The external hardware components are located inside the main box or system unit of the computer.
FALSE
To identify a secure Web page, look for a URL that begins with https instead of http.
TRUE
A firewall is a security system that essentially creates a barrier between a computer or network and the Internet in order to protect against unauthorized access.
TRUE
Application service providers (ASPs) supply the information that is available through the Internet.
FALSE
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
TRUE
Small office networks enable workers to access company records stored on a network server.
TRUE
Fixed wireless Internet access is similar to satellite Internet in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
TRUE
Lack of feedback is a disadvantage of Web-based training and distance learning.
FALSE
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
TRUE
A computer does not always do whatever the instructions, or program, tell it to do.
FALSE
Like a computer virus, a computer worm infects other computer files to replicate itself.
FALSE
The use of cookies provides no benefits to consumers.
FALSE
Storage devices are hardware used to store data or or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
TRUE
People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users."
TRUE
Direct Internet connections are much slower than dial-up connections.
FALSE
Denial of service attacks are usually of insignificant cost in terms of business lost.
FALSE
Possessed knowledge access systems use physical objects for identification purposes and are frequently used to access facilities and computer systems.
FALSE
Computer literacy is knowing about and understanding computers and their uses.
TRUE
Fortunately, identify theft is declining and poses a much smaller danger to individuals today.
FALSE
Biometric authentication uses information that an individual should know or can easily remember.
FALSE
The primary infrastructure that makes up the ___ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
___ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets and managing inventory.
Application software
___ is a consortium of researchers, educators and technology leaders from industry, government , and the international community that is dedicated to the development of revolutionary Internet technologies.
Internet2
A booming area of computer crime involves online fraud, theft, scams and related activities collectively referred to as ___.
dot cons
Computer crime is sometimes referred to as ___.
cybercrime
Online shopping and online investing are examples of ___.
e-commerce
___ is charged with such responsibilities as IP address allocation and domain name management,
ICANN ( Internet Corporation for Assigned names and Numbers)
A growing number of college campuses have wireless ___ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
hotspots
When data is processed into a meaningful form, it becomes ___.
information
A personal computer or ___ is a small computer system designed to be used by one person at a time.
microcomputer
A ___ is a malicious program that masquerades as something else - usually some type of application program.
Trojan horse
___ refers to the act of breaking into a computer or network.
Hacking
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ___ uniquely identifies a Web page.
uniform resource locator (URL)
___ is an online news tool designed for facilitating the delivery of news articles podcasts, and other content regularly published to a Web site.
RSS
A (n) ___ is a medium-sized computer used to host programs and data for a small network.
midrange server
___ includes any acts of malicious destruction to a computer or computer resource.
Computer sabotage
Common input devices include the keyboard and ___.
mouse
A (n) ___ is a collection of an individual's work accessible through a Web site.
e-portfolio
___ refers to any instruction delivered via the website.
Web-based training (WBT)
A ___ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
virtual private network