s.
B. 1960s.
C. 1970s.
D. 1980s.
26. Patent and copyright laws were developed in:
A. England.
B. France.
C. Ancient Rome.
D. the United States.
27. Applied research is concerned with:
A. the use of application software in a project.
B. discovering practical uses for inventions and discoveries.
C. exploring theories under development.
D. discovering relationships between theories and queries.
28. Developed by Xerox, ____________ technology is used for spell checkers and thesauruses.
A. alphanumeric
B. grammatical
C. semantic
D. linguistic
29. ____________ retained the rights to Mosaic, which was created by Marc Andreessen while he was a student there.
A. MIT
B. University of Illinois
C. UCLA
D. University of Pennsylvania
30. Which of the following sequences is an example of linear growth?
A. 3, 9, 18, 36, 72
B. 3, 6, 9, 12, 15
C. 3, 9, 27, 81, 243
D. 3, 5, 7, 11, 13
31. Which of the following lists represents companies that are still run by the entrepreneurs who founded them?
A. Dell, Oracle, SUN
B. SUN, IBM, Microsoft
C. Microsoft, Xerox, Oracle
D. Dell, Xerox, Apple
32. Who was Bill Gates’ partner when Microsoft was founded?
A. Scott McNeely
B. Larry Ellison
C. Michael Altair
D. Paul Allen
33. Which of the following is NOT true of IBM’s entry into personal computers?
A. IBM used components purchased from other companies.
B. The IBM PC was introduced in 1969.
C. The first operating system for IBM was PC-DOS.
D. Due to anti-trust concerns, IBM allowed Microsoft to retain the rights to the operating system.
34. In 2001, Microsoft was sued by critics who claimed:
A. Microsoft had an unfair advantage over Macintosh.
B. Microsoft’s ownership of Windows gave them an unfair advantage over other application designers.
C. Microsoft’s ownership of Internet Explorer interfered with the development of Google.
D. Microsoft’s ownership of Office made it inaccessible to users of UNIX.
35. ____________ was an early financial software program that helped popularize personal computers for business.
A. Excel
B. Lotus 1-2-3
C. DOS
D. VisiCalc
36. What feature of the IBM PC helped it attract many customers from Apple?
A. Its use of PC-DOS
B. Its screen using three primary colors
C. Its graphical user interface
D. The availability of clones
37. What feature of Xerox’s Alto computer was quickly adapted by Steve Jobs for the Macintosh?
A. Object oriented programming
B. Computer networking
C. Graphical user interface
D. Color display
38. In the late 1970s and early 1980s, the government encouraged the use of venture capital to fund entrepreneurs by:
A. decreasing income taxes.
B. cutting capital gains taxes.
C. eliminating the need for start up licenses and permits.
D. issuing special bonds for technology companies.
39. Which of the following statements is NOT a reason that many believe Microsoft has an unfair advantage over smaller companies?
A. Microsoft does not need to look for new sources of venture capital.
B. Microsoft can develop new software and include it with Windows at no additional cost.
C. Microsoft shares confidential information about its operating system with its application developers.
D. Microsoft discourages competition through its wealth and size.
40. What enabled the U.S. to establish a large lead in new technologies after World War II?
A. The collapse of the Soviet system
B. Diminishing natural resources
C. The U.S. homeland industries were not attacked
D. The building of the Berlin Wall, dividing Germany
41. Which of the following is NOT true of carbon nanotubes?
A. Some carbon nanotubes can conduct electricity.
B. Some carbon nanotubes act like semiconductors.
C. Research is underway to use carbon nanotubes for optical memory discs.
D. Carbon nanotubes have the potential to replace silicon transistors in circuits.
42. The Turing test is used to determine:
A. response time in virtual reality.
B. whether a computer has achieved intelligence.
C. the depths of human perception.
D. the accuracy of voice recognition software.
43. Using a computer to diagnose and recommend treatment for medical conditions is an example of:
A. data mining.
B. a neural network.
C. an expert system.
D. virtual reality.
44. Which of the following is NOT a feature associated with Internet2?
A. Faster speed
B. Improved video conferencing
C. Decreased security
D. Accurate, real-time communication transfer
45. It is useful to project past trends into the future because:
A. it helps us to make plans and prepare for changes.
B. these projections are always accurate.
C. the government bases trade deficits on this information.
D. all new research is based on these projections.
46. The project to map human DNA was completed early and under budget due to:
A. advance planning.
B. the exponential increase in computing power.
C. the discovery of nanotechnology.
D. the use of expert systems.
47. Which of the following may NOT be improved by the U.S. military’s reliance on technology?
A. Assessing the safety of buildings and remote areas
B. Patrolling large areas with a minimum of manpower
C. Reducing expenses and improving safety for training exercises
D. Obtaining information from and working with people of other cultures
48. The use of sophisticated computer programs and viruses to attack another country’s computer systems is known as:
A. cyber war.
B. online combat.
C. virtual attacks.
D. code terrorism.
49. Which of the following is NOT a suggested method for keeping pace with changing technology?
A. Obtain information from balanced and diverse sources.
B. Investigate the impact new technology will have on your profession or industry.
C. Invest in life-long learning to attain valuable skills.
D. Choose a career that will not be affected by changing technology.
50. Which of the following is NOT a feature associated with Internet2?
A. Faster speed
B. Improved video conferencing
C. Decreased security
D. Accurate, real-time communication transfer
1. Protecting computer hardware, creating ____________, and controlling access are all methods of ensuring the physical security of your computer.
2. ____________ devices can scan a user’s retina or analyze a voiceprint for identification purposes.
3. ID cards with embedded microchips or magnetic stripes are examples of the ____________ method of security.
4. It is a good idea to record the ____________, sometimes found on the back of the computer, for identification purposes in case of theft.
5. Network administrators create user groups to prevent unrestricted ____________ to the network.
6. A computer that is set up to act as the contact point and handle specific Internet activities is known as a(n) ____________.
7. A(n) ____________ is recommended to provide additional protection for home networks using a broadband Internet connection.
8. It is possible to disable applets or prevent cookies from being stored by adjusting the browser ____________.
9. Overwhelming an e-mail server by sending huge quantities of e-mail is typical of an e-mail ____________.
10. ____________ encryption uses the same key to encrypt and decrypt the message.
11. Tampering, spoofing, misrepresentation, and ____________ are the four main communication security concerns.
12. A padlock or key symbol in the status bar of a browser indicates that a(n) ____________ is being used by the Web site.
13. The Children’s Online Privacy Protection Act protects children under the age of ____________.
14. ____________ advertising is designed for the segment of the population most likely to buy the product or service.
15. Tracking purchases and personal data to provide a Web site visitor with information about products he or she is most likely to buy is an example of ____________.
16. Reading a(n) ____________ carefully may reveal that a user is also giving permission to install spyware on the computer.
17. ____________ is software that reports only your Web browsing activities without your knowledge.
18. A new government agency, the ____________, was created in response to the attacks on September 11, 2001.
19. In the 1970s and 1980s, U.S. manufacturers were losing market share to the ____________.
20. The U.S. became expert at ____________ electronic components because they needed to make smaller, lighter satellites.
21. Because of a superior rocket program, the ____________ launched the first satellite.
22. The IBM computer that won the world’s chess championship was known as ____________.
23. Between 1970 and 1980, ____________ developed most of the features of modern personal computers, including GUI, laser printers, and the Ethernet.
24. The ____________ retained the rights to the Mosaic browser Marc Andreessen developed while he was a student there.
25. ____________ allows investors to finance new companies in the hope of earning higher than normal profits.
26. Business investments that yield profits are known as ____________.
27. The ____________ advocated sharing without profit for the common good, rather than corporate power and personal profit.
28. Moore’s law regarding the increasing complexity of computer chips is an example of ____________ growth.
29. Companies that are run by committees or boards may be unable to react as quickly as companies that are still run by the ____________ that founded them.
30. The IBM PC had a screen that could display three colors: ____________, ____________, and ____________.
31. The first affordable computer with a graphic user interface was the ____________.
32. Protecting the rights of individuals to ____________ from their ideas helps to attract creative people from all around the world to the U.S. computer industry.
33. Contributions by the counter culture, big business, entrepreneurs, and foreign sources have strengthened the ____________ of computing.
34. ____________ works on a molecular level with devices that are measured in billionths of a meter.
35. Groups of atoms that can be arranged to conduct electricity or act as semiconductors are known as ____________.
36. ____________ technology may replace keyboards.
37. ____________ is a term used to describe the potential for a computer to simulate human thought.
38. Using a computer to analyze and locate patterns in large amounts of information is an example of ____________.
39. ____________-based life describes the possibility of robots with the ability to talk and interact like humans.
40. An individual may interact with an artificial world, known as ____________, through sensory inputs controlled by a computer.
1. Match the following terms to their meanings:
I. Record serial A. Protects important data
numbers
II. Backup files B. Prevents unauthorized access
III. Password C. Software that monitors and controls data flow
IV. Firewall D. Protects computer hardware
V. Gateway E. Contact point between network and Internet
2. Match the following terms to their meanings:
I. Biometrics A. Area not protected by firewall
II. Interactive ID cards B. Plugs into modem for additional security
III. Proxy server C. Applies statistics to biology
IV. DMZ D. Retains cache of recently downloaded Web pages
V. Router E. Verification through object possession
3. Match the following terms to their meanings:
I. Decryption A. Prevented by use of digital signature
II. Public-key B. Colossus speeds up this process
III. Symmetric-key C. Prevented by encryption
IV. Tampering D. Slower, more secure encryption method
V. Misrepresentation E. Kept secret, possessed by sender and recipient
4. Match the following terms to their meanings:
I. Spam A. Might include plans for use of personal information
II. Cookie B. Might include agreement to install adware
III. Profile C. Non-executable text file
IV. EULA D. Information describing a person’s Internet activity
V. Privacy policy E. Unsolicited e-mail
5. Match the following terms to their meanings:
I. Spyware A. Calculates locations
II. Pop-up B. Tracks computer activity
III. GPS C. Government program developed to defeat encryption methods
IV. Magic lantern D. Might be activated by mouse movements
V. Carnivore E. Used for e-mail monitoring
6. Match the following terms to their meanings:
I. Patent laws A. Soviets obtained information about these after World War II
II. Entrepreneur B. Rights guaranteed by U.S. Constitution
III. Guidance systems C. Supported by anti-piracy laws
IV. Booster rockets D. Business founder
V. Copyright laws E. U.S. obtained information about these after World War II
7. Match the following terms to their meanings:
I. Exponential growth A. Sequence of numbers that increase through addition
II. Linear growth B. Profit from business investment
III. Moore’s law C. Sequence of numbers that increase by a multiple
IV. Metcalfe’s law D. Predicted computing power increases
V. Capital gains E. High degree of connectivity yields greater productivity
8. Match the following terms to their meanings:
I. .NET strategy A. May deter smaller companies
II. Entrepreneur B. Profits from capital gains tax cuts
III. Venture capitalist C. Motivated by fame and fortune
IV. Microsoft Windows D. Determines capital gains tax rates
V. Congress E. Method to deter software piracy
9. Match the following terms to their meanings:
I. Expert system A. Acts as semiconductors
II. Integrated circuit B. Offers advice on complex problems
III. Nanotube C. Animated image
IV. Avatar D. Tests machine intelligence
V. Turing E. Silicon-based