Correct
A challenge for companies such as Google and Facebook is building software
that can ____ over the next few years.
analyze large amounts of data
A common form of authentication is a ____.
password
A new fourth-generation technology called ____ is competing to become the
wireless network of choice for high-speed connectivity.
Long Term Evolution
A popular encryption method used to protect data that travels over a wireless
network is ____.
WPA
A popular term used to identify devices such as the iPad is _____.
tablet PC
A printer requires a ____ installed on the computer in order to operate.
device driver
A unique feature of the semantic web is its ability to ____.
figure out what the user is looking for
A web ____ can also be referred to as a customized web home page.
portal
A(n) ____ view of data is the way a user thinks about data.
logical
All of the following are examples of malware EXCEPT ____.
updates
An area of a building where you can connect to the Internet wirelessly is often
referred to as a ____.
hotspot
An email with a subject heading "Urgent Security Update" that requests a
username and password followed by a link to "re-login and resolve the issue" is a
good example of a ____ scam.
phishing
An icon on your desktop is a component of a ____ interface.
graphical user
An industrial operating system works with a large computer system requiring a(n)
____.
server
As the amount of Internet ____ continue(s) to increase, streaming video and
television are becoming commonplace.
bandwidth
Bluetooth is an example of a technology used with a ____ area network.
personal
Carpal tunnel syndrome can cause ____.
a numb sensation in the wrists and hands
, Cloud computing is not possible without _____.
an Internet connection
Companies such as _____ have connected with libraries to digitize millions of
books.
Compulsive online gambling and pornography are examples of ____.
computer addiction
Controlling the amount of ____ we receive in our email Inbox is one way to
control information overload.
spam
Cookie files contain ____.
data
Criminals collect items such as credit card numbers without the user's
knowledge through the use of ____.
spyware
Each person's digital shadow is ____.
the digital information generated about a person by organizations
Ecommerce hosting companies offer _____ that provide all the necessary
software tools to deliver ecommerce applications.
servers
Ecommerce technologies include software and systems that support safe and
secure transactions over _____ and the Internet, and make ecommerce possible.
networks
Embedded operating systems are hardwired into a computer component, such as
ROM or flash memory, to control a ____ computer.
special-purpose
Embedded systems can be found in all of the following EXCEPT _____.
cloud computers
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an
example of ____.
web empowerment
Full transparency is a scenario in which surveillance and information are ____.
easily available to every law-abiding member of a society
Google Wallet software utilizes smart phones with near field communication
technology, such as _____, to allow shoppers to swipe their phone at checkout to
pay for items.
RFID
Google relies on ____ to relay information related to its mapped software.
satellites
Government agencies have not supported cloud computing due to the lack of
____.
privacy and security
Hackers can gain access to computer systems through the use of ____.
ports
In a(n) ____ relationship, multiple users are provided with access to a server at
the same time.