Concepts Exam #3 Flashcards

1
Q

The abuse of an email system to arbitrarily send millions of unsolicited bulk messages is called ____________.

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The M in CPM stands for _______.

A

Mile, Cost per Mile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____________ is specialized hardware and software working together to ensure that public networks like the Internet cannot access private networks like an Intranet.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) _____ represents a value that can change.

A

Variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of malware where a perpetrator logs onto a computer workstation and installs a program that records every keystroke made at the workstation’s keyboard in order to breach the workstation’s security.

A

Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The HTML tag: <span style=”color: #ff0000;”>

will make the text change color. The ff0000 represents the binary equivalent of the color’s RGB values.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One example of a knowledge worker is a DBA, someone with special skills or knowledge on a particular job or topic. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A __________ is a mechanism that helps a Web server track and maintain specific information about a user’s activities; stored in a text file on the local computer’s hard disk.

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ elements can become hyperlinks and allow for webpage navigation.

A

Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hal needs to create a formula that multiplies the contents of cell B7 by the contents of cell C1. The correct way for Hal to enter this formula is ______.

A

=B7*C1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A formula begins with _____.

A

=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

STEM is the acronym for _________.

A

Science, Technology, Engineering, and Math

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The programmed instruction that tell the computer to repeat one or more instructions until a certain condition is met is referred to as a ________.

A

loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Denial-of-service is an attempt to make a computer or any of its resources unavailable to its intended users. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A harmless or interesting program that, when executed, unleashes harmful viruses into a user’s system is known as a _________.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A spreadsheet can examine several alternative _____ scenarios.

A

???

17
Q

The <ul> element defines display and alignment of a _________.

A

bulleted list

18
Q

To create a formula, you should use _______ instead of the actual numbers.

A

Cell references

19
Q

HTML is the acronym for _________.

A

Hypertext markup language

20
Q

A website style that generates a web page directly from the server depending on the context of the user is called a _______.

A

Dynamic Website

21
Q

Which IT job is the highest paid?

A

CIO

22
Q

The concept of using web browser application software for viewing and working with data is sometimes referred to as utilizing a thin client. T/F

A

True

23
Q

If testing a program does not produce the expected results, the program contains an error, sometimes called a ______.

A

Bug

24
Q

A self-replicating program that can send copies of itself to other computers on a network without any user participation or knowledge is called a _________.

A

Worm

25
Q

A term used to refer to a crime where someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. [two-word, non-plural answer]

A

Identity theft

26
Q

The process of writing computer programs is called __________.

A

Programming

27
Q

A type of online advertising that attempts to dupe a user into believing they are clicking on a legitimate news story when in fact they are clicking on an advertisement is called _______.

A

???

28
Q

Software that installs itself on a user’s system without permission in order to take control of the system is known as __________.

A

Spyware

29
Q

The _____ for making a batch of macaroni and cheese is a set of steps that includes boiling water, cooking the macaroni in the water, and making a cheese-sauce.

A

????

30
Q

The _____ for making a batch of macaroni and cheese is a set of steps that includes boiling water, cooking the macaroni in the water, and making a cheese-sauce.

A

????

31
Q

Clickable links between Web pages that allow you to follow a thread of information from one Web page to another are called _______.

A

hyperlinks

32
Q

A set of instructions that can be embedded into a document to produce specific effects on a web page is referred to as _______.

A

HTML

33
Q

A set of instructions that can be embedded into a document to produce specific effects on a web page is referred to as _______.

A

HTML

34
Q

A formula specifies how to add, subtract, multiply, or divide the numbers in worksheet cells. T/F

A

True

35
Q

A cell reference is the column and ____ location of a cell.

A

Row

36
Q

HTML tags usually come in pairs. A closing tag must have the same tag name as the opening tab along with the _____ symbol.

A

/ (forward slash)