Concepts Exam #3 Flashcards
The abuse of an email system to arbitrarily send millions of unsolicited bulk messages is called ____________.
Spamming
The M in CPM stands for _______.
Mile, Cost per Mile
A ____________ is specialized hardware and software working together to ensure that public networks like the Internet cannot access private networks like an Intranet.
Firewall
A(n) _____ represents a value that can change.
Variable
A form of malware where a perpetrator logs onto a computer workstation and installs a program that records every keystroke made at the workstation’s keyboard in order to breach the workstation’s security.
Keylogging
The HTML tag: <span style=”color: #ff0000;”>
will make the text change color. The ff0000 represents the binary equivalent of the color’s RGB values.
False
One example of a knowledge worker is a DBA, someone with special skills or knowledge on a particular job or topic. T/F
False
A __________ is a mechanism that helps a Web server track and maintain specific information about a user’s activities; stored in a text file on the local computer’s hard disk.
Cookie
______ elements can become hyperlinks and allow for webpage navigation.
Link
Hal needs to create a formula that multiplies the contents of cell B7 by the contents of cell C1. The correct way for Hal to enter this formula is ______.
=B7*C1
A formula begins with _____.
=
STEM is the acronym for _________.
Science, Technology, Engineering, and Math
The programmed instruction that tell the computer to repeat one or more instructions until a certain condition is met is referred to as a ________.
loop
A Denial-of-service is an attempt to make a computer or any of its resources unavailable to its intended users. T/F
False
A harmless or interesting program that, when executed, unleashes harmful viruses into a user’s system is known as a _________.
Trojan Horse