CIS 150 Final

17 March 2023
4.6 (189 reviews)
52 test answers

Unlock all answers in this set

Unlock answers (48)
question
________ allows only limited use of media that has been legally purchased.
answer
digital rights management
question
When does copyright protection begin? When a work is created and fixed into a digital or physical form. When the application for the copyright has been approved. When a work is begun. When the application for the copyright has been submitted.
answer
when a work is created and fixed into a digital or physical form
question
Pictures you find on the Google image search are considered in the public domain.
answer
false
question
Which of the following is NOT an example of a digital music file format? .wma .aac .mp3 .accdb
answer
.accdb
question
The Apple logo would be considered a(n) ________. Copyright Trademark Service mark Patent
answer
trademark
question
A(n) ________ cable carries all audio and video information from devices to a connected TV.
answer
HDMI
question
Many cameras support wireless connections so you can transfer images without connecting cables.
answer
true
question
Which of the following is NOT true about e-books? You can annotate them with your own notes. Amazon sells more e-books now than printed books. They are always PDF file format. You can borrow them from the library.
answer
you can borrow them from the library
question
YouTube is the entity legally responsible for its content, rather than the person who uploaded the content.
answer
false
question
Which is NOT a reason someone might risk violating a copyright? It is hard to prove the copyright in court. I am just one person. Everyone else is doing it. The risk of being caught is very low.
answer
its hard to prove the copyright in court
question
A copyright holder cannot loan, rent, or give away the work.
answer
false
question
Which of the following digital image formats compresses the image file? .mpeg .raw .pdf .jpeg
answer
pdf
question
DRM-free music can legally be moved from system to system
answer
true
question
RAW files are larger in size than JPEG files.
answer
true
question
Intangible personal property has no value.
answer
true
question
To protect a movie, what category of intellectual property would be used?
answer
copyright
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
A denial-of-service attack can be used to deny hackers access to a computer system.
answer
false
question
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
answer
true
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
Viruses, adware and spyware are referred to collectively as ________.
answer
grayware
question
A time bomb virus can be triggered on a certain date.
answer
true
question
Creating and distributing ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
The terms virus and worm mean the same thing.
answer
true
question
A stealth virus is designed to infect multiple file types to fool the antivirus software.
answer
false
question
An encryption virus replicates itself onto a hard drive's master boot record.
answer
false
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
Currently, there are no antivirus programs for mobile devices.
answer
false
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
answer
launch a DOS attack on your computer
question
Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure.
answer
false
question
A worm does NOT require human interaction to spread to other computers.
answer
true
question
A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
answer
worm
question
Regarding computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
Ethical hackers are also known as white-hat hackers.
answer
false
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
DDoS attack
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
answer
rootkit
question
Using your computer for non-work activities while you are being paid to work is known as ________.
answer
cyberloafing
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
answer
pharming
question
A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++.
answer
true
question
Which of the following provides a visual representation of the patterns of an algorithm?
answer
flowchart
question
A data-flow diagram provides a visual representation of an algorithm.
answer
false
question
A popular programming language which is known for having a large number of free libraries is ________.
answer
python
question
________ enables users to define their own data-based tags and facilitates the exchange of information between websites.
answer
XML
question
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
answer
control structures
question
Prolog is an example of a fourth-generation programming language.
answer
true
question
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
answer
beta
question
Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.
answer
false
question
When programmers need to create several different examples of a class, each is known as an object.
answer
true
question
Second-generation languages are also known as assembly languages.
answer
true
question
Which of the following would NOT be used to build websites with interactive capabilities?
answer
fortran
question
Syntax errors are caught only when a program executes.
answer
false
question
Which is NOT a key factor a programmer uses in selecting the language for a project?
answer
number of inputs required