Computers 4

Card Set Information

Author:
wrexshop
ID:
290636
Filename:
Computers 4
Updated:
2014-12-04 16:08:24
Tags:

Folders:
4
Description:
ch4
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user wrexshop on FreezingBlue Flashcards. What would you like to do?


  1. what protocol used to code telephone conversation into packets of compressed data
    VoIP
  2. What server program allows users to collaborate to create the content of a web site
    Wiki
  3. A ________ attempts to determine which e-mail addresses are valid on a network and then sends messages to all of those combinations
    directory harvest attack
  4. A ________ is a program that spreads by tricking users into granting permission to install it by pretending to be something else
    Trojan
  5. Software programs that are designed with malicious intent are called ________.
    malware
  6. Which of the following methods of responding to an e-mail message will automatically send the original attachments along with the response?
    reply all
  7. Which of the following would NOT be considered an advantage of e-mail as compared to regular postal mail?
    Cost, Technical difficulties, remote access or speed
    Technical difficulties
  8. In order to make a Skype video call, both parties should have which of the following to make it work?
    microphone, webcam, fast broadband Internet connection,all of the above
  9. a lie intended to convince its audience it is real when it is not
    hoax
  10. crimeware used to capture personal information as it is entered into the computer
    keyloggers
  11. appropriate behavior on the Internet
    netiquette
  12. A ________ is a program on an e-mail server that can send a message to be distributed to all addresses on the e-list.
    reflector
  13. structuring and sending e-mail
    SMTP
  14. telephone conversations over the Internet
    VoIP
  15. wireless access to the Internet
    WAP
  16. delivering e-mail (messages do not stay on the server)
    POP3
  17. delivering e-mail (messages stay on the server)
    IMAP
  18. Which of the following would be an example of a disadvantage for using VoIP?
    LACK OF MOBITILY
  19. coding and decoding synchronous conversations
    VOIP
  20. provides electric power for a short time
    UPS
  21. wireless service for sending audio and video
    MMS
  22. wireless service for sending brief messages
    SMS
  23. Which of the following is texting software for sending short messages on a wireless service?
    SMS
  24. SMTP is a protocol for ________.
    sending messages
  25. The ________ is an emergency response site maintained by the SANS institute.
    Internet Storm Center (ISC)
  26. log of changes
    revision history
  27. program that allows users to collaborate to create the content of a Web site
    WIKI
  28. program used to automatically identify and undo vandalism
    BOT
  29. program code before it is translated into machine code
    SOURCE CODE
  30. Another name for an RSS reader is a(n) ________ and is used to display RSS files.
    FEED AGGREGATOR
  31. In order to ensure posts are from legitimate members, users might be asked to enter a ________.
    CAPTCHA
  32. The use of a live message center for text-based exchanges when users are active at the same time is called a ________.
    CHAT
  33. On which line would the e-mail address of the primary recipient(s) be entered?
    TO::
  34. A rootkit might include a(n) ________ that allows the intruder to bypass normal system security to communicate with the system and take control.
    BACKDOOR
  35. The person on an e-list responsible for enforcing behavior rules is called a(n) ________
    MODERATOR
  36. EXAMPLE: asynchronous = podcast
  37. EXAMPLE:synchronous = chat
  38. EXAMPLE: social networking= Facebook
  39. EXAMPLE:professional networking  = LinkedIn
  40. EXAMPLE: open-source   =  Linux
  41. tricks the user into granting permission to install it by pretending to be something else
    TROJAN
  42. steals information about a user to impersonate them in order to steal money
    CRIMEWARE
  43. MONITORS A USERS BEHAVIOR AND REPORTS IT
    SPYWARE
  44. causes the server to become overloaded and unable to provide timely service
    DOS
  45. PROGRAM THAT GIVES OUTSIDERS ACCESS TO A COMPUTER AND ADMINISTRATOR RIGHTS
    ROOTKIT

What would you like to do?

Home > Flashcards > Print Preview