Concepts Exam #3 Flashcards
The abuse of an email system to arbitrarily send millions of unsolicited bulk messages is called ____________.
Spamming
The M in CPM stands for _______.
Mile, Cost per Mile
A ____________ is specialized hardware and software working together to ensure that public networks like the Internet cannot access private networks like an Intranet.
Firewall
A(n) _____ represents a value that can change.
Variable
A form of malware where a perpetrator logs onto a computer workstation and installs a program that records every keystroke made at the workstation’s keyboard in order to breach the workstation’s security.
Keylogging
The HTML tag: <span style=”color: #ff0000;”>
will make the text change color. The ff0000 represents the binary equivalent of the color’s RGB values.
False
One example of a knowledge worker is a DBA, someone with special skills or knowledge on a particular job or topic. T/F
False
A __________ is a mechanism that helps a Web server track and maintain specific information about a user’s activities; stored in a text file on the local computer’s hard disk.
Cookie
______ elements can become hyperlinks and allow for webpage navigation.
Link
Hal needs to create a formula that multiplies the contents of cell B7 by the contents of cell C1. The correct way for Hal to enter this formula is ______.
=B7*C1
A formula begins with _____.
=
STEM is the acronym for _________.
Science, Technology, Engineering, and Math
The programmed instruction that tell the computer to repeat one or more instructions until a certain condition is met is referred to as a ________.
loop
A Denial-of-service is an attempt to make a computer or any of its resources unavailable to its intended users. T/F
False
A harmless or interesting program that, when executed, unleashes harmful viruses into a user’s system is known as a _________.
Trojan Horse
A spreadsheet can examine several alternative _____ scenarios.
???
The <ul> element defines display and alignment of a _________.
bulleted list
To create a formula, you should use _______ instead of the actual numbers.
Cell references
HTML is the acronym for _________.
Hypertext markup language
A website style that generates a web page directly from the server depending on the context of the user is called a _______.
Dynamic Website
Which IT job is the highest paid?
CIO
The concept of using web browser application software for viewing and working with data is sometimes referred to as utilizing a thin client. T/F
True
If testing a program does not produce the expected results, the program contains an error, sometimes called a ______.
Bug
A self-replicating program that can send copies of itself to other computers on a network without any user participation or knowledge is called a _________.
Worm
A term used to refer to a crime where someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. [two-word, non-plural answer]
Identity theft
The process of writing computer programs is called __________.
Programming
A type of online advertising that attempts to dupe a user into believing they are clicking on a legitimate news story when in fact they are clicking on an advertisement is called _______.
???
Software that installs itself on a user’s system without permission in order to take control of the system is known as __________.
Spyware
The _____ for making a batch of macaroni and cheese is a set of steps that includes boiling water, cooking the macaroni in the water, and making a cheese-sauce.
????
The _____ for making a batch of macaroni and cheese is a set of steps that includes boiling water, cooking the macaroni in the water, and making a cheese-sauce.
????
Clickable links between Web pages that allow you to follow a thread of information from one Web page to another are called _______.
hyperlinks
A set of instructions that can be embedded into a document to produce specific effects on a web page is referred to as _______.
HTML
A set of instructions that can be embedded into a document to produce specific effects on a web page is referred to as _______.
HTML
A formula specifies how to add, subtract, multiply, or divide the numbers in worksheet cells. T/F
True
A cell reference is the column and ____ location of a cell.
Row
HTML tags usually come in pairs. A closing tag must have the same tag name as the opening tab along with the _____ symbol.
/ (forward slash)