1. A ________ is a device that provides a continuous supply power during a power failure
and prevents spikes and surges from reaching your computer
D. UPS
2. A(n)________ contains multiple outlets but can not filter out power spikes and surges
B. Power Strip
3. A(n)_________ is a series of characters that a user creates to verify his/her user ID
B. Malware
5. A method of personal identification, called ____________, bases identification on a
physical trait,
C. Biometrics
6. A (n) _____________ is a software or hardware designed to filter out suspicious data
attempting to enter or leave a computer.
A. firewall
7. A computer ________ is a program that reproduces and attaches itself to a file so it can
spread from file to file.
D. Virus
8. A spam filter will help you avoid unwanted
B. email
9. The __________ browsing feature in internet explorer keeps the browser from storing
any data
D. Inprivate
10. A(n) __________ attacks floods network servers with useless traffic.
B. Denial of service
11. A (n) _____ is a message containg information about the user sent from a web server
and store on the hard drive.
C. cookie
12. A computer controlled by a bad bot is called a _____________
A. zombie
13. A(n)________is a software that can automate a task when given a command
D. Intelligent agent
15. A password uses a combination of letters and numbers, but a ______ uses numbers only
C. PIN
16. Virus experts use_________ threat to describe threats that combine more than one type
of malicious program.
A. blended
17. A virus _______ is a section of program code used to identify a known malicious
program.
D. Signature
18. ________ is an emailed-based or IM scam designed to persuade you to reveal
confidential information
B. phising
19. A _________ is a removable storage medium containg the files needed to start your
computer without accessing the hard drive,
D. boot disk
, 20. A(n) ______ backup contains a copy of every program data and system file on a
computer
C. full
Unit f
1. A (n) ______ is the combination of hardware, software, and connecting links that
transport data.
c. network
2. From a geographic perspective, networks, can be classified as LAN_______, NAN, MAN,
or WAN, .
A. PAN
3. Each host computer has an easy to remember domain name that translates directly to
the computers ________ ip address.
B. FQDN
4. ___________ determines how fast data travels to your computer from the internet.
D. Bandwidth
5. Drive_____________ assigns a drive letter to a computer, storage device or folder located
on a network computer
D. bridging
A. mapping
6. A public _______ network is a wireless LAN that provides open internet acess to the
public in places such as book stores, coffe shops, airports, hotels , and airport.
D. Wi-fi
7.A________ is a device that make it possible to send and receive data over telephone lines.
D. Modem
8. ___________ is the leading technology for wired networks; it is also included in some
printers and other devices.
C. Ethernet
9. _____________ is a short-range wireless network technology that is designed to make its
won connections between electronic devices, without wires, cables , or any direct action
from a user.
B. Bluetooth
10. Networks that use the __________structure do not have a sever.
c. Peer to peer (P2P)
11. A popular technology for wireless network is wi-fi which stands for wireless ________
A. fidelity
12. Data travels faster on __________ networks than on wireless network.
C. wired
13. A network ______ is a computer that provides services and distributes resources to
other computers on the network.
B. Server
14. A(n) ______________ address is a pshycisal address, a unqiue number assigned to a
computer when it is manufactured.
A. Mac
15. A(n) ____________ address is a seires of number used to identify a network device in
virtually every type of computer network.